首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Hybrid quantum-classical algorithms provide a promising way to harness the power of current quantum devices. In this framework, parametrized quantum circuits (PQCs) which consist of layers of parametrized unitaries can be considered as a kind of quantum neural networks. Recent works have begun to explore the potential of PQCs as general function approximators. In this work, we propose a quantum-classical deep network structure to enhance model discriminability of convolutional neural networks (CNNs). In CNNs, the convolutional layer uses linear filters to scan the input data followed by a nonlinear operation. Instead, we build PQCs, which are more potent function approximators, with more complex structures to capture the features within the receptive field. The feature maps are obtained by sliding the PQCs over the input in a similar way as CNN. We also give a training algorithm for the proposed model. Through numerical simulation, the proposed hybrid models demonstrate reasonable classification performance on MNIST and Fashion-MNIST (4-classes). In addition, we compare the performance of models in different settings. The results demonstrate that the model with high-expressibility ansaetze achieves lower cost and higher accuracy, but exhibits a “saturation” phenomenon.  相似文献   

2.
Previous studies have adopted unsupervised machine learning with dimension reduction functions for cyberattack detection, which are limited to performing robust anomaly detection with high-dimensional and sparse data. Most of them usually assume homogeneous parameters with a specific Gaussian distribution for each domain, ignoring the robust testing of data skewness. This paper proposes to use unsupervised ensemble autoencoders connected to the Gaussian mixture model (GMM) to adapt to multiple domains regardless of the skewness of each domain. In the hidden space of the ensemble autoencoder, the attention-based latent representation and reconstructed features of the minimum error are utilized. The expectation maximization (EM) algorithm is used to estimate the sample density in the GMM. When the estimated sample density exceeds the learning threshold obtained in the training phase, the sample is identified as an outlier related to an attack anomaly. Finally, the ensemble autoencoder and the GMM are jointly optimized, which transforms the optimization of objective function into a Lagrangian dual problem. Experiments conducted on three public data sets validate that the performance of the proposed model is significantly competitive with the selected anomaly detection baselines.  相似文献   

3.
Semi-supervised anomaly detection methods leverage a few anomaly examples to yield drastically improved performance compared to unsupervised models. However, they still suffer from two limitations: 1) unlabeled anomalies (i.e., anomaly contamination) may mislead the learning process when all the unlabeled data are employed as inliers for model training; 2) only discrete supervision information (such as binary or ordinal data labels) is exploited, which leads to suboptimal learning of anomaly scores that essentially take on a continuous distribution. Therefore, this paper proposes a novel semi-supervised anomaly detection method, which devises contamination-resilient continuous supervisory signals. Specifically, we propose a mass interpolation method to diffuse the abnormality of labeled anomalies, thereby creating new data samples labeled with continuous abnormal degrees. Meanwhile, the contaminated area can be covered by new data samples generated via combinations of data with correct labels. A feature learning-based objective is added to serve as an optimization constraint to regularize the network and further enhance the robustness w.r.t. anomaly contamination. Extensive experiments on 11 real-world datasets show that our approach significantly outperforms state-of-the-art competitors by 20%–30% in AUC-PR and obtains more robust and superior performance in settings with different anomaly contamination levels and varying numbers of labeled anomalies.  相似文献   

4.
Subjectivity detection is a task of natural language processing that aims to remove ‘factual’ or ‘neutral’ content, i.e., objective text that does not contain any opinion, from online product reviews. Such a pre-processing step is crucial to increase the accuracy of sentiment analysis systems, as these are usually optimized for the binary classification task of distinguishing between positive and negative content. In this paper, we extend the extreme learning machine (ELM) paradigm to a novel framework that exploits the features of both Bayesian networks and fuzzy recurrent neural networks to perform subjectivity detection. In particular, Bayesian networks are used to build a network of connections among the hidden neurons of the conventional ELM configuration in order to capture dependencies in high-dimensional data. Next, a fuzzy recurrent neural network inherits the overall structure generated by the Bayesian networks to model temporal features in the predictor. Experimental results confirmed the ability of the proposed framework to deal with standard subjectivity detection problems and also proved its capacity to address portability across languages in translation tasks.  相似文献   

