alibi-detect
Data detector library
A Python library for detecting outliers, adversarial examples, and data drift in various types of data
Algorithms for outlier, adversarial and drift detection
2k stars
41 watching
225 forks
Language: Jupyter Notebook
last commit: 11 months ago
Linked from 3 awesome lists
adversarialanomalyconcept-driftdata-driftdetectiondrift-detectionimagesoutliersemi-supervised-learningtabular-datatexttime-seriesunsupervised-learning
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | An end-to-end outlier detection system that integrates machine learning algorithms with database support | 252 |
| | A Python framework for accelerating large-scale unsupervised outlier detection in heterogeneous datasets | 382 |
| | An automated system for detecting outliers in time-series data using machine learning algorithms and human expertise. | 1,484 |
| | An open-source library for training and evaluating graph anomaly detection models | 64 |
| | A Python library that detects drifts in machine learning systems | 197 |
| | A deep learning library for image segmentation and object detection using PyTorch. | 1,054 |
| | A Python library for extracting, comparing and evaluating communities from complex networks | 379 |
| | Detects anomalies in graph data using various algorithms | 1,350 |
| | A dataset and benchmarking framework to evaluate the performance of question answering models on detecting and mitigating social biases. | 92 |
| | Lane detection algorithm for CARLA simulator using Python | 80 |
| | An application of object detection to simulate traffic signs/lights and cars in the Carla simulator environment | 5 |
| | A library for detecting anomalies and calculating correlations in time series data. | 1,193 |
| | An analytics library developed in Python to detect adversary behaviors using the Event Query Language (EQL) syntax | 158 |
| | A Python interface to YOLO object detection software using Darknet | 27 |
| | Automated tool to detect errors in security monitoring and measure effectiveness of SIEM rules against various behaviors. | 53 |