Implementation fo Zorro: Valid, Sparse, and Stable Explanations in Graph Neural Networks
☆16Aug 31, 2022Updated 3 years ago
Alternatives and similar repositories for zorro
Users that are interested in zorro are comparing it to the libraries listed below
Sorting:
- ☆20Jul 30, 2024Updated last year
- Turtlebot maze solver that senses environment through laser scans and navigates. A mini Project from Robot Ignite Academy Course☆10Aug 15, 2020Updated 5 years ago
- ☆11May 16, 2023Updated 2 years ago
- Transfer entropy (conditional mutual information) estimators for the Julia language☆14Nov 6, 2022Updated 3 years ago
- ☆11May 14, 2024Updated last year
- A repo to keep all resources about interpretability in NLP organised and up to date☆12Nov 22, 2020Updated 5 years ago
- ☆10Jul 24, 2023Updated 2 years ago
- Python implementation of closed frequent subgraph mining algorithm cgSpan. Only undirected graphs are currently supported.☆13Dec 20, 2021Updated 4 years ago
- Generative Reranker PyTerrier☆18Dec 1, 2025Updated 3 months ago
- ☆13Jun 11, 2024Updated last year
- ☆15May 22, 2023Updated 2 years ago
- ☆14Feb 20, 2025Updated last year
- Fixing SySeVR.☆12Sep 23, 2021Updated 4 years ago
- ☆14Mar 3, 2022Updated 4 years ago
- Code for the NLPCC 2018 paper: Distant Supervision for Relation Extraction with Neural Instance Selector☆12Mar 7, 2019Updated 6 years ago
- ROS2 URDF and Visualization for DexHand V1☆13Jun 30, 2024Updated last year
- BookWorm is a python based tool to convert Ebooks to simple audiobook in mp3 format. It uses Natural Language Processing to summarize and…☆14Nov 2, 2017Updated 8 years ago
- 👾 My dotfiles: vimrc, zshrc...☆13Feb 13, 2026Updated 2 weeks ago
- ☆13Aug 9, 2022Updated 3 years ago
- This is the official code repository for paper "Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code".☆17Sep 21, 2025Updated 5 months ago
- IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications☆18May 10, 2024Updated last year
- Learning from what we know: How to perform vulnerability prediction using noisy historical data, Empirical Software Engineering (EMSE)☆14Sep 20, 2023Updated 2 years ago
- 微博评论获取(API) 情感分析☆13Jan 23, 2020Updated 6 years ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13May 27, 2020Updated 5 years ago
- To learn function representations from multi-domain knowledge bases for software vulnerability detection.☆15Aug 15, 2020Updated 5 years ago
- ☆16Aug 16, 2023Updated 2 years ago
- Project source files for DIY Eink Gadget. Project video available at https://youtu.be/i01PoMj23bA☆17Mar 16, 2023Updated 2 years ago
- ☆27Jan 9, 2026Updated last month
- ☆15Jun 12, 2023Updated 2 years ago
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆14Dec 19, 2022Updated 3 years ago
- Code for the paper "Collaborative Graph Walk for Semi-supervised Multi-Label Node Classification" - ICDM 2019☆13Mar 25, 2023Updated 2 years ago
- Existing literature about training-data analysis.☆17Dec 17, 2021Updated 4 years ago
- ☆16Nov 20, 2022Updated 3 years ago
- A tool based on python to parse C/C++ code into code property graph☆17Nov 4, 2022Updated 3 years ago
- ☆19Sep 27, 2021Updated 4 years ago
- ☆19Jul 24, 2025Updated 7 months ago
- ☆25Apr 25, 2024Updated last year
- ☆18Aug 21, 2025Updated 6 months ago
- [ASE'23] When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection☆16Jan 12, 2024Updated 2 years ago