This repository contains the official implementation of "A Benchmarking Study of Kolmogorov-Arnold Networks on Tabular Data" (under review). You can use this codebase to replicate our experiments about benchmarking KAN networks on some of the most used real-world tabular datasets.
☆17Jul 10, 2024Updated last year
Alternatives and similar repositories for benchmarking-KAN
Users that are interested in benchmarking-KAN are comparing it to the libraries listed below
Sorting:
- ☆11May 5, 2022Updated 3 years ago
- ITALIC: An ITALian Intent Classification Dataset☆14Nov 24, 2023Updated 2 years ago
- PACE (Podcast AI for Chapters and Episodes) is a semantic search engine that helps you find the information you need, inter- and intra-po…☆17Dec 11, 2022Updated 3 years ago
- Repository for the LLM course☆30Jan 4, 2026Updated 2 months ago
- This repository contains the code for the paper "Self-supervised Text Style Transfer using Cycle-Consistent Adversarial Networks".☆11Dec 2, 2024Updated last year
- Official implementation of QATCH: Benchmarking SQL-centric tasks with Table Representation Learning Models on Your Data☆32Jul 17, 2025Updated 7 months ago
- This repo contains the code for "Voice Disorder Analysis: A Transformer-based Approach", accepted at Interspeech 2024☆15Jun 11, 2024Updated last year
- ☆37May 27, 2025Updated 9 months ago
- Course of Machine Learning for Biomedical Data -TECNUN University of Navarra☆12Feb 20, 2026Updated 2 weeks ago
- Pre-training BART model for the Italian Language☆16Dec 28, 2022Updated 3 years ago
- Code associated with the paper "Entropy-based Attention Regularization Frees Unintended Bias Mitigation from Lists"☆50May 31, 2022Updated 3 years ago
- A comparative analysis of 4 ML algorithms. This Hypertension Risk Prediction Model can be described as a machine learning model designed …☆11Jan 25, 2024Updated 2 years ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated 2 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- A python package for benchmarking interpretability techniques on Transformers.☆215Sep 29, 2024Updated last year
- This repository demonstrates the application of efficient Kolmogorov-Arnold Networks (KAN) in a curve fitting (regression) task.☆35Jul 12, 2024Updated last year
- Official Pytorch implementation of "Large Language Models are Strong Audio-Visual Speech Recognition Learners" [ICASSP 2025] and "Mitigat…☆56Jan 18, 2026Updated last month
- ☆17Apr 18, 2024Updated last year
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- Detect-Then-Explain Framework for Text-to-SQL task☆10Dec 6, 2023Updated 2 years ago
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 6 months ago
- coding exercise using TCGA immune infiltration data☆11Feb 2, 2024Updated 2 years ago
- Temporal summarization framework☆10Dec 4, 2023Updated 2 years ago
- ☆12Jan 27, 2023Updated 3 years ago
- ☆14Apr 1, 2025Updated 11 months ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- ☆13Dec 5, 2022Updated 3 years ago
- ☆13Sep 23, 2024Updated last year
- ☆10Mar 7, 2023Updated 3 years ago
- Embed rich output in Markdown cells.☆17Nov 20, 2023Updated 2 years ago
- Based on the paper "Fast and lean encrypted Internet traffic classification," in Computer Communications, by S. Roy, T. Shapira and Y. Sh…☆10May 28, 2022Updated 3 years ago
- RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification☆15Oct 17, 2024Updated last year
- Do we need rebalancing strategies? A theoretical and empirical study around SMOTE and its variants (Sakho, Malherbe and Scornet; 2024)☆11Sep 2, 2025Updated 6 months ago
- Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.☆11Mar 6, 2024Updated 2 years ago
- Load, analyze and plot GPS data from GPX files with numpy/pandas☆12Nov 2, 2025Updated 4 months ago
- Feature Selection using Simulated Annealing☆11Aug 10, 2022Updated 3 years ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆21Sep 9, 2025Updated 6 months ago
- ☆11Dec 16, 2021Updated 4 years ago
- ☆13Feb 24, 2026Updated last week