期刊文献+

One-Class分类器研究 被引量:37

Overview of Study on One-Class Classifiers
在线阅读 下载PDF
导出
摘要 传统的多类分类问题需要多类样本训练分类器,然而由于样本获取(复杂性或代价)的原因很多情况下只能获取一类样本,故只能利用这一类样本进行学习,形成数据描述从而实现分类,故称之为One-Class分类.鉴于目前单类分类研究存在领域相关方法和通用方法百花齐放的格局,本文首先给出了当前One-Class分类器的研究综述,然后重点针对基于核方法的单类分类器进行分析,将该类方法分为对偶方式和核距离方式两类,并分析各自的特点.最后论文介绍了目前的单类分类器的应用领域,指出其在故障分析、异常检测、疾病诊断和敌我识别等现实问题中的重要作用. In Traditional binary or multiple classification problem of machine learning, each class of samples is necessary for classifier design;however, in some case only one class of samples can be acquired ( due to the complexity or the expensive costs), so we have to learn from the only one class of samples and form the data description for classification. The classification problem is named as one-class classification. Since now there exist the domain-specific and the generic methods, this paper first presents an overview on one-class classification, then emphasizes on the analysis of the kernel-based one-class classifiers and divides this class of methods into two types, that is, dual-based and kernel-induced distance based. Hereafter, the characteristics of these two types of methods are analyzed. Finally, we summarize the implementation techniques and applications of one-class classification in fault analysis, anomaly detection, and disease diagnosis and hostility recognition.
出处 《电子学报》 EI CAS CSCD 北大核心 2009年第11期2496-2503,共8页 Acta Electronica Sinica
基金 国家自然科学基金(No.60603029) 江苏省科学技术发展基金(No.BK2005009 BK2007074)
关键词 单类 核方法 分类器 异常检测 one/single-class kemel methods classifier anomaly detection
  • 相关文献

参考文献42

  • 1Moya M, Koch M, Hostefler L. One-class classifier networks for target recognition applications [ A ]. World Congress on Neural Networks' 93 [ C ]. Portland: International Neural Network Society, 1993.797 - 801.
  • 2Platt J, Scholkopf B, Shawe-Taylor J, et al. Estimating the support of high-dimensional distribution [ R]. Redmond: Microsoft Research, 1999.
  • 3Tax D. One-class classification concept-learning in the absence of counter- examples [D]. Netherlands: Universiteit Delft, 2001.
  • 4Tarassenko L, Hayton P, Brady M. Novelty detection for the identification of masses in mammograms [ A ]. Proc. of the Fourth International IEE Conference on Artificial Neural Networks[ C]. London: IEE press, 1995.442 - 447.
  • 5Chawla A B. Learning from labeled and unlabeled data using graph min-cuts [A]. Proc. 18th International Conference Machine Learning[C]. San Francisco:Morgan Kaufmann Publishers, 2001.19 - 26.
  • 6Bishop C. Neural Networks for Pattern Recognition[M]. New York:Oxford University Press, 1995.
  • 7Sain S R, Gray H L, Woodward W A, et al. Outlier detection from a mixtore distribution when training data are unlabeled [J].Bulletin of the Seismological Society of America, 1999,89 (1):294-304.
  • 8Bishop C. Novelty detection and neural network validation[A]. IEE Proceedings Vision, Image and Signal Processing[C].London: IEE press, 1994.217 - 222.
  • 9Yeung D, Chow C. Parzen-window network intrusion detectors [ A]. Proceedings of the Sixteenth International Conference on Pattern Recognition[C], London: IEE press, 1994. 385 - 388.
  • 10Breunig M M, Kriegel H P, Ng R T, et al. LOF: identifying density-based local outliers[J]. SIGMOD, 2000,29(2) : 93 - 104.

二级参考文献77

  • 1许建华,张学工,李衍达.支持向量机的新发展[J].控制与决策,2004,19(5):481-484. 被引量:132
  • 2潘志松,罗隽,倪桂强,胡谷雨.基于支持向量描述的人工免疫检测算法[J].哈尔滨工程大学学报,2006,27(B07):302-306. 被引量:2
  • 3[1]D Zamboni,E H Spafford.A prototype for a distributed intrusion detection system.Department of Computer Science,Purdue University,Tech Rep:TR98-06,1998
  • 4[2]S Forrest,S A Hofmeyr,A Dayaji.Computer Immunology.Communications of the ACM,1997,40(10):88-96
  • 5[3]A Dayaji,S Hofmeyr,S Forrest.Principles of a computer immune system.New Security Paradigms Workshop,Greece,1997
  • 6[4]C Warrender,S Forrest,B Pearlmutter.Detecting intrusion using system calls:Alternative data models.http://www.cs.unm.edu/~forrest/publications/oakland-with-cite.pdf,2000
  • 7[5]S Forrest,S A Hofmeyr,T A Longstaff.A sense of self for Unix processes.Los Alamitos:IEEE Computer Society Press,1996.120-128
  • 8[6]M Bishop.A standard audit trail format.The 18th National Information Systems Security Conference,Baltimore,l995
  • 9[7]W Lee,S J Stolfo,K W Mok.A data mining framework for building intrusion detection models.The 1999 IEEE Symp on Security and Privacy,Berkely,California,1999
  • 10[8]S Haykin.Neural Networks-A Comprehensive Foundation.Second Edition.Beijing:Tsinghua University Press,2001

共引文献27

同被引文献351

引证文献37

二级引证文献237

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部