-
Private GreenBioNet
The methods contain a benchmarking pipeline for evaluating Graph Neural Networks (GNNs) across performance, energy consumption, and resource usage on heterogeneous hardware... -
Private AutoEncoder-based eXplainable Anomaly Detection (AE-XAD)
AE-XAD This repository contains the code of the AE-XAD method (authored by Fabrizio Angiulli, Fabio Fassetti, Luca Ferragina and Simona Nisticò). Dataset Dataset classes are... -
Private AE-SAD
Tensorflow implementation of AE-SAD This repository provides a Tensorflow implementation of the AE-SAD method for (semi-)supervised anomaly detection. Citation and Contact... -
Private Masking Models for Outlier Explanation (M2OE)
$\text{M}^2 \text{OE}$ - Masking Models for Outlier Explanation This repository provides a Python implementation of the Masking Models for Outlier Explanation ($\text{M}^2... -
Private LatentOut
Tensorflow Implementation of LatentOut This repository provides a Tensorflow implementation of the LatentOut framework for anomaly detection. It is an extension of VAEOut, an... -
Artificial Graph Dataset Generator
This Python package generates synthetic graphs with a fixed graph edit distance. The generated datasets can be used to robustly train deep learning algorithms to compute the... -
Neural Networks for Sparse Grid-Based Discontinuity Detectors
In this repository, we publish the codes necessary to load and use the NN-based discontinuity detectors, presented for the first time in the preprint: Graph-Informed Neural... -
Private ML-Link
ML-Link is a novel neural-network-based learning framework for link prediction on (attributed) multilayer networks, whose key idea is to combine (i) pairwise similarities of... -
Private Neural2PC
Neural2PC is a novel machine-learning approach that finds polarized communities in signed networks. The method explores suboptimal solutions to the relaxed 2PC problem and... -
Private ASPen: ASP-based Implementation for Collective Entity Resolution
This is an Answer Set Programming (ASP) encoding for LACE, which is a novel declarative approach to Collective Entity Resolution in the classical relational database setting.... -
Private ltlf2asp
Linear Temporal Logic over Finite Traces (LTLf) is a popular logic to reason about finite sequences of events. In LTLf, the (bounded) satisfiability problem refers to whether... -
Private Cybersecurity NER BERT-base-cased model
This method includes a Python script and files of a BERT-base-cased model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that... -
Cybersecurity NER SecureBERT model
This method includes a Python script and files of a SecureBERT model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that will be...-
JSON
The resource: 'config' is not accessible as guest user. You must login to access it!
-
TXT
The resource: 'merges' is not accessible as guest user. You must login to access it!
-
BIN
The resource: 'model' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'model_args' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'optimizer' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'scheduler' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'special_tokens_map' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'tokenizer' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'tokenizer_config' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'training_args' is not accessible as guest user. You must login to access it!
-
TXT
The resource: 'vocab' is not accessible as guest user. You must login to access it!
-
text/x-python
The resource: 'inference' is not accessible as guest user. You must login to access it!
-
JSON
-
Cybersecurity NER RoBERTa-base model
This method includes a Python script and files of a RoBERTa-base model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that will...-
JSON
The resource: 'config' is not accessible as guest user. You must login to access it!
-
TXT
The resource: 'merges' is not accessible as guest user. You must login to access it!
-
BIN
The resource: 'model' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'model_args' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'scheduler' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'special_tokens_map' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'tokenizer_config' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'training_args' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'tokenizer' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'vocab' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'optimizer' is not accessible as guest user. You must login to access it!
-
py
The resource: 'inference' is not accessible as guest user. You must login to access it!
-
JSON
-
Private Dynamical Linear Upper Confidence Bound (DynLin-UCB)
The repository contains the code to run DynLin-UCB (Dynamical Linear Upper Confidence Bound). DynLin-UCB is an optimistic regret-minimization algorithm that can be used to... -
Online Learning of Order Flow and Market Impact (OLOFMI)
This library performs regime detection in the aggregated order flow time-series and market impact analysis. The required input file is in the format of the message file of the... -
Score-Driven Bayesian Online Change Point Detection (SD-BOCPD)
This code deals with Bayesian online detection in univariate time-series of changepoints, i.e. abrupt variations in the generative parameters of a data, and regimes, i.e.... -
Debiaser for Multiple Variables (DEMV)
DEMV is a Debiaser for Multiple Variables that aims to increase Fairness in any given dataset, both binary and categorical, with one or more sensitive variables, while keeping...-
ipynb
The resource: 'Tutorial Notebook' is not accessible as guest user. You must login to access it!
-
ipynb
-
Reducing radicalizism in social networks by feeds prioritization - Rebalancin...
Code and description of the methodology of the paper "Rebalancing Social Feed to Minimize Polarization and Disagreement" funded by SoBigData ++
