distribution-cheatsheet📈📄👀A lookup repo for a variety of discrete and continuous distributions (incl. Beta, Binomial, Cauchy, Chi-squared, Geometric, Hypergeometric, Normal & Poisson)
Stars: ✭ 43 (+48.28%)
MemStreamMemStream: Memory-Based Streaming Anomaly Detection
Stars: ✭ 58 (+100%)
deepADDetection of Accounting Anomalies in the Latent Space using Adversarial Autoencoder Neural Networks - A lab we prepared for the KDD'19 Workshop on Anomaly Detection in Finance that will walk you through the detection of interpretable accounting anomalies using adversarial autoencoder neural networks. The majority of the lab content is based on J…
Stars: ✭ 65 (+124.14%)
PyodA Python Toolbox for Scalable Outlier Detection (Anomaly Detection)
Stars: ✭ 5,083 (+17427.59%)
DGFraud-TF2A Deep Graph-based Toolbox for Fraud Detection in TensorFlow 2.X
Stars: ✭ 84 (+189.66%)
diet-raspbianDEPRECATED - Trim the fat from the default Raspbian image.
Stars: ✭ 32 (+10.34%)
keystroke-dynamicsDemo to show keystroke dynamics / keystroke biometrics
Stars: ✭ 25 (-13.79%)
Meta-GDN AnomalyDetectionImplementation of TheWebConf 2021 -- Few-shot Network Anomaly Detection via Cross-network Meta-learning
Stars: ✭ 22 (-24.14%)
anomaly-segThe Combined Anomalous Object Segmentation (CAOS) Benchmark
Stars: ✭ 115 (+296.55%)
xgboost-smote-detect-fraudCan we predict accurately on the skewed data? What are the sampling techniques that can be used. Which models/techniques can be used in this scenario? Find the answers in this code pattern!
Stars: ✭ 59 (+103.45%)
Calinix-ArchCalinixOS Linux Distribution ISO Profiles
Stars: ✭ 42 (+44.83%)
burritoWrap your application in a BEAM Burrito!
Stars: ✭ 465 (+1503.45%)
cortex📝 A headless, multitenant dynamic content platform powered by Rails, GraphQL and Elasticsearch
Stars: ✭ 28 (-3.45%)
Anomaly Detectionanomaly detection with anomalize and Google Trends data
Stars: ✭ 38 (+31.03%)
ailia-modelsThe collection of pre-trained, state-of-the-art AI models for ailia SDK
Stars: ✭ 1,102 (+3700%)
FARED for Anomaly DetectionOfficial source code of "Fast Adaptive RNN Encoder-Decoder for Anomaly Detection in SMD Assembly Machine"
Stars: ✭ 14 (-51.72%)
zipappsPackage your python code into a executable zip file (with the requirements). For Python3.6+
Stars: ✭ 38 (+31.03%)
detection-rulesThreat Detection & Anomaly Detection rules for popular open-source components
Stars: ✭ 34 (+17.24%)
bower-distA bower build for FineUploader/fine-uploader
Stars: ✭ 18 (-37.93%)
RTFMOfficial code for 'Weakly-supervised Video Anomaly Detection with Robust Temporal Feature Magnitude Learning' [ICCV 2021]
Stars: ✭ 216 (+644.83%)
anomagramInteractive Visualization to Build, Train and Test an Autoencoder with Tensorflow.js
Stars: ✭ 152 (+424.14%)
TabFormerCode & Data for "Tabular Transformers for Modeling Multivariate Time Series" (ICASSP, 2021)
Stars: ✭ 209 (+620.69%)
PANDAPANDA: Adapting Pretrained Features for Anomaly Detection and Segmentation (CVPR 2021)
Stars: ✭ 64 (+120.69%)
missComparemissCompare R package - intuitive missing data imputation framework
Stars: ✭ 31 (+6.9%)
distributionSiddhi streaming runtime and tooling distribution
Stars: ✭ 22 (-24.14%)
deviation-networkSource code of the KDD19 paper "Deep anomaly detection with deviation networks", weakly/partially supervised anomaly detection, few-shot anomaly detection
Stars: ✭ 94 (+224.14%)
XGBODSupplementary material for IJCNN paper "XGBOD: Improving Supervised Outlier Detection with Unsupervised Representation Learning"
Stars: ✭ 59 (+103.45%)
celosCelOS is a simple, easy-to-use, flatpak centric Linux distribution for everyone based on Ubuntu 20.04.
Stars: ✭ 18 (-37.93%)
Fraud-AnalysisInsurance fraud claims analysis project
Stars: ✭ 37 (+27.59%)
trafficA quick and dirty vehicle speed detector using video + anomaly detection
Stars: ✭ 21 (-27.59%)
deviation-network-imageOfficial PyTorch implementation of the paper “Explainable Deep Few-shot Anomaly Detection with Deviation Networks”, weakly/partially supervised anomaly detection, few-shot anomaly detection, image defect detection.
Stars: ✭ 47 (+62.07%)
tezos-reward-distributorTezos Reward Distributor (TRD): A reward distribution software for tezos bakers.
Stars: ✭ 80 (+175.86%)
sherlockSherlock is an anomaly detection service built on top of Druid
Stars: ✭ 137 (+372.41%)
DigitalCellSorterDigital Cell Sorter (DCS): single cell RNA-seq analysis toolkit. Documentation:
Stars: ✭ 19 (-34.48%)
CCDCode for 'Constrained Contrastive Distribution Learning for Unsupervised Anomaly Detection and Localisation in Medical Images' [MICCAI 2021]
Stars: ✭ 30 (+3.45%)
tilitools[ti]ny [li]ttle machine learning [tool]box - Machine learning, anomaly detection, one-class classification, and structured output prediction
Stars: ✭ 40 (+37.93%)
msdaLibrary for multi-dimensional, multi-sensor, uni/multivariate time series data analysis, unsupervised feature selection, unsupervised deep anomaly detection, and prototype of explainable AI for anomaly detector
Stars: ✭ 80 (+175.86%)
wheyA simple Python wheel builder for simple projects.
Stars: ✭ 17 (-41.38%)
enmSdmFaster, better, smarter ecological niche modeling and species distribution modeling
Stars: ✭ 39 (+34.48%)
BagelIPCCC 2018: Robust and Unsupervised KPI Anomaly Detection Based on Conditional Variational Autoencoder
Stars: ✭ 45 (+55.17%)
CARE-GNNCode for CIKM 2020 paper Enhancing Graph Neural Network-based Fraud Detectors against Camouflaged Fraudsters
Stars: ✭ 121 (+317.24%)
ind knn adIndustrial knn-based anomaly detection for images. Visit streamlit link to check out the demo.
Stars: ✭ 102 (+251.72%)
IDVerification"Very simple but works well" Computer Vision based ID verification solution provided by LibraX.
Stars: ✭ 44 (+51.72%)
anomalibAn anomaly detection library comprising state-of-the-art algorithms and features such as experiment management, hyper-parameter optimization, and edge inference.
Stars: ✭ 1,210 (+4072.41%)
awesome-time-seriesResources for working with time series and sequence data
Stars: ✭ 178 (+513.79%)
A-Detector⭐ An anomaly-based intrusion detection system.
Stars: ✭ 69 (+137.93%)
SentryPeerA distributed peer to peer list of bad actor IP addresses and phone numbers collected via a SIP Honeypot.
Stars: ✭ 108 (+272.41%)