期刊文献+
共找到188篇文章
< 1 2 10 >
每页显示 20 50 100
Hybrid Memory-Enhanced Autoencoder with Adversarial Training for Anomaly Detection in Virtual Power Plants
1
作者 Yuqiao Liu Chen Pan +1 位作者 YeonJae Oh Chang Gyoon Lim 《Computers, Materials & Continua》 2025年第3期4593-4629,共37页
Virtual Power Plants(VPPs)are integral to modern energy systems,providing stability and reliability in the face of the inherent complexities and fluctuations of solar power data.Traditional anomaly detection methodolo... Virtual Power Plants(VPPs)are integral to modern energy systems,providing stability and reliability in the face of the inherent complexities and fluctuations of solar power data.Traditional anomaly detection methodologies often need to adequately handle these fluctuations from solar radiation and ambient temperature variations.We introduce the Memory-Enhanced Autoencoder with Adversarial Training(MemAAE)model to overcome these limitations,designed explicitly for robust anomaly detection in VPP environments.The MemAAE model integrates three principal components:an LSTM-based autoencoder that effectively captures temporal dynamics to distinguish between normal and anomalous behaviors,an adversarial training module that enhances system resilience across diverse operational scenarios,and a prediction module that aids the autoencoder during the reconstruction process,thereby facilitating precise anomaly identification.Furthermore,MemAAE features a memory mechanism that stores critical pattern information,mitigating overfitting,alongside a dynamic threshold adjustment mechanism that adapts detection thresholds in response to evolving operational conditions.Our empirical evaluation of the MemAAE model using real-world solar power data shows that the model outperforms other comparative models on both datasets.On the Sopan-Finder dataset,MemAAE has an accuracy of 99.17%and an F1-score of 95.79%,while on the Sunalab Faro PV 2017 dataset,it has an accuracy of 97.67%and an F1-score of 93.27%.Significant performance advantages have been achieved on both datasets.These results show that MemAAE model is an effective method for real-time anomaly detection in virtual power plants(VPPs),which can enhance robustness and adaptability to inherent variables in solar power generation. 展开更多
关键词 Virtual power plants(VPPs) anomaly detection memory-enhanced autoencoder adversarial training solar power
在线阅读 下载PDF
Unsupervised Anomaly Detection Approach Based on Adversarial Memory Autoencoders for Multivariate Time Series 被引量:2
2
作者 Tianzi Zhao Liang Jin +3 位作者 Xiaofeng Zhou Shuai Li Shurui Liu Jiang Zhu 《Computers, Materials & Continua》 SCIE EI 2023年第7期329-346,共18页
The widespread usage of Cyber Physical Systems(CPSs)generates a vast volume of time series data,and precisely determining anomalies in the data is critical for practical production.Autoencoder is the mainstream method... The widespread usage of Cyber Physical Systems(CPSs)generates a vast volume of time series data,and precisely determining anomalies in the data is critical for practical production.Autoencoder is the mainstream method for time series anomaly detection,and the anomaly is judged by reconstruction error.However,due to the strong generalization ability of neural networks,some abnormal samples close to normal samples may be judged as normal,which fails to detect the abnormality.In addition,the dataset