5.
In synthetic aperture radar (SAR) image change detection, the deep learning has attracted increasingly more attention because the difference images (DIs) of traditional unsupervised technology are vulnerable to speckle noise. However, most of the existing deep networks do not constrain the distributional characteristics of the hidden space, which may affect the feature representation performance. This paper proposes a variational autoencoder (VAE) network with the siamese structure to detect changes in SAR images. The VAE encodes the input as a probability distribution in the hidden space to obtain regular hidden layer features with a good representation ability. Furthermore, subnetworks with the same parameters and structure can extract the spatial consistency features of the original image, which is conducive to the subsequent classification. The proposed method includes three main steps. First, the training samples are selected based on the false labels generated by a clustering algorithm. Then, we train the proposed model with the semisupervised learning strategy, including unsupervised feature learning and supervised network fine-tuning. Finally, input the original data instead of the DIs in the trained network to obtain the change detection results. The experimental results on four real SAR datasets show the effectiveness and robustness of the proposed method.  相似文献   

6.
Online recommender systems have been shown to be vulnerable to group shilling attacks in which attackers of a shilling group collaboratively inject fake profiles with the aim of increasing or decreasing the frequency that particular items are recommended. Existing detection methods mainly use the frequent itemset (dense subgraph) mining or clustering method to generate candidate groups and then utilize the hand-crafted features to identify shilling groups. However, such two-stage detection methods have two limitations. On the one hand, due to the sensitivity of support threshold or clustering parameters setting, it is difficult to guarantee the quality of candidate groups generated. On the other hand, they all rely on manual feature engineering to extract detection features, which is costly and time-consuming. To address these two limitations, we present a shilling group detection method based on graph convolutional network. First, we model the given dataset as a graph by treating users as nodes and co-rating relations between users as edges. By assigning edge weights and filtering normal user relations, we obtain the suspicious user relation graph. Second, we use principal component analysis to refine the rating features of users and obtain the user feature matrix. Third, we design a three-layer graph convolutional network model with a neighbor filtering mechanism and perform user classification by combining both structure and rating features of users. Finally, we detect shilling groups through identifying target items rated by the attackers according to the user classification results. Extensive experiments show that the classification accuracy and detection performance (F1-measure) of the proposed method can reach 98.92% and 99.92% on the Netflix dataset and 93.18% and 92.41% on the Amazon dataset.  相似文献   

7.
The advent of connected devices and omnipresence of Internet have paved way for intruders to attack networks, which leads to cyber-attack, financial loss, information theft in healthcare, and cyber war. Hence, network security analytics has become an important area of concern and has gained intensive attention among researchers, off late, specifically in the domain of anomaly detection in network, which is considered crucial for network security. However, preliminary investigations have revealed that the existing approaches to detect anomalies in network are not effective enough, particularly to detect them in real time. The reason for the inefficacy of current approaches is mainly due the amassment of massive volumes of data though the connected devices. Therefore, it is crucial to propose a framework that effectively handles real time big data processing and detect anomalies in networks. In this regard, this paper attempts to address the issue of detecting anomalies in real time. Respectively, this paper has surveyed the state-of-the-art real-time big data processing technologies related to anomaly detection and the vital characteristics of associated machine learning algorithms. This paper begins with the explanation of essential contexts and taxonomy of real-time big data processing, anomalous detection, and machine learning algorithms, followed by the review of big data processing technologies. Finally, the identified research challenges of real-time big data processing in anomaly detection are discussed.  相似文献   

8.
桂思思  徐健 《情报科学》2021,39(11):90-95
【 目的/意义】针对查询意图歧义性自动识别,探讨特征有效性及采用不同分类算法识别三类查询意图歧义 性的分类准确率,以期对后续研究提供借鉴与指导。【方法/过程】首先提出了一个面向查询意图歧义性的查询表达 式分类体系;随后,构建了查询表达式特征及相关文档特征共六类;最后,分别采用决策树算法、神经网络算法及k 最邻近算法,探讨采用不同特征组合的有效性及不同分类算法的分类准确率。【结果/结论】①分类准确率较基准实 验提升比例为49.5%;②使用查询表达式特征分类优于使用相关文档特征;③决策树的分类准确率略高于其他两类 分类算法。【创新/局限】构建了一个面向查询意图歧义性的查询分类体系;完成了面向三类查询意图歧义性的分类 任务;然限于数据集获取途径,仅对200数据验证。  相似文献   

