An implementation of Fraud Eagle algorithm
☆19Dec 17, 2025Updated 3 months ago
Alternatives and similar repositories for fraud-eagle
Users that are interested in fraud-eagle are comparing it to the libraries listed below
Sorting:
- A wrapper of FRAUDAR algorithm☆68Dec 17, 2025Updated 3 months ago
- Ethereum Smart Contract - Proof of Work token☆10Jul 2, 2017Updated 8 years ago
- An Unsupervised Graph-based Toolbox for Fraud Detection☆131Apr 18, 2022Updated 3 years ago
- Data mining with Go.☆10Sep 16, 2018Updated 7 years ago
- List of crypto mining pools.☆14Apr 30, 2018Updated 7 years ago
- Group review spammer detection☆10Sep 9, 2019Updated 6 years ago
- DEPRECATED: Starting with Android P the WiFi RTT is part of the public API! This Android library works as proxy to the hidden android.net…☆10Mar 8, 2018Updated 8 years ago
- Anamoly Detection with Autoencoders - Credit Card Fraud Case☆17Jun 7, 2020Updated 5 years ago
- ANOMULY is a general, unsupervised edge anomaly detection framework for multiplex dynamic networks.☆11May 19, 2023Updated 2 years ago
- Use sammy007 / open-ethereum-pool compiler☆14May 10, 2018Updated 7 years ago
- generative-camouflaged-spam-detector☆11Aug 20, 2020Updated 5 years ago
- A web application to unlock primary biodiversity data from published literature☆14Mar 3, 2020Updated 6 years ago
- Codes and data for KDD2020 submission☆17Feb 13, 2020Updated 6 years ago
- Fraud detection using Graph Convolutional Networks☆13May 9, 2022Updated 3 years ago
- Front end React web site for the Full Cycle Mining Controller☆14Sep 24, 2018Updated 7 years ago
- Bot Detection in Social Media Accounts: In social media (Facebook, twitter, Instagram) there are multiple bot accounts used by various p…☆12Jul 20, 2020Updated 5 years ago
- Inferring Strange Behavior from Connectivity Pattern (PAKDD 2014, KAIS 2015)☆11Mar 27, 2015Updated 10 years ago
- Instant messaging with a neural network☆11Nov 13, 2016Updated 9 years ago
- code for paper RoSGAS: Adaptive Social Bot Detection with Reinforced Self-Supervised GNN Architecture Search☆11Jun 25, 2023Updated 2 years ago
- ☆10Mar 31, 2022Updated 3 years ago
- 金融反欺诈模型☆27Jan 20, 2018Updated 8 years ago
- [KDD 2023] Group-based Fraud Detection Network on e-Commerce Platforms☆16Feb 16, 2024Updated 2 years ago
- some machine learning algorithm I implemented before.☆15Apr 5, 2015Updated 10 years ago
- KNIME Interactive R Statistics Integration☆22Updated this week
- ☆19Jul 25, 2022Updated 3 years ago
- BIC: Twitter Bot Detection with Text-Graph Interaction and Semantic Consistency☆15Nov 11, 2024Updated last year
- VeriumMiner with docker☆12Nov 19, 2019Updated 6 years ago
- OCAN: One-Class Adversarial Nets for Fraud Detection☆24Sep 12, 2018Updated 7 years ago
- Nimiq CUDA miner☆25Oct 21, 2022Updated 3 years ago
- A C++ client for Redis.☆21Nov 5, 2009Updated 16 years ago
- Source code of FedPrompt☆16May 4, 2022Updated 3 years ago
- A PyTorch implementation of DeepFD (Deep Structure Learning for Fraud Detection)☆32Oct 2, 2020Updated 5 years ago
- We proposed social media bot detection model Botection which exploits both semantic information and user metadata to enhance task perform…☆15Aug 18, 2020Updated 5 years ago
- Is Bitcoin cloud mining profitable? Check the notebook to find out! (Not Clickbait)☆24Dec 8, 2018Updated 7 years ago
- Official implementation of the papers "User-controlled federated matrix factorization for recommender systems" and "FedeRank: User Contro…☆18Jul 28, 2020Updated 5 years ago
- This repo contains a machine reading model, built on top of on document-qa, a powerful machine reading library and recent state of the a…☆17Nov 12, 2018Updated 7 years ago
- ☆17Mar 26, 2022Updated 3 years ago
- 利用公开的安然财务和邮件数据集,利用 PCA 和特征选择分析处理缺失的数据,再通过朴素贝叶斯、决策树、SVM等机器学习构建筛选器,找出有欺诈嫌疑的安然员工☆10Dec 7, 2017Updated 8 years ago
- Who are the people behind the mining industry in Mozambique? A partial answer can be found by connecting minerals concessions to the peop…☆25Jul 30, 2015Updated 10 years ago