rarely provides sufficient anomaly labels.This research proposes an unsupervised anomaly detection approach based on adversarial memory autoencoders for multivariate time series to solve the above problem.Firstly,an encoder encodes the input data into low-dimensional space to acquire a feature vector.Then,a memory module is used to learn the feature vector’s prototype patterns and update the feature vectors.The updating process allows partial forgetting of information to prevent model overgeneralization.After that,two decoders reconstruct the input data.Finally,this research uses the Peak Over Threshold(POT)method to calculate the threshold to determine anomalous samples from normal samples.This research uses a two-stage adversarial training strategy during model training to enlarge the gap between the reconstruction error of normal and abnormal samples.The proposed method achieves significant anomaly detection results on synthetic and real datasets from power systems,water treatment plants,and computer clusters.The F1 score reached an average of 0.9196 on the five datasets,which is 0.0769 higher than the best baseline method. 展开更多
关键词 Anomaly detection autoencoder memory module adversarial training
在线阅读 下载PDF
Fooling intrusion detection systems using adversarially autoencoder 被引量:2
3
作者 Junjun Chen Di Wu +3 位作者 Ying Zhao Nabin Sharma Michael Blumenstein Shui Yu 《Digital Communications and Networks》 SCIE CSCD 2021年第3期453-460,共8页
Due to the increasing cyber-attacks,various Intrusion Detection Systems(IDSs)have been proposed to identify network anomalies.Most existing machine learning-based IDSs learn patterns from the features extracted from n... Due to the increasing cyber-attacks,various Intrusion Detection Systems(IDSs)have been proposed to identify network anomalies.Most existing machine learning-based IDSs learn patterns from the features extracted from network traffic flows,and the deep learning-based approaches can learn data distribution features from the raw data to differentiate normal and anomalous network flows.Although having been used in the real world widely,the above methods are vulnerable to some types of attacks.In this paper,we propose a novel attack framework,Anti-Intrusion Detection AutoEncoder(AIDAE),to generate features to disable the IDS.In the proposed framework,an encoder transforms features into a latent space,and multiple decoders reconstruct the continuous and discrete features,respectively.Additionally,a generative adversarial network is used to learn the flexible prior distribution of the latent space.The correlation between continuous and discrete features can be kept by using the proposed training scheme.Experiments conducted on NSL-KDD,UNSW-NB15,and CICIDS2017 datasets show that the generated features indeed degrade the detection performance of existing IDSs dramatically. 展开更多
关键词 Intrusion detection Cyber attacks autoencoder Generative adversarial networks
在线阅读 下载PDF
Missing Value Imputation Model Based on Adversarial Autoencoder Using Spatiotemporal Feature Extraction 被引量:1
4
作者 Dong-Hoon Shin Seo-El Lee +1 位作者 Byeong-Uk Jeon Kyungyong Chung 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1925-1940,共16页