9.
在使用通常的预警与监测模型监测宏观金融风险时,由于我国并无公认的反映金融危机的事件,会因缺乏足够的、表现预警对象异常波动的非正常数据而不能获得客观结果。本文采用支持向量描述预警技术(SVDD),由正常数据决定一个超球体,通过判断待检测数据是否在超球体界限内来评价待检测数据是否正常,若超出超球体界限,则应认为待检测数据发生非正常波动,应发出预警信号。实证结果表明,模型的结果与宏观金融实际运行结果较为吻合。  相似文献   

10.
This paper presents a binary classification of entrepreneurs in British historical data based on the recent availability of big data from the I-CeM dataset. The main task of the paper is to attribute an employment status to individuals that did not fully report entrepreneur status in earlier censuses (1851–1881). The paper assesses the accuracy of different classifiers and machine learning algorithms, including Deep Learning, for this classification problem. We first adopt a ground-truth dataset from the later censuses to train the computer with a Logistic Regression (which is standard in the literature for this kind of binary classification) to recognize entrepreneurs distinct from non-entrepreneurs (i.e. workers). Our initial accuracy for this base-line method is 0.74. We compare the Logistic Regression with ten optimized machine learning algorithms: Nearest Neighbors, Linear and Radial Support Vector Machine, Gaussian Process, Decision Tree, Random Forest, Neural Network, AdaBoost, Naive Bayes, and Quadratic Discriminant Analysis. The best results are boosting and ensemble methods. AdaBoost achieves an accuracy of 0.95. Deep-Learning, as a standalone category of algorithms, further improves accuracy to 0.96 without using the rich text-data that characterizes the OccString feature, a string of up to 500 characters with the full occupational statement of each individual collected in the earlier censuses. Finally, and now using this OccString feature, we implement both shallow (bag-of-words algorithm) learning and Deep Learning (Recurrent Neural Network with a Long Short-Term Memory layer) algorithms. These methods all achieve accuracies above 0.99 with Deep Learning Recurrent Neural Network as the best model with an accuracy of 0.9978. The results show that standard algorithms for classification can be outperformed by machine learning algorithms. This confirms the value of extending the techniques traditionally used in the literature for this type of classification problem.  相似文献   

11.
Cognitive impairments like memory disorder and depressive disorders lead to fatal consequences if proper attention is not given to such health hazards. Their impact is extended to the socioeconomic status of the developed and low or middle-income countries in terms of loss of talented and skilled population. Additionally, financial burden is borne by the countries in terms of additional health budget allotment. This paper presents a novel strategy for early detection of cognitive deficiency to eliminate the economic repercussions caused by memory disorder and depressive disorders. In this work, Electroencephalogram (EEG) and a word learning neuropsychological test, i.e. California Verbal Learning Task (CVLT), are conjunctively used for memory assessment. The features of EEG and scores of CVLT are modeled by applying different machine learning techniques, namely K-Nearest Neighbor (KNN), Gaussian Naive Bayes (GNB), Decision Tree (DT), Random Forest (RF), and Support Vector Machine (SVM). Comparatively, experimental results have better classification accuracy than the existing schemes that considered EEG for estimating cognitive heuristics. More specifically, SVM attains the highest accuracy score of 81.56% among all machine learning algorithms, which can assist in the early detection of cognitive impairments. The proposed strategy can be helpful in clinical diagnosis of psychological health and improving quality of life as a whole.  相似文献   

