A wrapper of FRAUDAR algorithm
☆69Dec 17, 2025Updated 2 months ago
Alternatives and similar repositories for fraudar
Users that are interested in fraudar are comparing it to the libraries listed below
Sorting:
- An implementation of Fraud Eagle algorithm☆19Dec 17, 2025Updated 2 months ago
- ☆25Apr 24, 2019Updated 6 years ago
- D-Cube: Dense-Block Detection in Terabyte-Scale Tensors (WSDM'17 & Frontiers in Big Data'21)☆32Oct 30, 2024Updated last year
- M-Zoom: Fast Dense-Block Detection in Tensors with Quality Guarantees (ECML/PKDD'16 & TKDD'18)☆27Oct 30, 2024Updated last year
- Learning Fraud Detection from research papers and industry applications.☆142Dec 12, 2024Updated last year
- Code samples and materials for network analysis and network optimization with SAS or SAS Viya.☆13Jan 30, 2026Updated last month
- A Deep Graph-based Toolbox for Fraud Detection in TensorFlow 2.X☆136Apr 20, 2022Updated 3 years ago
- A collection of research and survey papers of fraud detection mainly in advertising.☆241Aug 4, 2021Updated 4 years ago
- 滴滴黑产识别的离群点检测python自用包☆42Jul 15, 2019Updated 6 years ago
- Spark / graphX implementation of the distributed louvain modularity algorithm☆318Sep 2, 2020Updated 5 years ago
- A Deep Graph-based Toolbox for Fraud Detection☆749Apr 20, 2022Updated 3 years ago
- The Lua binding of murmurhash3 via LuaJIT FFI☆20May 31, 2018Updated 7 years ago
- SHALE: An Efficient Algorithm for Allocation of Guaranteed Display Advertising Guaranteed Display Advertising☆51Nov 21, 2016Updated 9 years ago
- ☆19Mar 13, 2018Updated 7 years ago
- Catching Synchronized Behavior in Large Directed Graphs (KDD 2014)☆22Mar 27, 2015Updated 10 years ago
- Python wrapper of xxhash☆34Oct 25, 2014Updated 11 years ago
- A Web-Based Visualization Tool for Biclustering of Multivariate Time Series☆10Feb 17, 2023Updated 3 years ago
- 2019讯飞移动广告反欺诈算法挑战赛baseline http://challenge.xfyun.cn/2019/gamedetail?type=detail/mobileAD☆23Jun 26, 2019Updated 6 years ago
- A curated list of Graph/Transformer-based fraud, anomaly, and outlier detection papers & resources☆1,783Jan 31, 2026Updated last month
- An Unsupervised Graph-based Toolbox for Fraud Detection☆131Apr 18, 2022Updated 3 years ago
- An Industrial Graph Neural Network Framework☆1,339Jul 4, 2025Updated 7 months ago
- 文本相似性计算☆28May 30, 2016Updated 9 years ago
- Trading algorithm for Bitcoins in USD on quantconnect.com☆13Jan 12, 2018Updated 8 years ago
- ☆13Dec 28, 2018Updated 7 years ago
- Using the tensorgo API for TensorFlow Async Model Parallel☆36Oct 8, 2017Updated 8 years ago
- Road to Continous Upgrade☆15Aug 12, 2025Updated 6 months ago
- Fingerprinting Mobile Devices Using Personalized Configurations☆41May 23, 2023Updated 2 years ago
- 各种安全相关思维导图整理收集☆11Sep 7, 2015Updated 10 years ago
- ☆11Dec 10, 2015Updated 10 years ago
- R package to analyze shot group data: shape, precision, and accuracy☆10Aug 7, 2025Updated 6 months ago
- bot analyze openresty plugins☆13May 8, 2019Updated 6 years ago
- Accepted at WWW 25 Industrial Track (oral)☆18Jun 6, 2025Updated 8 months ago
- Online Anomaly Detection for HPC Performance Data☆11Jun 25, 2018Updated 7 years ago
- [AAAI'23] FinalMLP: An Enhanced Two-Stream MLP Model for CTR Prediction https://arxiv.org/abs/2304.00902☆10Apr 9, 2023Updated 2 years ago
- This code is a version of implement of the essay named Deep Inception Networks: A General End-to-End Framework for Multi-asset Quantitati…☆12Mar 15, 2024Updated last year
- ☆31Mar 13, 2018Updated 7 years ago
- ☆13Dec 5, 2022Updated 3 years ago
- ☆45Oct 5, 2025Updated 4 months ago
- C++, rust, julia, python2, and python3 implementations of the Isolation Forest anomaly detection algorithm.☆37Aug 20, 2021Updated 4 years ago