Recently,the importance of data analysis has increased significantly due to the rapid data increase.In particular,vehicle communication data,considered a significant challenge in Intelligent Transportation Systems(ITS... Recently,the importance of data analysis has increased significantly due to the rapid data increase.In particular,vehicle communication data,considered a significant challenge in Intelligent Transportation Systems(ITS),has spatiotemporal characteristics and many missing values.High missing values in data lead to the decreased predictive performance of models.Existing missing value imputation models ignore the topology of transportation net-works due to the structural connection of road networks,although physical distances are close in spatiotemporal image data.Additionally,the learning process of missing value imputation models requires complete data,but there are limitations in securing complete vehicle communication data.This study proposes a missing value imputation model based on adversarial autoencoder using spatiotemporal feature extraction to address these issues.The proposed method replaces missing values by reflecting spatiotemporal characteristics of transportation data using temporal convolution and spatial convolution.Experimental results show that the proposed model has the lowest error rate of 5.92%,demonstrating excellent predictive accuracy.Through this,it is possible to solve the data sparsity problem and improve traffic safety by showing superior predictive performance. 展开更多
关键词 Missing value adversarial autoencoder spatiotemporal feature extraction
在线阅读 下载PDF
Network Intrusion Detection Model Based on Ensemble of Denoising Adversarial Autoencoder 被引量:1
5
作者 KE Rui XING Bin +1 位作者 SI Zhan-jun ZHANG Ying-xue 《印刷与数字媒体技术研究》 CAS 北大核心 2024年第5期185-194,218,共11页
Network security problems bring many imperceptible threats to the integrity of data and the reliability of device services,so proposing a network intrusion detection model with high reliability is of great research si... Network security problems bring many imperceptible threats to the integrity of data and the reliability of device services,so proposing a network intrusion detection model with high reliability is of great research significance for network security.Due to the strong generalization of invalid features during training process,it is more difficult for single autoencoder intrusion detection model to obtain effective results.A network intrusion detection model based on the Ensemble of Denoising Adversarial Autoencoder(EDAAE)was proposed,which had higher accuracy and reliability compared to the traditional anomaly detection model.Using the adversarial learning idea of Adversarial Autoencoder(AAE),the discriminator module was added to the original model,and the encoder part was used as the generator.The distribution of the hidden space of the data generated by the encoder matched with the distribution of the original data.The generalization of the model to the invalid features was also reduced to improve the detection accuracy.At the same time,the denoising autoencoder and integrated operation was introduced to prevent overfitting in the adversarial learning process.Experiments on the CICIDS2018 traffic dataset showed that the proposed intrusion detection model achieves an Accuracy of 95.23%,which out performs traditional self-encoders and other existing intrusion detection models methods in terms of overall performance. 展开更多
关键词 Intrusion detection Noise-Reducing autoencoder Generative adversarial networks Integrated learning
