41 items found

Types: Method

Filter Results
  • Access required...

    ×

    Method

    Private GreenBioNet

    The methods contain a benchmarking pipeline for evaluating Graph Neural Networks (GNNs) across performance, energy consumption, and resource usage on heterogeneous hardware...
  • Access required...

    ×

    Method

    Private AutoEncoder-based eXplainable Anomaly Detection (AE-XAD)

    AE-XAD This repository contains the code of the AE-XAD method (authored by Fabrizio Angiulli, Fabio Fassetti, Luca Ferragina and Simona Nisticò). Dataset Dataset classes are...
  • Access required...

    ×

    Method

    Private AE-SAD

    Tensorflow implementation of AE-SAD This repository provides a Tensorflow implementation of the AE-SAD method for (semi-)supervised anomaly detection. Citation and Contact...
  • Access required...

    ×

    Method

    Private Masking Models for Outlier Explanation (M2OE)

    $\text{M}^2 \text{OE}$ - Masking Models for Outlier Explanation This repository provides a Python implementation of the Masking Models for Outlier Explanation ($\text{M}^2...
  • Access required...

    ×

    Method

    Private LatentOut

    Tensorflow Implementation of LatentOut This repository provides a Tensorflow implementation of the LatentOut framework for anomaly detection. It is an extension of VAEOut, an...
  • Method

    AspenPlus: ASP-based Implementation for Collective Entity Resolution with Glo...

    This is an Answer Set Programming (ASP) encoding for LACE+, which is a novel declarative approach to Collective Entity Resolution in the classical relational database setting,...
    • The resource: 'AspenPlus: ASP-based ...' is not accessible as guest user. You must login to access it!
  • Method

    Federated Recursive Ridge Regression

    Official implementation of the Federated Recursive Ridge Regression (Fed3R) and Only Local Labels (OLL) algorithms proposed in the ICML24 accepted paper "Accelerating...
    • The resource: 'Federated Recursive Ridge ...' is not accessible as guest user. You must login to access it!
  • Method

    Best Arm Identification for Stochastic Rising Bandits

    We propose two algorithms, R-UCBE and R-SR, performing best arm identification in the stochastic rising bandit setting, thought for modeling the combined algorithm selection...
    • The resource: 'Best Arm Identification ...' is not accessible as guest user. You must login to access it!
  • Method

    Artificial Graph Dataset Generator

    This Python package generates synthetic graphs with a fixed graph edit distance. The generated datasets can be used to robustly train deep learning algorithms to compute the...
    • The resource: 'Once_All_MCMC_Samplers' is not accessible as guest user. You must login to access it!
  • Method

    ErNESTO-gym

    Standardized micro-grid environment for reinforcement learning experiments employing real-world datasets regarding energy consumption, generation, and market.
    • .zip
      The resource: 'ErNESTO-gym' is not accessible as guest user. You must login to access it!
  • Method

    Neural Networks for Sparse Grid-Based Discontinuity Detectors

    In this repository, we publish the codes necessary to load and use the NN-based discontinuity detectors, presented for the first time in the preprint: Graph-Informed Neural...
    • The resource: 'Neural Networks for Sparse ...' is not accessible as guest user. You must login to access it!
  • Method

    CPG: Constrained Policy Gradient

    CPG is a reinforcement learning algorithm thought for solving continuous control problems with user defined or structural constraints. CPG has two versions, C-PGPE and C-PGAE,...
    • The resource: 'CPG: Constrained Policy ...' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private ML-Link

    ML-Link is a novel neural-network-based learning framework for link prediction on (attributed) multilayer networks, whose key idea is to combine (i) pairwise similarities of...
  • Access required...

    ×

    Method

    Private Neural2PC

    Neural2PC is a novel machine-learning approach that finds polarized communities in signed networks. The method explores suboptimal solutions to the relaxed 2PC problem and...
  • Access required...

    ×

    Method

    Private ASPen: ASP-based Implementation for Collective Entity Resolution

    This is an Answer Set Programming (ASP) encoding for LACE, which is a novel declarative approach to Collective Entity Resolution in the classical relational database setting....
  • Method

    The ProASP System

    ProASP stands as the first compilation-based ASP solver specifically designed to efficiently evaluate ASP programs. Its evaluation techniques address the well-known grounding...
    • The resource: 'The ProASP System' is not accessible as guest user. You must login to access it!
  • Method

    Fuzzy Logic Visual Network (FLVN): A neuro-symbolic approach for visual featu...

    Neuro-symbolic integration aims at harnessing the power of symbolic knowledge representation combined with the learning capabilities of deep neural networks. In particular,...
    • The resource: 'Fuzzy Logic Visual Network ...' is not accessible as guest user. You must login to access it!
  • Method

    PEM: Prototype-based Efficient MaskFormer for Image Segmentation

    Prototype-based Efficient MaskFormer (PEM) is an efficient transformer-based architecture that can operate in multiple segmentation tasks. PEM proposes a novel prototype-based...
    • The resource: 'PEM' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private ltlf2asp

    Linear Temporal Logic over Finite Traces (LTLf) is a popular logic to reason about finite sequences of events. In LTLf, the (bounded) satisfiability problem refers to whether...
  • Access required...

    ×

    Method

    Private Cybersecurity NER BERT-base-cased model

    This method includes a Python script and files of a BERT-base-cased model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that...