Enhanced Credit Card Fraud Detection based on Attention mechanism and LSTM deep Model
☆44Jun 23, 2022Updated 3 years ago
Alternatives and similar repositories for LSTM-Attention-FraudDetection
Users that are interested in LSTM-Attention-FraudDetection are comparing it to the libraries listed below
Sorting:
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated 2 years ago
- Simulation framework for customs fraud detection using import declarations.☆32Mar 19, 2023Updated 2 years ago
- ☆31Jun 1, 2022Updated 3 years ago
- a Federated Learning Framework adapted for resource-constrained environments, focusing on IoT devices☆10Oct 6, 2025Updated 5 months ago
- Issues tracker and feedback project for the SAS coding assistant☆12Jan 13, 2026Updated last month
- ☆10Dec 10, 2021Updated 4 years ago
- Building a Linear Heatmap for Routes☆11Nov 2, 2023Updated 2 years ago
- Implementation of Dynamic Computation Offloading Control Logic in a Software-Defined Vehicle (SDV) System☆11Dec 19, 2024Updated last year
- This repository contains the code used in the experimental setup of the paper 'Inductive Graph Representation Learning for Fraud Detectio…☆34May 20, 2023Updated 2 years ago
- Thesis in Federated Learning using an Edge/Cloud Computing architecture☆10Feb 26, 2021Updated 5 years ago
- Source code for "Congestion-aware Distributed Task Offloading in Wireless Multi-hop Networks Using Graph Neural Networks"☆14Oct 23, 2024Updated last year
- Protect workers with TensorFlow Hard Hat object detection model on a Jetson Nano☆10Sep 27, 2022Updated 3 years ago
- Deep Reinforcement Learning based Autonomous Driving Agents☆10Jul 7, 2022Updated 3 years ago
- ☆10Jul 26, 2024Updated last year
- Teaching the Donkey car to drive a track in the simulator using State Representation Learning and different Reinforcement Learning Algori…☆12Dec 6, 2021Updated 4 years ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- ☆41Dec 13, 2022Updated 3 years ago
- This operator will manage and configure data processing unit (DPUs) to be used in accelerating/offloading k8s networking functions☆12Feb 13, 2026Updated 3 weeks ago
- Official implementation of the UMDQN algorithm presented in the scientific research paper entitled "Distributional Reinforcement Learning…☆11Jun 3, 2022Updated 3 years ago
- [ICML 2024 Oral] Consistent Adversarial Robust Deep Q Networks (CAR-DQN)☆15Feb 27, 2025Updated last year
- Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection☆11Jan 23, 2023Updated 3 years ago
- ☆11Jan 11, 2022Updated 4 years ago
- Reinforcement learning project using deep Q-learning to control the operations of an electrical microgrid☆10Jan 3, 2023Updated 3 years ago
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 6 months ago
- This is a DQN-based recommendation system for item-list recommendation and it finally achieved second place in the competition of RL-base…☆11Oct 8, 2021Updated 4 years ago
- My undergraduate final project - Modeling and control of a distillation column using neural networks and reinforcement learning.☆12Apr 28, 2020Updated 5 years ago
- An HTTP client for the Rust AWS SDK that runs on Fastly Compute @ Edge☆10Nov 11, 2025Updated 3 months ago
- Implementation of feature engineering from Feature engineering strategies for credit card fraud☆44Dec 15, 2020Updated 5 years ago
- Try to replicate test with the paper "Adaptive Resource Allocation in Future Wireless Networks With Blockchain and Mobile Edge Computing"☆10Nov 1, 2023Updated 2 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- Plotting the Optimal Route in Python for Data Scientists using the Dijkstra Algorithm☆12Feb 26, 2023Updated 3 years ago
- Detection of Denial of service attack like Blackhole and Greyhole attack in wireless mesh network.☆16Aug 10, 2017Updated 8 years ago
- Code samples and materials for network analysis and network optimization with SAS or SAS Viya.☆13Jan 30, 2026Updated last month
- Interface definitions for the Compute@Edge platform in witx.☆15Feb 11, 2022Updated 4 years ago
- A GNOME Extension for GNOME 43 and above to allow you to switch between integrated, discrete, and offloading hybrid graphics from the con…☆10Nov 19, 2023Updated 2 years ago
- Implementation of Skip-GANomaly with MNIST dataset☆11Nov 28, 2019Updated 6 years ago