在线阅读 下载PDF
Deep convolutional adversarial graph autoencoder using positive pointwise mutual information for graph embedding
6
作者 MA Xiuhui WANG Rong +3 位作者 CHEN Shudong DU Rong ZHU Danyang ZHAO Hua 《High Technology Letters》 EI CAS 2022年第1期98-106,共9页
Graph embedding aims to map the high-dimensional nodes to a low-dimensional space and learns the graph relationship from its latent representations.Most existing graph embedding methods focus on the topological struct... Graph embedding aims to map the high-dimensional nodes to a low-dimensional space and learns the graph relationship from its latent representations.Most existing graph embedding methods focus on the topological structure of graph data,but ignore the semantic information of graph data,which results in the unsatisfied performance in practical applications.To overcome the problem,this paper proposes a novel deep convolutional adversarial graph autoencoder(GAE)model.To embed the semantic information between nodes in the graph data,the random walk strategy is first used to construct the positive pointwise mutual information(PPMI)matrix,then,graph convolutional net-work(GCN)is employed to encode the PPMI matrix and node content into the latent representation.Finally,the learned latent representation is used to reconstruct the topological structure of the graph data by decoder.Furthermore,the deep convolutional adversarial training algorithm is introduced to make the learned latent representation conform to the prior distribution better.The state-of-the-art experimental results on the graph data validate the effectiveness of the proposed model in the link prediction,node clustering and graph visualization tasks for three standard datasets,Cora,Citeseer and Pubmed. 展开更多
关键词 graph autoencoder(GAE) positive pointwise mutual information(PPMI) deep convolutional generative adversarial network(DCGAN) graph convolutional network(GCN) se-mantic information
在线阅读 下载PDF
Anomalous node detection in attributed social networks using dual variational autoencoder with generative adversarial networks
7
作者 Wasim Khan Shafiqul Abidin +5 位作者 Mohammad Arif Mohammad Ishrat Mohd Haleem Anwar Ahamed Shaikh Nafees Akhtar Farooqui Syed Mohd Faisal 《Data Science and Management》 2024年第2期89-98,共10页
Many types of real-world information systems, including social media and e-commerce platforms, can be modelled by means of attribute-rich, connected networks. The goal of anomaly detection in artificial intelligence i... Many types of real-world information systems, including social media and e-commerce platforms, can be modelled by means of attribute-rich, connected networks. The goal of anomaly detection in artificial intelligence is to identify illustrations that deviate significantly from the main distribution of data or that differ from known cases. Anomalous nodes in node-attributed networks can be identified with greater precision if both graph and node attributes are taken into account. Almost all of the studies in this area focus on supervised techniques for spotting outliers. While supervised algorithms for anomaly detection work well in theory, they cannot be applied to real-world applications owing to a lack of labelled data. Considering the possible data distribution, our model employs a dual variational autoencoder (VAE), while a generative adversarial network (GAN) assures that the