102 items found

Types: Method Licenses: Academic Free License 3.0

Filter Results
  • Access required...

    ×

    Method

    Private LatentOut

    Tensorflow Implementation of LatentOut This repository provides a Tensorflow implementation of the LatentOut framework for anomaly detection. It is an extension of VAEOut, an...
  • Access required...

    ×

    Method

    Private AutoEncoder-based eXplainable Anomaly Detection (AE-XAD)

    AE-XAD This repository contains the code of the AE-XAD method (authored by Fabrizio Angiulli, Fabio Fassetti, Luca Ferragina and Simona Nisticò). Dataset Dataset classes are...
  • Access required...

    ×

    Method

    Private AE-SAD

    Tensorflow implementation of AE-SAD This repository provides a Tensorflow implementation of the AE-SAD method for (semi-)supervised anomaly detection. Citation and Contact...
  • Method

    AspenPlus: ASP-based Implementation for Collective Entity Resolution with Glo...

    This is an Answer Set Programming (ASP) encoding for LACE+, which is a novel declarative approach to Collective Entity Resolution in the classical relational database setting,...
    • The resource: 'AspenPlus: ASP-based ...' is not accessible as guest user. You must login to access it!
  • Method

    CPG: Constrained Policy Gradient

    CPG is a reinforcement learning algorithm thought for solving continuous control problems with user defined or structural constraints. CPG has two versions, C-PGPE and C-PGAE,...
    • The resource: 'CPG: Constrained Policy ...' is not accessible as guest user. You must login to access it!
  • Method

    Best Arm Identification for Stochastic Rising Bandits

    We propose two algorithms, R-UCBE and R-SR, performing best arm identification in the stochastic rising bandit setting, thought for modeling the combined algorithm selection...
    • The resource: 'Best Arm Identification ...' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private Neural2PC

    Neural2PC is a novel machine-learning approach that finds polarized communities in signed networks. The method explores suboptimal solutions to the relaxed 2PC problem and...
  • Access required...

    ×

    Method

    Private ML-Link

    ML-Link is a novel neural-network-based learning framework for link prediction on (attributed) multilayer networks, whose key idea is to combine (i) pairwise similarities of...
  • Method

    Neural Networks for Sparse Grid-Based Discontinuity Detectors

    In this repository, we publish the codes necessary to load and use the NN-based discontinuity detectors, presented for the first time in the preprint: Graph-Informed Neural...
    • The resource: 'Neural Networks for Sparse ...' is not accessible as guest user. You must login to access it!
  • Method

    Onboard deep lossless and near-lossless predictive coding of hyperspectral im...

    Code for "Onboard deep lossless and near-lossless predictive coding of hyperspectral images with line-based attention" paper. The method implements a low-complexity neural...
    • The resource: 'Github' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private neuroAnDetect

    Semi-supervised approach to anomaly detection for neuro-imaging. The method generates segmentation of abnormal tissues that can be used to support medical reporting. The...
  • Access required...

    ×

    Method

    Private ASPen: ASP-based Implementation for Collective Entity Resolution

    This is an Answer Set Programming (ASP) encoding for LACE, which is a novel declarative approach to Collective Entity Resolution in the classical relational database setting....
  • Method

    The ProASP System

    ProASP stands as the first compilation-based ASP solver specifically designed to efficiently evaluate ASP programs. Its evaluation techniques address the well-known grounding...
    • The resource: 'The ProASP System' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private Cybersecurity NER BERT-base-cased model

    This method includes a Python script and files of a BERT-base-cased model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that...
  • Method

    Cybersecurity NER RoBERTa-base model

    This method includes a Python script and files of a RoBERTa-base model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that will...
    • JSON
      The resource: 'config' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'merges' is not accessible as guest user. You must login to access it!
    • BIN
      The resource: 'model' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'model_args' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'scheduler' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'special_tokens_map' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer_config' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'training_args' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'vocab' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'optimizer' is not accessible as guest user. You must login to access it!
    • py
      The resource: 'inference' is not accessible as guest user. You must login to access it!
  • Method

    Cybersecurity NER SecureBERT model

    This method includes a Python script and files of a SecureBERT model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that will be...
    • JSON
      The resource: 'config' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'merges' is not accessible as guest user. You must login to access it!
    • BIN
      The resource: 'model' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'model_args' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'optimizer' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'scheduler' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'special_tokens_map' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer_config' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'training_args' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'vocab' is not accessible as guest user. You must login to access it!
    • text/x-python
      The resource: 'inference' is not accessible as guest user. You must login to access it!
  • Method

    Fuzzy Logic Visual Network (FLVN): A neuro-symbolic approach for visual featu...

    Neuro-symbolic integration aims at harnessing the power of symbolic knowledge representation combined with the learning capabilities of deep neural networks. In particular,...
    • The resource: 'Fuzzy Logic Visual Network ...' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private ltlf2asp

    Linear Temporal Logic over Finite Traces (LTLf) is a popular logic to reason about finite sequences of events. In LTLf, the (bounded) satisfiability problem refers to whether...
  • Method

    Online Learning of Order Flow and Market Impact (OLOFMI)

    This library performs regime detection in the aggregated order flow time-series and market impact analysis. The required input file is in the format of the message file of the...
  • Method

    Score-Driven Bayesian Online Change Point Detection (SD-BOCPD)

    This code deals with Bayesian online detection in univariate time-series of changepoints, i.e. abrupt variations in the generative parameters of a data, and regimes, i.e....
You can also access this registry using the API (see API Docs).