Enhanced Credit Card Fraud Detection based on Attention mechanism and LSTM deep Model
☆45Jun 23, 2022Updated 3 years ago
Alternatives and similar repositories for LSTM-Attention-FraudDetection
Users that are interested in LSTM-Attention-FraudDetection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Jul 25, 2020Updated 5 years ago
- Jupyter Notebook on Conditional GAN☆13May 9, 2019Updated 6 years ago
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago
- ☆16Dec 12, 2021Updated 4 years ago
- How to detect emotions from speech using Bi-directional LSTM networks and attention mechanism in Keras.☆20Mar 15, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Purposed a network traffic classification and prediction model based on CNN, TCN and Attention mechanism.☆23Nov 13, 2023Updated 2 years ago
- This repository contains the code used in the experimental setup of the paper 'Inductive Graph Representation Learning for Fraud Detectio…☆34May 20, 2023Updated 2 years ago
- Building a Linear Heatmap for Routes☆11Nov 2, 2023Updated 2 years ago
- Dotnet core static blog generator based on markdown, YAML front matter and Handlebars.NET☆11Apr 5, 2020Updated 6 years ago
- The repository for the course in Udemy☆16Sep 23, 2019Updated 6 years ago
- SOUL: Scala Oversampling and Undersampling Library.☆13Apr 11, 2019Updated 7 years ago
- state-of-the-art models for diacritics restoration for Arabic language☆17Feb 23, 2025Updated last year
- New structural distributional shifts for evaluating graph models☆16Oct 25, 2023Updated 2 years ago
- Arabic deep-learning based diacritization models (Shakkala, Shakkelha) ported to PyTorch☆14May 30, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Spell check for Arabic text using python☆14Mar 22, 2019Updated 7 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- ☆17Mar 17, 2022Updated 4 years ago
- Abstractive text summarization done with the help of LSTMs using encoder-decoder model which was able to achieve accuracy of 77.27% on t…☆10Sep 22, 2020Updated 5 years ago
- Feature Selection using Simulated Annealing☆11Aug 10, 2022Updated 3 years ago
- a pytorch implementation of Exploiting Edge Features in Graph Neural Networks.☆46Jul 18, 2023Updated 2 years ago
- [CIKM 2022] Towards Automated Over-Sampling for Imbalanced Classification☆10Mar 20, 2023Updated 3 years ago
- Credit Score Provider for the Faker Python Project. Use this to generate fake but realistic-looking consumer credit scores aligning to th…☆20Oct 9, 2025Updated 6 months ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆13Feb 25, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Here I've demonstrated how and why should we use PCA, KernelPCA, LDA and t-SNE for dimensionality reduction when we work with higher dime…☆20Jul 24, 2017Updated 8 years ago
- The implementation of our paper Fed-TDA☆15Jan 11, 2023Updated 3 years ago
- Deep distance-based outlier detection published in KDD18: Learning representations specifically for distance-based outlier detection. Few…☆48Nov 10, 2020Updated 5 years ago
- RGCN model for real-time fraud detection☆11Jan 27, 2023Updated 3 years ago
- Demo showing how to package and execute a Federated Learning jobs on Nevermined.☆13Dec 6, 2022Updated 3 years ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- Studying notes of ISLR, ESL, and other Machine Learning books. Check a more user friendly version on my personal website https://nancyyan…☆14Sep 11, 2020Updated 5 years ago
- ☆13Dec 5, 2022Updated 3 years ago
- The first Dialectal Arabic Code Switching - DACS corpus from broadcast speech. Annotated at the token-level, considering both the linguis…☆15Apr 3, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- Automatic Arabic Text Summarization using Python☆12Jul 2, 2020Updated 5 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆13Apr 28, 2023Updated 2 years ago
- Exercises from https://coderbyte.com/☆16Oct 31, 2018Updated 7 years ago
- Trajectory Extraction of road users via Traffic Camera☆27Oct 12, 2023Updated 2 years ago
- ☆73Jul 25, 2023Updated 2 years ago
- cat breed classifer using Pytorch and flask☆12Jan 30, 2024Updated 2 years ago