xiaomingaaa / GNNApp-PapersView external linksLinks
Listing the research works related to risk control based on GNN and its interpretability. 1. we can learn the application of GNN in risk control (including fraud detection). 2. For possible prediction, we can use the interpretability of GNN to explaine how can we get such results.
☆12Sep 24, 2021Updated 4 years ago
Alternatives and similar repositories for GNNApp-Papers
Users that are interested in GNNApp-Papers are comparing it to the libraries listed below
Sorting:
- Fraud detection using Graph Convolutional Networks☆13May 9, 2022Updated 3 years ago
- ☆37Jul 2, 2022Updated 3 years ago
- Repository containing the official code for the paper Graph-based Modeling of Online Communities for Fake News Detection.☆22Sep 25, 2020Updated 5 years ago
- ☆31Jun 1, 2022Updated 3 years ago
- Group review spammer detection☆10Sep 9, 2019Updated 6 years ago
- Issues tracker and feedback project for the SAS coding assistant☆12Jan 13, 2026Updated last month
- Code for Deep Anomaly Detection on Attributed Networks (SDM2019)☆133Sep 13, 2021Updated 4 years ago
- TKDE'22-GraphCAD: https://arxiv.org/pdf/2108.07516.pdf☆33Oct 2, 2022Updated 3 years ago
- This repository contains the code used in the experimental setup of the paper 'Inductive Graph Representation Learning for Fraud Detectio…☆34May 20, 2023Updated 2 years ago
- ANOMULY is a general, unsupervised edge anomaly detection framework for multiplex dynamic networks.☆11May 19, 2023Updated 2 years ago
- An example project for training a GraphSAGE Model, and setup a Real-time Fraud Detection Web Service(Frontend and Backend) with NebulaGra…☆39Aug 6, 2022Updated 3 years ago
- TNNLS: A Synergistic Approach for Graph Anomaly Detection with Pattern Mining and Feature Learning; CIKM'20: Error-bounded Graph Anomaly …☆43Jul 6, 2023Updated 2 years ago
- Fast Vector Operations on Pretty Big Data☆13Nov 17, 2015Updated 10 years ago
- ☆15Mar 3, 2025Updated 11 months ago
- Plotting the Optimal Route in Python for Data Scientists using the Dijkstra Algorithm☆12Feb 26, 2023Updated 2 years ago
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated last year
- Import OpenStreetMap network and make it available to pgRouting. Take care of updates.☆12Feb 3, 2020Updated 6 years ago
- Code samples and materials for network analysis and network optimization with SAS or SAS Viya.☆13Jan 30, 2026Updated 2 weeks ago
- RGCN model for real-time fraud detection☆11Jan 27, 2023Updated 3 years ago
- ☆10Nov 9, 2022Updated 3 years ago
- Some code and extra information about the paper "Continued pre-training of LLMs for Portuguese and Government domain: A proposal for prod…☆10Mar 9, 2024Updated last year
- ☆11Dec 30, 2021Updated 4 years ago
- Re-implementation of Exploiting Edge Features in Graph Neural Networks☆11Apr 7, 2022Updated 3 years ago
- ☆21Jul 12, 2025Updated 7 months ago
- code for paper RoSGAS: Adaptive Social Bot Detection with Reinforced Self-Supervised GNN Architecture Search☆11Jun 25, 2023Updated 2 years ago
- Neural Capture of Animatable 3D Human from Monocular Video(ECCV 2022)☆11Jul 19, 2022Updated 3 years ago
- Bayesian Graph Neural Networks☆12Sep 10, 2021Updated 4 years ago
- [WSDM 2024] GAD-NR : Graph Anomaly Detection via Neighborhood Reconstruction☆55Nov 22, 2024Updated last year
- Prism.JS theme based on monokai☆13Dec 11, 2015Updated 10 years ago
- ☆10Mar 31, 2022Updated 3 years ago
- Bot Detection in Social Media Accounts: In social media (Facebook, twitter, Instagram) there are multiple bot accounts used by various p…☆12Jul 20, 2020Updated 5 years ago
- Repository for the FIFAR dataset, published in ICAIF '23 - Synthetic Data Workshop☆12Dec 18, 2025Updated last month
- Source code of FedAttack.☆11Feb 9, 2022Updated 4 years ago
- ☆10Jun 29, 2022Updated 3 years ago
- Seq-HGNN: Learning Sequential Node Representation on Heterogeneous Graph☆13Aug 2, 2023Updated 2 years ago
- A BPM Suite demo displaying interaction from a BPM process with rules, web services, and human tasks to evaluate an application to buy a …☆15Nov 10, 2017Updated 8 years ago
- Experimental encrypted file system using SGX and FUSE☆12Oct 9, 2018Updated 7 years ago
- Code for the paper submission: "Modelling graph dynamics in fraud detection with ``Attention""☆11Feb 10, 2022Updated 4 years ago
- ☆10Dec 8, 2021Updated 4 years ago