model is robust to adversarial training. The dual VAEs are used in another capacity: as a fake-node generator. Adversarial training is used to ensure that our latent codes have a Gaussian or uniform distribution. To provide a fair presentation of the graph, the discriminator instructs the generator to generate latent variables with distributions that are more consistent with the actual distribution of the data. Once the model has been learned, the discriminator is used for anomaly detection via reconstruction loss which has been trained to distinguish between the normal and artificial distributions of data. First, using a dual VAE, our model simultaneously captures cross-modality interactions between topological structure and node characteristics and overcomes the problem of unlabeled anomalies, allowing us to better understand the network sparsity and nonlinearity. Second, the proposed model considers the regularization of the latent codes while solving the issue of unregularized embedding techniques that can quickly lead to unsatisfactory representation. Finally, we use the discriminator reconstruction loss for anomaly detection as the discriminator is well-trained to separate the normal and generated data distributions because reconstruction-based loss does not include the adversarial component. Experiments conducted on attributed networks demonstrate the effectiveness of the proposed model and show that it greatly surpasses the previous methods. The area under the curve scores of our proposed model for the BlogCatalog, Flickr, and Enron datasets are 0.83680, 0.82020, and 0.71180, respectively, proving the effectiveness of the proposed model. The result of the proposed model on the Enron dataset is slightly worse than other models;we attribute this to the dataset’s low dimensionality as the most probable explanation. 展开更多
关键词 Anomaly detection deep learning Attributed networks autoencoder Dual variational-autoencoder Generative adversarial networks
在线阅读 下载PDF
A Hybrid Wasserstein GAN and Autoencoder Model for Robust Intrusion Detection in IoT
8
作者 Mohammed S.Alshehri Oumaima Saidani +4 位作者 Wajdan Al Malwi Fatima Asiri Shahid Latif Aizaz Ahmad Khattak Jawad Ahmad 《Computer Modeling in Engineering & Sciences》 2025年第6期3899-3920,共22页
The emergence of Generative Adversarial Network(GAN)techniques has garnered significant attention from the research community for the development of Intrusion Detection Systems(IDS).However,conventional GAN-based IDS ... The emergence of Generative Adversarial Network(GAN)techniques has garnered significant attention from the research community for the development of Intrusion Detection Systems(IDS).However,conventional GAN-based IDS models face several challenges,including training instability,high computational costs,and system failures.To address these limitations,we propose a Hybrid Wasserstein GAN and Autoencoder Model(WGAN-AE)for intrusion detection.The proposed framework leverages the stability of WGAN and the feature extraction capabilities of the Autoencoder Model.The model was trained and evaluated using two recent benchmark datasets,5GNIDD and IDSIoT2024.When trained on the 5GNIDD dataset,the model achieved an average area under the precisionrecall curve is 99.8%using five-fold cross-validation and demonstrated a high detection accuracy of 97.35%when tested on independent test