An implementation of Fraud Eagle algorithm
☆19Dec 17, 2025Updated 2 months ago
Alternatives and similar repositories for fraud-eagle
Users that are interested in fraud-eagle are comparing it to the libraries listed below
Sorting:
- 金融反欺诈模型☆27Jan 20, 2018Updated 8 years ago
- Group review spammer detection☆10Sep 9, 2019Updated 6 years ago
- 💎 Virtual crypto exchange for testing purposes. API is compatible with major crypto exchanges.☆12Feb 14, 2019Updated 7 years ago
- Source Code for Data Abstraction & Problem Solving with C++: Walls and Mirrors☆13Jun 13, 2022Updated 3 years ago
- Provides fully configure Visual Studio Solution for ORTools☆10Aug 30, 2019Updated 6 years ago
- ANOMULY is a general, unsupervised edge anomaly detection framework for multiplex dynamic networks.☆11May 19, 2023Updated 2 years ago
- Become an expert C++ programmer by solving real-world programming problems☆10Mar 25, 2019Updated 6 years ago
- Quantnet: SFE quantlets☆11Oct 27, 2025Updated 4 months ago
- Ethereum Smart Contract - Proof of Work token☆10Jul 2, 2017Updated 8 years ago
- Use sammy007 / open-ethereum-pool compiler☆14May 10, 2018Updated 7 years ago
- List of crypto mining pools.☆14Apr 30, 2018Updated 7 years ago
- A new experience for agentic-coding Android and Apple apps☆21Jan 8, 2026Updated last month
- CoinBlock blocks services like CoinHive from using your browser to mine cryptocurrency without your consent.☆12Oct 15, 2017Updated 8 years ago
- A step-by-step guide to data structures and algorithms☆10Jan 30, 2023Updated 3 years ago
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 4 months ago
- ☆11Sep 15, 2015Updated 10 years ago
- Data mining with Go.☆10Sep 16, 2018Updated 7 years ago
- R-Deep-Learning-Essentials-Second-Edition, Published by Packt☆13Jan 15, 2021Updated 5 years ago
- Linux kernel source tree☆21Aug 6, 2024Updated last year
- Introduction to Data Structures and Algorithms in Java, published by Packt☆11Jan 30, 2023Updated 3 years ago
- Chris Chapman and Elea Feit's "R for Marketing Research and Analytics"☆12Sep 19, 2017Updated 8 years ago
- ☆10Dec 22, 2021Updated 4 years ago
- Running ML.NET from Blazor (Server Side, aka Razor Components) Seen on Blazor StateHasChanged☆12Nov 24, 2018Updated 7 years ago
- This solution template demonstrates how to build and deploy a retail online fraud detection solution.☆51Mar 9, 2024Updated last year
- Video Effects on VGA☆15Jan 7, 2019Updated 7 years ago
- Implementation of the Munkres' Assignment Algorithm (aka Hungarian Algorithm).☆12Aug 27, 2017Updated 8 years ago
- allow to boot btrfs nested subvolume (based on boot_btrfs_subvol 0.8)☆10May 30, 2017Updated 8 years ago
- A Julia-based solver for partial-differential equations.☆13Aug 30, 2019Updated 6 years ago
- Leveraging network topology for better fake account detection in social networks☆10Jul 6, 2023Updated 2 years ago
- Code samples from book "Clean C++: Sustainable Software Development Patterns and Best Practices with C++ 17"☆12Jun 3, 2018Updated 7 years ago
- Adaptive Large Neighbourhood Search for the Orienteering Problem☆13Feb 24, 2023Updated 3 years ago
- The matching routine for interologs identification based on co-evolution☆11Jul 17, 2018Updated 7 years ago
- Kimi Agent (Rust), the Kimi Code CLI Wire mode-compatible agent server.☆33Feb 6, 2026Updated 3 weeks ago
- Source Code for 'C++20 Quick Syntax Reference' by Mikael Olsson☆14Apr 16, 2021Updated 4 years ago
- Source Code for 'Applied Analytics through Case Studies Using SAS and R' by Deepti Gupta☆12Jun 6, 2019Updated 6 years ago
- Bot Detection in Social Media Accounts: In social media (Facebook, twitter, Instagram) there are multiple bot accounts used by various p…☆12Jul 20, 2020Updated 5 years ago
- unofficial rust sdk for terminal coffee (https://terminal.shop)☆12Mar 26, 2025Updated 11 months ago
- Simple Jupiter Ace implementation for the Ice40 (myStorm BlackIce)☆12Jan 28, 2018Updated 8 years ago
- ☆10Mar 31, 2022Updated 3 years ago