期刊文献+

基于改进生成对抗网络的供应链数据异常识别模型研究

SUPPLY CHAIN DATA ANOMALY IDENTIFICATION MODEL BASED ON IMPROVED GAN
在线阅读 下载PDF
导出
摘要 针对供应链数据设计一种基于改进GAN(Generative Adversarial Network)的异常识别模型。运用联合分布和多配对样本Friedman检验对供应链数据进行探索性分析。针对数据特性进行异常检测,为了捕捉数据的时间相关性,利用LSTM(Long Short-Term Memory)作为生成器和判别器的基础模型,并在生成器中用Cycle Consistency损失防止编码器和解码器矛盾,判别器中用Wasserstein损失克服模式崩溃问题,同时引入非参数动态阈值方法进行优化,进而识别异常。运用精确率、召回率、F1值进行模型评价,并与基线方法进行比较研究。结果表明,该改进模型更贴近供应链数据的实际情况,可增强供应链柔性,具有较高的异常识别性能。 An improved GAN-based anomaly identification model is designed for supply chain data.An exploratory analysis of the supply chain data was carried out using joint distribution and multi-paired sample Friedman test.The anomaly detection was performed with the data characteristics.To capture the temporal correlation of the data,LSTM was used as the base model for the generator and discriminator,and Cycle Consistency loss was used in the generator to prevent encoder and decoder conflicts,and Wasserstein loss was used in the discriminator to overcome the pattern collapse problem,while a non-parametric dynamic thresholding method was introduced for optimization,and thus identifying anomalies.The model was evaluated using accuracy,recall and F1 values and studied in comparison with the baseline method.The results show that the improved model is closer to the actual situation of supply chain data,can enhance supply chain flexibility and has high anomaly identification performance.
作者 邹昕彤 金辉 Zou Xintong;Jin Hui(School of Automobile and Traffic Engineering,Liaoning University of Technology,Jinzhou 121000,Liaoning,China)
出处 《计算机应用与软件》 北大核心 2025年第7期107-110,174,共5页 Computer Applications and Software
关键词 数据分析 异常值识别 TadGAN 非参数动态阈值 Data analysis Outlier identification TadGAN Nonparametric dynamic thresholding
  • 相关文献

参考文献11

二级参考文献95

  • 1李卉,何晶,程富强,王晓薇,詹炳光.基于LSTM模型的卫星电源系统异常检测方法[J].装甲兵工程学院学报,2019,33(3):90-96. 被引量:3
  • 2宋明顺.宋明顺:未来标准化发展趋势之我见[J].中国标准化,2021(1):23-24. 被引量:6
  • 3姜奇平.新金融秩序下“信息—金融”数量价格传导机制与数字金融风险监管[J].价格理论与实践,2021(1):66-70. 被引量:10
  • 4卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:237
  • 5何书元.应用时间序列分析[M].北京:北京大学出版社,2007.
  • 6Adam Melski, Lars Thoroe, Matthias Schumann. Managing RFID data in supply chains[J].Intemet Protocol Technology, 2007,2(3/4) : 176 - 189.
  • 7Jin Xingyi, Lee Xiaodong, Kong Ning. Efficient complex event processing over RFID data stream[ A]. Seventh IEEE/ACIS International Conference on Computer and Information Science [ C]. Washington: IEEE Computer Society,2008.75 - 81.
  • 8Adam Melski, Lars Thoroe, Matthias Schumann. Managing RFID data in supply chains[J]. Int. J. Internet Protocol Technology,2007,2(3/4) : 176 - 189.
  • 9Guangming Wang, Gonglian Jin. Research and design of RFID data processing model based on complex event processing[A]. International Conference on Computer Science and Software Engineering[ C ], Washington: IEEE Computer Society, 2008. 1396- 1399.
  • 10I-En Liao, Wei-Chih Lin. Shopping path analysis and transaction mining based on RFID technology[ A] .RFID Eurasia,2007 1st Annual[ C]. Washington: IEEE Computer Society, 2007.1-5.

共引文献73

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部