data.Additionally,the model is well-suited for deployment on resource-limited Internetof-Things(IoT)devices due to its ability to detect attacks within microseconds and its small memory footprint of 60.24 kB.Similarly,when trained on the IDSIoT2024 dataset,the model achieved an average PR-AUC of 94.09%and an attack detection accuracy of 97.35%on independent test data,with a memory requirement of 61.84 kB.Extensive simulation results demonstrate that the proposed hybrid model effectively addresses the shortcomings of traditional GAN-based IDS approaches in terms of detection accuracy,computational efficiency,and applicability to real-world IoT environments. 展开更多
关键词 autoencoder CYBERSECURITY generative adversarial network Internet of Things intrusion detection system
在线阅读 下载PDF
面向国产芯片的应用软件适配评估模型设计
9
作者 孙镇 高若寒 +2 位作者 王立晨 李赫然 崔祺 《电子设计工程》 2026年第2期131-135,共5页
传统Apriori关联规则在应用软件适配评估过程中存在效率低、稀疏数据特征提取能力差的缺点,文中使用深度神经网络对其进行改进,提出一种基于改进关联规则的应用软件适配评估模型。针对Apriori效率低的问题,通过深度稀疏自编码器对数据... 传统Apriori关联规则在应用软件适配评估过程中存在效率低、稀疏数据特征提取能力差的缺点,文中使用深度神经网络对其进行改进,提出一种基于改进关联规则的应用软件适配评估模型。针对Apriori效率低的问题,通过深度稀疏自编码器对数据集进行降维后的提取特征。对于Apriori稀疏数据特征提取能力差的问题,采用对抗神经网络对数据集进行特征加强训练,同时引入注意力机制,进一步增强了模型的缺陷特征提取能力。在实验测试中,改进算法的性能明显优于原算法,且在对比算法中的表现良好,对高维数据集的检测准确率可达79.9%,表明所提模型可以有效地发现应用软件中的缺陷,能够为国产芯片在软件应用层面的发展提供支持。 展开更多
关键词 应用适配 软件缺陷特征检测 Apriori关联算法 深度稀疏自编码器 对抗神经网络 注意力机制
在线阅读 下载PDF
基于LAAE网络的跨语言短文本情感分析方法 被引量:1
10
作者 沈江红 廖晓东 《计算机系统应用》 2021年第6期203-208,共6页
跨语言短文本情感分析作为自然语言处理领域的一项重要的任务,近年来备受关注.跨语言情感分析能够利用资源丰富的源语言标注数据对资源匮乏的目标语言数据进行情感分析,建立语言之间的联系是该任务的核心.与传统的机器翻译建立联系方法... 跨语言短文本情感分析作为自然语言处理领域的一项重要的任务,近年来备受关注.跨语言情感分析能够利用资源丰富的源语言标注数据对资源匮乏的目标语言数据进行情感分析,建立语言之间的联系是该任务的核心.与传统的机器翻译建立联系方法相比,迁移学习更胜一筹,而高质量的跨语言文本向量则会提升迁移效果.本文提出LAAE网络模型,该模型通过长短记忆网络(LSTM)和对抗式自编码器(AAE)获得含上下文情感信息的跨语言向量,然后利用双向GRU (Gated Recurrent Unite)进行后续情感分类任务.其中,分类器首先在源语言上进行训练,最后迁移到目标语言上进行分类任务.本方法的有效性体现在实验结果中. 展开更多
关键词 跨语言情感分析 迁移学习 长短记忆网络 对抗式自编码器 双向GRU
在线阅读 下载PDF
Primary User Adversarial Attacks on Deep Learning-Based Spectrum Sensing and the Defense Method 被引量:4
11
作者 Shilian Zheng Linhui Ye +5 位作者 Xuanye Wang Jinyin Chen Huaji Zhou Caiyi Lou Zhijin Zhao Xiaoniu Yang 《China Communications》 SCIE CSCD 2021年第12期94-107,共14页
The spectrum sensing model based on deep learning has achieved satisfying detection per-formence,but its robustness has not been verified.In this paper,we propose primary user adversarial attack(PUAA)to verify the rob... The spectrum sensing model based on deep learning has achieved satisfying detection per-formence,but its robustness has not been verified.In this paper,we propose primary user adversarial attack(PUAA)to verify the robustness of the deep learning based spectrum sensing model.PUAA adds a care-fully manufactured perturbation to the benign primary user signal,which greatly reduces the probability of detection of the spectrum sensing model.We design three PUAA methods in black box scenario.In or-der to defend against PUAA,we propose a defense method based on autoencoder named DeepFilter.We apply the long short-term memory network and the convolutional neural network together to DeepFilter,so that it can extract the temporal and local features of the input signal at the same time to achieve effective defense.Extensive experiments are conducted to eval-uate the attack effect of the designed PUAA method and the defense effect of DeepFilter.Results show that the three PUAA methods designed can greatly reduce the probability of detection of the deep learning-based spectrum sensing model.In addition,the experimen-tal results of the defense effect of DeepFilter show that DeepFilter can effectively defend against PUAA with-out affecting the detection performance of the model. 展开更多
