-
Best Arm Identification for Stochastic Rising Bandits
We propose two algorithms, R-UCBE and R-SR, performing best arm identification in the stochastic rising bandit setting, thought for modeling the combined algorithm selection... -
Neural Networks for Sparse Grid-Based Discontinuity Detectors
In this repository, we publish the codes necessary to load and use the NN-based discontinuity detectors, presented for the first time in the preprint: Graph-Informed Neural... -
CPG: Constrained Policy Gradient
CPG is a reinforcement learning algorithm thought for solving continuous control problems with user defined or structural constraints. CPG has two versions, C-PGPE and C-PGAE,... -
Privado ML-Link
ML-Link is a novel neural-network-based learning framework for link prediction on (attributed) multilayer networks, whose key idea is to combine (i) pairwise similarities of... -
Onboard deep lossless and near-lossless predictive coding of hyperspectral im...
Code for "Onboard deep lossless and near-lossless predictive coding of hyperspectral images with line-based attention" paper. The method implements a low-complexity neural... -
Privado Neural2PC
Neural2PC is a novel machine-learning approach that finds polarized communities in signed networks. The method explores suboptimal solutions to the relaxed 2PC problem and... -
Privado ASPen: ASP-based Implementation for Collective Entity Resolution
This is an Answer Set Programming (ASP) encoding for LACE, which is a novel declarative approach to Collective Entity Resolution in the classical relational database setting.... -
The ProASP System
ProASP stands as the first compilation-based ASP solver specifically designed to efficiently evaluate ASP programs. Its evaluation techniques address the well-known grounding... -
Privado Cybersecurity NER BERT-base-cased model
This method includes a Python script and files of a BERT-base-cased model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that... -
Cybersecurity NER SecureBERT model
This method includes a Python script and files of a SecureBERT model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that will be...-
JSON
The resource: 'config' is not accessible as guest user. You must login to access it!
-
TXT
The resource: 'merges' is not accessible as guest user. You must login to access it!
-
BIN
The resource: 'model' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'model_args' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'optimizer' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'scheduler' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'special_tokens_map' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'tokenizer' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'tokenizer_config' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'training_args' is not accessible as guest user. You must login to access it!
-
TXT
The resource: 'vocab' is not accessible as guest user. You must login to access it!
-
text/x-python
The resource: 'inference' is not accessible as guest user. You must login to access it!
-
JSON
-
Cybersecurity NER RoBERTa-base model
This method includes a Python script and files of a RoBERTa-base model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that will...-
JSON
The resource: 'config' is not accessible as guest user. You must login to access it!
-
TXT
The resource: 'merges' is not accessible as guest user. You must login to access it!
-
BIN
The resource: 'model' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'model_args' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'scheduler' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'special_tokens_map' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'tokenizer_config' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'training_args' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'tokenizer' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'vocab' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'optimizer' is not accessible as guest user. You must login to access it!
-
py
The resource: 'inference' is not accessible as guest user. You must login to access it!
-
JSON
-
Fuzzy Logic Visual Network (FLVN): A neuro-symbolic approach for visual featu...
Neuro-symbolic integration aims at harnessing the power of symbolic knowledge representation combined with the learning capabilities of deep neural networks. In particular,... -
Privado ltlf2asp
Linear Temporal Logic over Finite Traces (LTLf) is a popular logic to reason about finite sequences of events. In LTLf, the (bounded) satisfiability problem refers to whether... -
Online Learning of Order Flow and Market Impact (OLOFMI)
This library performs regime detection in the aggregated order flow time-series and market impact analysis. The required input file is in the format of the message file of the... -
Score-Driven Bayesian Online Change Point Detection (SD-BOCPD)
This code deals with Bayesian online detection in univariate time-series of changepoints, i.e. abrupt variations in the generative parameters of a data, and regimes, i.e.... -
Reducing radicalizism in social networks by feeds prioritization - Rebalancin...
Code and description of the methodology of the paper "Rebalancing Social Feed to Minimize Polarization and Disagreement" funded by SoBigData ++ -
Epidemic Sentiment Analysis
This tool is a sentiment analysis framework inspired by models of epidemic spreading, which aims to extend sentiment-tagged lexicons. It is easily extendable to multiple... -
Superdiversity and Sentiment
This method analysises the effect of the migration phenomena on the sentiment of a community. Under development. -
Economic Integration Model
This model allows to understand the integration process of immigrants starting from retail data. Under development. -
Modelling Scientific Migration
This method is an adaptation of the general migration models to understand scientific migration. Under development.
