zwpride / lemurView external linksLinks
[ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging
☆13Mar 27, 2025Updated 10 months ago
Alternatives and similar repositories for lemur
Users that are interested in lemur are comparing it to the libraries listed below
Sorting:
- ☆10Dec 30, 2020Updated 5 years ago
- ☆12Aug 4, 2018Updated 7 years ago
- ☆16Jul 7, 2025Updated 7 months ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- Log anomaly detection based on MogrifierLSTM + CNN☆14Apr 23, 2022Updated 3 years ago
- Source code for GTrace (ESEC/FSE'23 industry track).☆11Mar 1, 2024Updated last year
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- ☆13Mar 25, 2022Updated 3 years ago
- Code for ICML 2022 paper: Achieving Fairness at No Utility Cost via Data Reweighing with Influence☆11Aug 3, 2022Updated 3 years ago
- malicious bash scripts☆10Apr 3, 2022Updated 3 years ago
- A Controllable Model of Grounded Response Generation (AAAI 21)☆13Oct 25, 2022Updated 3 years ago
- 蚂蚁金融自然语言处理竞赛。☆10Sep 3, 2018Updated 7 years ago
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated last year
- A Guide for Encode Categorical Variables, with implementations and examples in Python.☆11Sep 9, 2020Updated 5 years ago
- The official repository for the paper entitled "Time Travel in LLMs: Tracing Data Contamination in Large Language Models."☆12Jun 11, 2024Updated last year
- Train Ticket - A Benchmark Microservice System☆14Updated this week
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- A Static Sensitive Subgraph-based Feature for Android Malware Detection☆11Aug 27, 2021Updated 4 years ago
- AES文件加密解密☆10Apr 26, 2023Updated 2 years ago
- ☆21Apr 1, 2025Updated 10 months ago
- Implementation of A New Burrows Wheeler Transform Markov Distance☆12Apr 19, 2020Updated 5 years ago
- Nopeek experiments☆14Jun 12, 2020Updated 5 years ago
- A python powered normalized compression distance (NCD) calculator.☆13Jan 26, 2016Updated 10 years ago
- FEM micromagnetic simulator☆11Feb 6, 2026Updated last week
- JiuZhou: Open Foundation Language Models for Geoscience☆12Jun 19, 2025Updated 7 months ago
- [ICLR 2026] The official implementation of the paper "MLP Memory: A Retriever-Pretrained Memory for Large Language Models".☆46Jan 28, 2026Updated 2 weeks ago
- Implementation of the DPD architecture and related experiments for the ACL 2024 paper "Semisupervised Neural Proto-Language Reconstructio…☆11Jul 22, 2024Updated last year
- An experiment with modern C++, suffix trees, and Ukkonen's algorithm for suffix tree construction.☆12Mar 15, 2019Updated 6 years ago
- MATLAB toolbox for performing modal analysis using experimental data☆11Jun 23, 2022Updated 3 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- Typescript 5 + Vue 3.x + Vite 5.x + Naiveui boilerplate☆12Dec 15, 2024Updated last year
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- Audit du SMSI selon l'ISO 27001☆13Feb 23, 2022Updated 3 years ago
- Simple MATLAB toolbox for deep learning network: Version 1.0.3☆16Apr 16, 2019Updated 6 years ago
- This is a recommended paper list for the course of Privacy Computing.☆10Mar 26, 2024Updated last year
- ☆13May 24, 2025Updated 8 months ago
- Practical String Searching☆12Dec 20, 2019Updated 6 years ago
- ☆13Aug 31, 2024Updated last year
- This repository is the tutorial for the IsitObservable Episode on Fluentd☆11May 7, 2025Updated 9 months ago