关键词 spectrum sensing cognitive radio deep learning adversarial attack autoencoder DEFENSE
在线阅读 下载PDF
一种基于AAE的协同多播主动缓存方案
12
作者 刘鑫 王珺 +1 位作者 宋巧凤 刘家豪 《计算机科学》 CSCD 北大核心 2022年第9期260-267,共8页
随着用户终端数量的激增和5G技术的发展,形成了宏基站和小基站并存的网络。同时超高清视频、云VR/AR等应用对时延提出了更高的要求。为了缩短5G网络中的时延,文中结合小基站协同、多播和用户行为可预测的特性,提出了一种基于对抗自动编... 随着用户终端数量的激增和5G技术的发展,形成了宏基站和小基站并存的网络。同时超高清视频、云VR/AR等应用对时延提出了更高的要求。为了缩短5G网络中的时延,文中结合小基站协同、多播和用户行为可预测的特性,提出了一种基于对抗自动编码(Adversarial Autoencoders, AAE)的协同多播主动缓存方案(Collaborative Multicast Proactive Caching Scheme Based on Adversarial Autoencoders, CMPCAAE)。该方案首先根据用户的特征信息将用户划分成偏好不同的用户组,然后通过AAE预测每个用户组可能请求的内容。为了减少缓存内容的冗余,采用蚁群算法(Ant Colony, ACO)将预测的内容预先部署到各小基站以实现小基站间的协同。在内容分发阶段,若分组中用户请求的是流行度高的内容,则以多播的方式将该内容主动缓存到分组中其他未发送请求的用户,否则以正常的方式进行分发。仿真结果表明,CMPCAAE方案在系统的平均请求时延和丢失率方面均优于经典的缓存方案。 展开更多
关键词 边缘缓存 协同缓存 主动缓存 对抗自动编码 多播 蚁群算法
在线阅读 下载PDF
基于改进GAN的人机交互手势行为识别方法 被引量:2
13
作者 张富强 白筠妍 穆慧 《郑州大学学报(工学版)》 北大核心 2025年第2期43-50,共8页
为改善现有手势识别算法需要大量训练数据的现状,针对识别准确率不高、识别过程复杂等问题,基于生成式对抗网络(GAN)和变分自编码器,引入标签信息,提出一种基于改进GAN模型的人机交互手势行为识别方法。首先,在编码器和解码器中分别添... 为改善现有手势识别算法需要大量训练数据的现状,针对识别准确率不高、识别过程复杂等问题,基于生成式对抗网络(GAN)和变分自编码器,引入标签信息,提出一种基于改进GAN模型的人机交互手势行为识别方法。首先,在编码器和解码器中分别添加改进InceptionV2和InceptionV2-trans结构增强模型的特征还原能力;其次,在各组成网络中进行条件批量归一化(CBN)处理改善过拟合,以Mish激活函数代替ReLU函数提升网络性能;最后,通过实验证明该方法能够以较少的样本获得100%的分类准确率,且收敛时间短,验证了该方法的可靠性。 展开更多
关键词 人机交互 生成对抗网络 变分自编码器 手势识别 条件批量归一化
在线阅读 下载PDF
基于改进GAN的图像去雨方法及其在车辆检测上的应用 被引量:1
14
作者 应保胜 刘畅然 +2 位作者 熊豪 石兵华 许小伟 《计算机应用与软件》 北大核心 2025年第3期183-189,共7页
针对雨天行车时,车载摄像头拍摄的图像被镜头前的雨滴或者空中的雨线条纹所遮挡,影响车辆检测的准确度的问题,使用先去雨后检测的思路,提出一种基于改进的生成对抗网络(Generative Adversarial Networks,GAN)图像去雨方法。该方法在GAN... 针对雨天行车时,车载摄像头拍摄的图像被镜头前的雨滴或者空中的雨线条纹所遮挡,影响车辆检测的准确度的问题,使用先去雨后检测的思路,提出一种基于改进的生成对抗网络(Generative Adversarial Networks,GAN)图像去雨方法。该方法在GAN的生成网络中加入注意力模块,并在patch-GAN判别网络中加入一层卷积,提取注意力掩码图,进行局部鉴别,提升去雨效果并保留图像细节。对图像进行去雨处理后,再使用YOLOv4算法对去雨后图像进行车辆检测。实验使用多种数据集将该方法与其他方法进行对比实验,结果表明该方法有良好的去雨效果,并能有效提高雨天车辆检测准确率。 展开更多
关键词 图像去雨 生成对抗网络 注意力模块 自编码器 车辆检测
在线阅读 下载PDF
基于三重生成对抗的多维时间序列异常检测 被引量:1
15
作者 霍纬纲 吴艺凝 《计算机工程与设计》 北大核心 2025年第5期1304-1310,共7页
为有效解决多维时间序列(multivariate time series, MTS)无监督异常检测模型中自编码器模块容易拟合异常样本、正常MTS样本对应的隐空间特征可能被重构为异常MTS的问题,设计一种具有三重生成对抗的MTS异常检测模型。以LSTM自编码器为... 为有效解决多维时间序列(multivariate time series, MTS)无监督异常检测模型中自编码器模块容易拟合异常样本、正常MTS样本对应的隐空间特征可能被重构为异常MTS的问题,设计一种具有三重生成对抗的MTS异常检测模型。以LSTM自编码器为生成器,基于重构误差生成伪标签,由判别器区分经伪标签过滤后的重构MTS和原始MTS;采用两次对抗训练将LSTM自编码器的隐空间约束为均匀分布,减少LSTM自编码器隐空间特征重构出异常MTS的可能性。多个公开MTS数据集上的实验结果表明,T-GAN能在带有污染数据的训练集上更好学习正常MTS分布,取得较高的异常检测效果。 展开更多
关键词 异常检测 生成对抗 多维时间序列 自编码器 长短期记忆网络 伪标签 污染数据
在线阅读 下载PDF
基于复合先验的生成对抗网络推荐模型
16
作者 王海涛 王玉国 +1 位作者 冯晨飞 霍占强 《计算机工程与设计》 北大核心 2025年第12期3406-3412,共7页
现有的生成对抗网络推荐方法仅对编码器进行了简单的数据处理或直接对抗结合,从而忽视数据稀疏性和对抗不稳定性带来的模式坍塌,为此,提出一种基于复合先验的生成对抗网络推荐模型(RCGAN)。生成器结合上一轮训练参数与标准高斯先验的复... 现有的生成对抗网络推荐方法仅对编码器进行了简单的数据处理或直接对抗结合,从而忽视数据稀疏性和对抗不稳定性带来的模式坍塌,为此,提出一种基于复合先验的生成对抗网络推荐模型(RCGAN)。生成器结合上一轮训练参数与标准高斯先验的复合结构增强稳定性,并引入特征匹配损失,使生成数据更准确地逼近真实数据的潜在分布。同时,判别器采用自编码器结构,使得在对抗训练过程获取更丰富的梯度信息。并通过交替对抗训练优化生成器与判别器的协同效果。MovieLens-1M和LastFM数据集上的实验结果表明,RCGAN在多个Top-N推荐任务优于现有基线模型。 展开更多
关键词 生成对抗网络 自编码器 推荐系统 协同过滤 复合先验 特征匹配 隐式反馈
在线阅读 下载PDF
基于FIML和DAE的水稻种质资源数据自适应填充算法设计
17
作者 李艳玲 韩茹菲 +3 位作者 苏楠 李飞涛 FERNANDO Bacao 司海平 《河南农业大学学报》 北大核心 2025年第2期316-325,共10页
