-
Single-image super-resolution microscopy
A deep learning pre-trained model based on the Enhanced Super Resolution Generative Adversarial Network (ESRGAN) is used to obtain a Super-Resolution (SR) image from a...-
ZIP
The resource: 'Single-image-super-resoluti ...' is not accessible as guest user. You must login to access it!
-
ZIP
-
Private jointfusion_hackathon
A joint fusion DL model was developed to predict ASD from structural and functional connectome brain features extracted form the ABIDE MRI and fMRI datasets. The DL algorithm... -
Private bone age assessment
The goal this DL model is to predict the age of a subject by looking at his/her X-ray image of the hand. This DL algorithm was developed to address a challenge posed on thee... -
AGC: Autism Graph Classifier
AGC is designed to support the processing and analysis of brain connectivity data by leveraging standard outputs from widely used neuroimaging pipelines such as CPAC and...-
ZIP
The resource: 'autism-graph-classifier-main' is not accessible as guest user. You must login to access it!
-
ZIP
-
Private GreenBioNet
The methods contain a benchmarking pipeline for evaluating Graph Neural Networks (GNNs) across performance, energy consumption, and resource usage on heterogeneous hardware... -
Private LatentOut
Tensorflow Implementation of LatentOut This repository provides a Tensorflow implementation of the LatentOut framework for anomaly detection. It is an extension of VAEOut, an... -
Private AutoEncoder-based eXplainable Anomaly Detection (AE-XAD)
AE-XAD This repository contains the code of the AE-XAD method (authored by Fabrizio Angiulli, Fabio Fassetti, Luca Ferragina and Simona Nisticò). Dataset Dataset classes are... -
Private AE-SAD
Tensorflow implementation of AE-SAD This repository provides a Tensorflow implementation of the AE-SAD method for (semi-)supervised anomaly detection. Citation and Contact... -
AspenPlus: ASP-based Implementation for Collective Entity Resolution with Glo...
This is an Answer Set Programming (ASP) encoding for LACE+, which is a novel declarative approach to Collective Entity Resolution in the classical relational database setting,... -
CPG: Constrained Policy Gradient
CPG is a reinforcement learning algorithm thought for solving continuous control problems with user defined or structural constraints. CPG has two versions, C-PGPE and C-PGAE,... -
Best Arm Identification for Stochastic Rising Bandits
We propose two algorithms, R-UCBE and R-SR, performing best arm identification in the stochastic rising bandit setting, thought for modeling the combined algorithm selection... -
Private Neural2PC
Neural2PC is a novel machine-learning approach that finds polarized communities in signed networks. The method explores suboptimal solutions to the relaxed 2PC problem and... -
Private ML-Link
ML-Link is a novel neural-network-based learning framework for link prediction on (attributed) multilayer networks, whose key idea is to combine (i) pairwise similarities of... -
Neural Networks for Sparse Grid-Based Discontinuity Detectors
In this repository, we publish the codes necessary to load and use the NN-based discontinuity detectors, presented for the first time in the preprint: Graph-Informed Neural... -
Onboard deep lossless and near-lossless predictive coding of hyperspectral im...
Code for "Onboard deep lossless and near-lossless predictive coding of hyperspectral images with line-based attention" paper. The method implements a low-complexity neural... -
Private neuroAnDetect
Semi-supervised approach to anomaly detection for neuro-imaging. The method generates segmentation of abnormal tissues that can be used to support medical reporting. The... -
Private ASPen: ASP-based Implementation for Collective Entity Resolution
This is an Answer Set Programming (ASP) encoding for LACE, which is a novel declarative approach to Collective Entity Resolution in the classical relational database setting.... -
The ProASP System
ProASP stands as the first compilation-based ASP solver specifically designed to efficiently evaluate ASP programs. Its evaluation techniques address the well-known grounding... -
Private Cybersecurity NER BERT-base-cased model
This method includes a Python script and files of a BERT-base-cased model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that... -
Cybersecurity NER RoBERTa-base model
This method includes a Python script and files of a RoBERTa-base model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that will...-
JSON
The resource: 'config' is not accessible as guest user. You must login to access it!
-
TXT
The resource: 'merges' is not accessible as guest user. You must login to access it!
-
BIN
The resource: 'model' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'model_args' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'scheduler' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'special_tokens_map' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'tokenizer_config' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'training_args' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'tokenizer' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'vocab' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'optimizer' is not accessible as guest user. You must login to access it!
-
py
The resource: 'inference' is not accessible as guest user. You must login to access it!
-
JSON
