173 items found

Types: Method Availability: On-Line

Filter Results
  • Access required...

    ×

    Method

    Private Cybersecurity NER BERT-base-cased model

    This method includes a Python script and files of a BERT-base-cased model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that...
  • Method

    Cybersecurity NER RoBERTa-base model

    This method includes a Python script and files of a RoBERTa-base model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that will...
    • JSON
      The resource: 'config' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'merges' is not accessible as guest user. You must login to access it!
    • BIN
      The resource: 'model' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'model_args' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'scheduler' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'special_tokens_map' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer_config' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'training_args' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'vocab' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'optimizer' is not accessible as guest user. You must login to access it!
    • py
      The resource: 'inference' is not accessible as guest user. You must login to access it!
  • Method

    Cybersecurity NER SecureBERT model

    This method includes a Python script and files of a SecureBERT model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that will be...
    • JSON
      The resource: 'config' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'merges' is not accessible as guest user. You must login to access it!
    • BIN
      The resource: 'model' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'model_args' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'optimizer' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'scheduler' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'special_tokens_map' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer_config' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'training_args' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'vocab' is not accessible as guest user. You must login to access it!
    • text/x-python
      The resource: 'inference' is not accessible as guest user. You must login to access it!
  • Method

    A Backpack Full of Skills: Egocentric Video Understanding with Diverse Task P...

    Human comprehension of a video stream is naturally broad: in a few instants, we are able to understand what is happening, the relevance and relationship of objects, and...
    • The resource: 'EgoPack' is not accessible as guest user. You must login to access it!
  • Method

    PEM: Prototype-based Efficient MaskFormer for Image Segmentation

    Prototype-based Efficient MaskFormer (PEM) is an efficient transformer-based architecture that can operate in multiple segmentation tasks. PEM proposes a novel prototype-based...
    • The resource: 'PEM' is not accessible as guest user. You must login to access it!
  • Method

    Bringing Online Egocentric Action Recognition into the wild

    To enable a safe and effective human-robot cooperation, it is crucial to develop models for the identification of human activities. Egocentric vision seems to be a viable...
    • The resource: 'EgoWild' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private ltlf2asp

    Linear Temporal Logic over Finite Traces (LTLf) is a popular logic to reason about finite sequences of events. In LTLf, the (bounded) satisfiability problem refers to whether...
  • Access required...

    ×

    Method

    Private Multi-Start Optimization Neural Networks

    In this repository, we publish the codes necessary to implement the Multi-Start Optimization Neural Networks (MSO-NNs), presented fin the paper: Automatic...
  • Method

    Graph-Informed Neural Networks

    In this repository, we publish the codes necessary to implement the Graph-Informed Neural Networks (GINNs), presented for the first time in the paper: Graph-Informed Neural...
    • The resource: 'GINN: Graph-Informed ...' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private Alternate Training for Multi-Task Neural Networks

    In this repository, we publish the code used to implement the Alternate Training through the Epochs (ATE) procedure for training Multi-Task Neural Networks (MTNN) presented in...
  • Access required...

    ×

    Method

    Private Dynamical Linear Upper Confidence Bound (DynLin-UCB)

    The repository contains the code to run DynLin-UCB (Dynamical Linear Upper Confidence Bound). DynLin-UCB is an optimistic regret-minimization algorithm that can be used to...
  • Method

    Online Learning of Order Flow and Market Impact (OLOFMI)

    This library performs regime detection in the aggregated order flow time-series and market impact analysis. The required input file is in the format of the message file of the...
  • Method

    Score-Driven Bayesian Online Change Point Detection (SD-BOCPD)

    This code deals with Bayesian online detection in univariate time-series of changepoints, i.e. abrupt variations in the generative parameters of a data, and regimes, i.e....
  • Method

    Privlib

    Privlib is a Python software package to manage privacy risk and discrimination in tabular and sequential data. It comprises methods to assess privacy risk (PRUDEnce) and...
    • url
      The resource: 'Pip webpage' is not accessible as guest user. You must login to access it!
    • url
      The resource: 'GitHub repository' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'Library files' is not accessible as guest user. You must login to access it!
  • Method

    Debiaser for Multiple Variables (DEMV)

    DEMV is a Debiaser for Multiple Variables that aims to increase Fairness in any given dataset, both binary and categorical, with one or more sensitive variables, while keeping...
    • ipynb
      The resource: 'Tutorial Notebook' is not accessible as guest user. You must login to access it!
  • Method

    Reducing radicalizism in social networks by feeds prioritization - Rebalancin...

    Code and description of the methodology of the paper "Rebalancing Social Feed to Minimize Polarization and Disagreement" funded by SoBigData ++
  • Method

    Gene-specific regularization for COPD partial-correlation estimation

    We introduce a gene-specific regularization factor when computing the Partial Correlation score to make the indeterminate regression feasible. We decided to slightly modify...
  • Method

    A New Topological Approach for the Prediction of Protein-Protein Interactions

    We propose, Maximum-Proteins-Similarity(Topological)": MPS(T). MPS(T) is a topological three-length path method that scores the potential interaction between proteins by...
  • Method

    A hybrid approach for PPI

    We propose a new framework that can exploit topological and biological information to predict protein-protein interactions. The algorithm relies on the underlying hypothesis...
  • Method

    EpiCID: A framework for discovering interactions between SNPs

    Epistatic interactions (EIs) of gene loci often determine complex trait phenotypes. EIs may indicate the underlying molecular mechanisms of multifactorial traits and diseases....
You can also access this registry using the API (see API Docs).