12.
高亚琪  王昊  刘渊晨 《情报科学》2021,39(10):107-117
【目的/意义】针对当前利用计算机管理图像资源存在图像语义特征表达不足等问题,探索和分析了特征及 特征融合对分类结果的影响,提出了一种提高图像语义分类准确率的方法。【方法/过程】本文定义了四种图像风 格,将图像描述特征划分为三个层次,探究特征融合的特点,寻求能有效表达图像语义的特征。分别采用SVM、 CNN、LSTM 及迁移学习方法实现图像风格分类,并将算法组合以提高分类效果。【结果/结论】基于迁移学习的 ResNet18模型提取的深层特征能够较好地表达图像的高级语义,将其与SVM结合能提高分类准确率。特征之间 并不总是互补,在特征选择时应避免特征冗余,造成分类效率下降。【创新/局限】本文定义的风格数目较少,且图像 展示出的风格并不绝对,往往可以被赋予多种标签,今后应进一步丰富图像数据集并尝试进行多标签分类。  相似文献   

13.
[目的/意义]通过对网络舆情数据的动态监测和异常感知,及时预警舆情异常,为政府掌握舆情决策的先动优势提供理论模型和可行思路。[方法/过程]分析大数据环境下激增、波动等网络舆情数据异常现象,明确舆情趋势预测、动态感知异常等异常数据监测机理。基于此,首先运用Gompertz模型进行舆情趋势区间预测,其次定义偏离度进行数据异常评级,并确定预警等级,实现异常数据的及时捕捉和快速预警。[结论/结果]通过实例验证,证明了模型可行性,可以为政府舆情引导程度提供度量依据,也为编制智能化的舆情监测软件提供算法支持。  相似文献   

14.
With an increase in the number of data instances, data processing operations (e.g. clustering) requires an increasing amount of computational resources, and it is often the case that for considerably large datasets such operations cannot be executed on a single workstation. This requires the use of a server computer for carrying out the operations. However, to ensure privacy of the shared data, a privacy preserving data processing workflow involves applying an encoding transformation on the set of data points prior to applying the computation. This encoding should ideally cater to two objectives—first, it should be difficult to reconstruct the data, second, the results of the operation executed on the encoded space should be as close as possible to the results of the same operation executed on the original data. While standard encoding mechanisms, such as locality sensitive hashing, caters to the first objective, the second objective may not always be adequately satisfied.In this paper, we specifically focus on ‘clustering’ as the data processing operation. We apply a deep metric learning approach to learn a parameterized encoding transformation function with an objective to maximize the alignment of the clusters in the encoded space to those in the original data. We conduct experimentation on four standard benchmark datasets, particularly MNIST, Fashion-MNIST (each dataset contains 70K grayscale images), CIFAR-10 consisting of 60K color images and 20-Newsgroups containing 18K news articles. Our experiments demonstrate that the proposed method yields better clusters in comparison to approaches where the encoding process is agnostic of the clustering objective.  相似文献   

15.
莫桂江 《科技通报》2012,28(6):40-42
提出了一种异常参数映射估计的变频器异常动态参数检测算法。提取变频器异常动态参数,建立动态参数与变频器部件之间的映射关系,对变频器动态参数进行非线性变换,计算变频器动态参数异常区间排除干扰。实验证明,这种检测方式能够提高变频器异常检测的准确率,能够准确检测故障部件。  相似文献   

16.
李一帆  王玙 《情报科学》2022,40(6):115-123
【目的/意义】随着学科交叉与学科融合的不断深入,科研工作越来越需要多个学者合作完成。识别潜在的 合作关系,为学者推荐适合的合作对象,能有效提高科研效率。【方法/过程】基于动态网络表示学习模型对学者合 作关系预测展开研究。首先,提出一种动态网络表示学习模型 DynNE_Atten。其次,根据图书情报领域的文献数 据构建动态科研合作网络和动态关键词共现网络,使用 DynNE_Atten 模型得到作者向量表示和关键词向量表示, 同时提取作者单位特征。最后,融合作者合作、主题与单位特征,预测未来可能产生的合作。【结果/结论】实验结果 表明,本文提出的动态网络表示学习模型在时序链路预测任务中只需要较少的输入数据,就能达到较高的准确性; 相比于未融合特征的学者表示,融合模型在合作关系预测中展现出明显的优势。【创新/局限】提出了一种新的动态 网络表示学习模型,并融合主题特征和作者单位特征进行科研合作预测,取得了较好的结果。目前模型在特征融 合的方式上只考虑了数据层面的异构,并未考虑网络层面的异构。  相似文献   

