Customs-Fraud-Detection
Customs simulator
A framework for simulating customs fraud detection by integrating machine learning models and data from import declarations.
Simulation framework for customs fraud detection using import declarations.
29 stars
4 watching
4 forks
Language: Jupyter Notebook
last commit: almost 2 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| An implementation of a graph neural network-based fraud detector designed to counter camouflaged fraudsters | 250 |
| Develops a machine learning model to classify and rank customs fraud cases based on transaction-level data and tree-based features | 61 |
| Reproduce experiments and results from a research paper on fraud detection using machine learning algorithms. | 4 |
| A toolbox for building and comparing graph neural network-based fraud detection models | 698 |
| A framework for detecting fraud using a novel neural network approach that learns from benign user data | 24 |
| A toolbox for unsupervised graph-based fraud detection using multiple algorithms and techniques | 131 |
| Maps deception detection techniques to the ATT&CK framework and provides documentation for security professionals | 287 |
| Research on detecting bot install fraud in mobile advertising using machine learning | 1 |
| Develops a survival analysis-based model to detect fraud early | 34 |
| A Docker-based test environment for simulating a Varnish HTTP/2 request smuggling vulnerability | 55 |
| Develops an object segmentation algorithm to detect camouflaged objects in images with varying backgrounds and contexts. | 20 |
| A framework for creating reusable fake objects with persistent behavior after the initial setup | 11 |
| A framework for simulating high-frequency trading and market-making strategies with realistic latency and order book simulations. | 2,066 |
| A collection of pre-built stress simulations for testing Cassandra databases | 4 |
| An open-source network security tool designed to detect and prevent hostile reconnaissance attempts by simulating legitimate machines on a network. | 75 |