【目的】设计一种基于FIML和DAE的填充缺失值的方法,即聚类全信息选择性过滤编码器数据填补算法(clustering-based comprehensive information selective filtering encoder data imputation algorithm,CFSM-DAE),为水稻种质资源缺失数... 【目的】设计一种基于FIML和DAE的填充缺失值的方法,即聚类全信息选择性过滤编码器数据填补算法(clustering-based comprehensive information selective filtering encoder data imputation algorithm,CFSM-DAE),为水稻种质资源缺失数据进行填充。【方法】利用聚类辅助避免数据异常值对算法的影响,采用选择性过滤层用于识别高质量估算、减少低质量估算的影响。传统的DAE框架通常没有选择性过滤层,所有的估算值都被视为同等重要,无法区分高质量和低质量的估算值。为了进一步提高估算精度,研究采用集成框架将全信息最大似然性(FIML)与多对抗性自编码器(DAE)结合的方法(CFSM-DAE),在选择性过滤层基础上,自适应填充,即当估算值不符合设定阈值时,采用FIML填充策略以确保填充结果的稳定性和精确度,从而进一步来提高整体估算精度。在3种缺失数据机制(随机缺失(MAR)、完全随机缺失(MCAR)和非随机缺失(MNAR))下对模拟数据和实际水稻种质资源数据集进行研究,将CFSM-DAE方法与多种常用填充算法比较(全信息最大似然性(FIML)、对抗自编码器(DAE)、K近邻填充(KNN)、随机森林(RF)、链式方程多重插补(MICE))。【结果】CFSM-DAE在模拟数据上的表现为S_(RME)=0.0676,E_(MA)=0.0093,R^(2)=0.9958;在水稻种质资源数据上的表现为S_(RME)=0.0395,E_(MA)=0.0078,R^(2)=0.8913。相比之下,其他算法如DAE在这两类数据下的SRME表现分别为0.8896和0.7707;KNN算法的EMA表现分别为0.1183和0.1305;FIML算法的R2表现为0.3382和0.7321。因此,CFSM-DAE在多个评价指标上相较于其他算法都表现出了一定的提升,CFSM-DAE在模拟数据和水稻种质资源数据的表现优于其他算法。【结论】CFSM-DAE方法通过结合聚类、选择性过滤和全信息最大似然性等策略,显著提高了水稻种质资源数据中缺失值的填补精度,展示了其在处理复杂缺失值问题上的有效性和潜力。 展开更多
关键词 水稻种质资源 聚类 全信息最大似然性 对抗性自编码器 选择性过滤层 数据缺失
在线阅读 下载PDF
基于ADS-B多特征迁移学习的GNSS干扰检测方法
18
作者 陈敏 李昊宇 +1 位作者 何炜琨 吴仁彪 《信号处理》 北大核心 2025年第7期1241-1254,共14页
全球导航卫星系统(Global Navigation Satellite System,GNSS)是现代航空系统的重要基础,其极易受到射频干扰,这可能导致航班备降、复飞或进近中止等情形,对航空安全造成严重影响。广播式自动相关监视(Automatic Dependent Surveillance... 全球导航卫星系统(Global Navigation Satellite System,GNSS)是现代航空系统的重要基础,其极易受到射频干扰,这可能导致航班备降、复飞或进近中止等情形,对航空安全造成严重影响。广播式自动相关监视(Automatic Dependent Surveillance-Broadcast,ADS-B)依赖于GNSS获取飞机位置信息,当GNSS受到射频干扰时,ADS-B的可用性也会受到影响。基于ADS-B数据来进行GNSS干扰检测成为一种可行的解决方案。针对现有基于ADS-B数据的GNSS干扰检测模型存在无法兼容多个ADS-B版本,难以适应我国国情的问题,以GNSS干扰事件中的ADS-B数据为研究对象,分析其在干扰条件下的特点,包括航迹波动和导航质量指标的变化特性。引入滑动窗口技术,动态计算统计特征并扩展特征维度,以更全面准确地反映干扰影响;提出了一种结合长短期记忆网络自编码器(Long Short-Term Memory-AutoEncoder,LSTM-AE)与领域对抗神经网络(Domain Adversarial Neural Network,DANN)的GNSS干扰检测方法。该方法通过LSTM-AE提取不同版本ADS-B的特征,并将其映射到同一个特征空间,提供一致的特征表示;采用DANN网络实现对DO-260A/B版本ADS-B数据(源域)中GNSS干扰的检测,并借助DANN的迁移学习能力,使其适应于DO-260版本的ADS-B数据(目标域),从而实现跨版本的高效检测。实验结果表明,所提出的LSTM-AE-DANN模型在DO-260、DO-260A/B版本的ADS-B数据集上均表现出优秀的检测性能和更强的适用性,适合我国国情,具有显著的实用价值。 展开更多
关键词 全球导航卫星系统干扰检测 广播式自动相关监视 长短期记忆自编码器 领域对抗神经网络 迁移学习 航空安全
在线阅读 下载PDF
特征感知变换自编码器防御模型偏斜式投毒攻击
19
作者 罗文华 杨立圣 张鹏 《小型微型计算机系统》 北大核心 2025年第8期2033-2040,共8页
流量分类模型更新易受数据投毒攻击,现有模型偏斜式投毒攻击防御方法聚焦特征固定的图像分类任务,面对特征复杂的流量分类问题适用性有限.针对上述问题,设计少特征攻击的投影梯度下降法,生成对抗样本进行偏斜式投毒攻击;提出特征感知变... 流量分类模型更新易受数据投毒攻击,现有模型偏斜式投毒攻击防御方法聚焦特征固定的图像分类任务,面对特征复杂的流量分类问题适用性有限.针对上述问题,设计少特征攻击的投影梯度下降法,生成对抗样本进行偏斜式投毒攻击;提出特征感知变换自编码器的模型偏斜式投毒防御方法,在自编码器训练阶段引入特征感知噪声扰动,以限制扰动范围并增强自编码器对抗样本噪声过滤能力.通过构建流量数据变换自编码器重构并消除对抗样本的对抗性,利用变换后的样本数据与原始数据进行预测差异性判定,实现对抗样本判别过滤.实验结果表明,该方法能够有效识别新增训练样本中的对抗样本,降低偏斜式数据投毒攻击对流量分类模型的负面影响. 展开更多
关键词 数据投毒攻击 流量分类模型 对抗样本 自编码器
在线阅读 下载PDF
计及小概率场景能源管线风险的综合能源系统多目标扩展规划
20
作者 黄南天 赵暄远 +1 位作者 蔡国伟 郭玉 《电气工程学报》 北大核心 2025年第1期197-207,共11页
随着能源系统不断转型及新型负荷的快速发展,在极端高温及极端低温等小概率用能场景下,需求侧用能行为日渐复杂,综合能源系统安全稳定运行风险逐渐提升。因此,提出计及小概率高用能场景下能源管线超负荷运行风险的综合能源系统多目标扩... 随着能源系统不断转型及新型负荷的快速发展,在极端高温及极端低温等小概率用能场景下,需求侧用能行为日渐复杂,综合能源系统安全稳定运行风险逐渐提升。因此,提出计及小概率高用能场景下能源管线超负荷运行风险的综合能源系统多目标扩展规划方法。建立基于耦合对抗变分自编码器的场景生成模型,生成冷-热-电-气负荷场景,获取典型场景与小概率高用能场景;在此基础上,以系统扩展规划成本最低及小概率高用能场景能源管线风险最低为目标,建立计及小概率高用能场景的冷-热-电-气综合能源系统扩展规划模型;采用改进麻雀搜索优化算法进行算例求解,实现冷-热-电-气综合能源系统扩展规划,提升综合能源系统扩展规划经济性与运行可靠性。 展开更多
关键词 综合能源系统 扩展规划 小概率高用能场景 耦合对抗变分自编码器 改进麻雀搜索优化算法
在线阅读 下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部