17.
周林飞  姚雪  芦晓峰 《资源科学》2016,38(8):1538-1549
BP神经网络因具有自学习、自适应、大规模并行处理等特点而广泛应用于遥感影像分类中,但是该方法训练时容易陷入局部极小值,且收敛速度较慢,针对这些不足提出一种基于相容粗糙集的BP神经网络分类方法。本文以双台子河口湿地为研究对象,以Landsat-8 OLI影像为数据基础,利用相容粗糙集理论对样本数据集进行预处理,将得到的数据作为新的训练样本,在Matlab软件平台下建立BP神经网络的湿地覆被分类模型,进行湿地覆被信息提取,将分类结果与单纯的BP神经网络以及粗糙集样本属性约简预处理的分类结果进行比较分析。结果表明,基于相容粗糙集的BP神经网络分类方法可以剔除训练样本中的噪声数据,提高网络的训练成功率,缩短网络的收敛时间,分类效果较好,其总体精度达到91.25%,Kappa系数为0.8969,比单纯的BP神经网络分类结果高7.92%和0.0926,比粗糙集样本属性约简预处理方法的分类结果高3.03%和0.0357,是一种有效的湿地覆被分类方法。  相似文献   

18.
Anomalous event recognition requires an instant response to reduce the loss of human life and property; however, existing automated systems show limited performance due to considerations related to the temporal domain of the videos and ignore the significant role of spatial information. Furthermore, although current surveillance systems can detect anomalous events, they require human intervention to recognise their nature and to select appropriate countermeasures, as there are no fully automatic surveillance techniques that can simultaneously detect and interpret anomalous events. Therefore, we present a framework called Vision Transformer Anomaly Recognition (ViT-ARN) that can detect and interpret anomalies in smart city surveillance videos. The framework consists of two stages: the first involves online anomaly detection, for which a customised, lightweight, one-class deep neural network is developed to detect anomalies in a surveillance environment, while in the second stage, the detected anomaly is further classified into the corresponding class. The size of our anomaly detection model is compressed using a filter pruning strategy based on a geometric median, with the aim of easy adaptability for resource-constrained devices. Anomaly classification is based on vision transformer features and is followed by a bottleneck attention mechanism to enhance the representation. The refined features are passed to a multi-reservoir echo state network for a detailed analysis of real-world anomalies such as vandalism and road accidents. A total of 858 and 1600 videos from two datasets are used to train the proposed model, and extensive experiments on the LAD-2000 and UCF-Crime datasets comprising 290 and 400 testing videos reveal that our framework can recognise anomalies more effectively, outperforming other state-of-the-art approaches with increases in accuracy of 10.14% and 3% on the LAD-2000 and UCF-Crime datasets, respectively.  相似文献   

19.
祁巍  李一军  邹鹏 《预测》2007,26(5):42-47
由于不同区域间的人口漂移,即样本人群的特质变异,基于某地区样本构建的客户细分模型对其他地区客户分类时会出现较大误差。本文设计了面向数据漂移的贝叶斯网络算法,采用贝叶斯多网络为每类样本建立局部网络结构,增强模型对同类样本数据的拟合度,强化显示同类样本的共性特征,弱化不同区域间样本的差异性。实验表明,该方法显著改善模型对数据质量较差样本的适应性,提高对不同客户样本分类的准确率,适应我国各地区间人口特征差异性较大的国情。  相似文献   

20.
为去除网络入侵数据集中的冗余和噪声特征,降低数据处理难度和提高检测性能,提出一种基于特征选择和支持向量机的入侵检测方法。该方法采用提出的特征选择算法选取最优特征组合,并以支持向量机为分类器建立模型,应用于入侵检测系统。仿真结果表明,本文方法不仅可以减少特征维数,降低训练和测试时间,还能提高入侵检测的分类准确率。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号