Computer Science ›› 2020, Vol. 47 ›› Issue (1): 110-116.doi: 10.11896/jsjkx.181001921
• Database & Big Data & Data Science • Previous Articles Next Articles
JIN Yao1,XU Li-ya1,LV Hui-lin1,GU Su-hang2,3
CLC Number:
[1]WAN Y,LI H H,WU K F,et al.Fusion with layered features of LBP and HOG for face recognition[J].Journal of Computer-Aided Design & Computer Graphics,2015,27(4):640-650. [2]XI X F,ZHOU G D.A survey on deep learning for natural language processing[J].ACTA Automatica Sinica,2016,42(10):1445-1465. [3]WANG D,MIAO D Q,WANG R Z.A new method of EEG classification with feature extraction based on wavelet packet decomposition[J].ACTA Electronica Sinica,2013,41(1):193-198. [4]ZENG Z,WU C G,TANG Q H,et al.Classification of commodity image based on multi-feature fusion and depth learning[J].Computer Engineering and Design,2017,38(11):3093-3098. [5]ZHOU T,CHUNG F-L,WANG S T.Deep TSK fuzzy classifier with stacked generalization and triplely concise interpretability guarantee for large data[J].IEEE Transactions on Fuzzy Systems,2017,25(5):1207-1221. [6]DONG A,CHUNG F L,DENG Z,et al.Semi-supervised SVM with extended hidden features[J].IEEE Transactions on Cybernetics,2016,46(12):2924-2937. [7]HE X,ZHANG C,ZHANG L,et al.A optimal projection for image representation[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2016,38(5):1009-1015. [8]MOSCA A,MAGOULAS G D.Hardening against adversarial examples with the smooth gradient method[J].Soft Computing,2018,22(10):3203-3213. [9]KATHRIN G,NICOLAS P,PRAVEEN M,et al.Adversarial perturbations against deep neural networks for malware classification[J].arXiv:1511.04508. [10]MA Y K,WU L F,JIAN M,et al.Approach to generate adversarial examples for face-spoofing detection[J].Journal of Software,2019,30(2):279-290. [11]GU S X,RIGAZIO L.Towards deep neural network architectures robust to adversarial examples[C]∥International Confe-rence on Learning Representation(ICLR).Banff,Canada,2014. [12]ZHOU T,CHUNG F L,WANG S T.Deep TSK fuzzy classifier with stacked generalization and triplely concise interpretability guarantee for large data[J].IEEE Transactions on Fuzzy Systems,2017,25(5):1207-1221. [13]ZHANG Y P,ISHIBUCHI H,WANG S T.Deep Takagi- Sugeno-Kang fuzzy classifier with shared linguistic fuzzy rules[J].IEEE Transactions on Fuzzy Systems,2018,26(3):1535-1549. [14]VAPNIK V N.Statistical learning theory [M].New York:Wiley,1998. [15]XU Y T.Maximum margin of twin spheres support vector machine for imbalanced data classification[J].IEEE Transactions on Cybernetics,2017,47(6):1540-1550. [16]WANG Z R,WANG J,WANG Y R.An intelligent diagnosis scheme based on generative adversarial learning deep neural networks and its application to planetary gearbox fault pattern recognition[J].Neurocomputing,2018,310(8):213-222. [17]OZSOY M,KHASAWNEH K N,DONOVICK C,et al.Hardware-based malware detection using low-level architectural features[J].IEEE Transactions on Computers,2016,65(11):3332-3344. [18]TANG J J,LEU G,ABBASS H A.Networking the boids is more robust against adversarial learning[J].IEEE Transactions on Network Science and Engineering,2018,5(2):141-155. [19]BURGES C J C.A tutorial on support vector machines for pattern recognition[J].Data Mining and Knowledge Discovery,1998,2(2):121-167. [20]CHANG C C,LIN C J.LIBSVM:A library for support vector machines[J].ACM Transactions on Intelligent Systems and Technology,2011,2(3):27:1-27:27. [21]WANG Y S,XIA S T,TANG Q T,et al.A novel consistent random forest framework:Bernoulli random forests[J].IEEE Transactions on Neural Networks and Learning Systems,2018,29(8):3510-3523. [22]OSHIRO T M,PEREZ P S,BARANAUSKAS J A.How many trees in a random forest?[C]∥International Conference on Machine Learning and Data Mining in Pattern Recognition.2012. [23]QUINLAN J R.Induction of Decision Trees[J].Machine Lear- ning,1986,1(1):81-106. [24]RUSSEL S,NORVIG P.Artificial intelligence:A modern ap- proach (2nd ed.)[M].Prentice Hall,2003:597. [25]HINTON G E,OSINDERO S,TEH Y W.A faster learning algorithm for deep belief nets[J].Neural Computation,2006,1(7):1527-1544. [26]SON N T,ARTUR S D,AVILA G.Deep logic networks:Inserting and extracting knowledge from deep belief networks[J].IEEE Transactions on Neural Networks and Learning Systems,2018,29(2):246-258. [27]CHONG Z,PIN L,QIN A K,et al.Multiobjective deep belief networks ensemble for remaining useful life estimation in prognostics[J].IEEE Transactions on Neural Networks and Lear-ning Systems,2017,28(10):2306-2318. [28]FRANK A,ASUNCION A.(2010) UCI Machine Learning Repository [OL].http://archive.ics.uci.edu/ml. [29]ALCALÁ-FDEZ J,FERNÁNDEZ A,LUENGO J,et al.KEEL data-mining software tool:Data set repository,integration of algorithms and experimental analysis framework[J].Journal of Multiple-Valued Logic and Soft Computing,2011,17(2/3):255-287. [30]ITO K,NAKANO R.Optimizing support vector regression hyper-parameters based on cross-validation[C]∥International Joint Conference on Neural Networks(IJCNN).Istanbul,Turkey,2003:2077-2082. [31]DEMSAR J.Statistical comparisons of classifiers over multiple data sets[J].Journal of Machine Learning Research,2006,7:1-30. [32]ZAR J H.Biostatistical Analysis(4th ed)[M].Prentice Hall,Englewood Clifs,New Jersey,1998. [33]SHESKIN D J.Handbook of parametric and nonparametric statistical procedures[M].Chapman and Hall/CRC,2000. |
[1] | WANG Zhen-wu, SUN Jai-jun, YU Zhong-yi and BU Yi-ya. Review of Remote Sensing Image Classification Based on Support Vector Machine [J]. Computer Science, 2016, 43(9): 11-17. |
[2] | YU Wen-yong, KANG Xiao-dong, GE Wen-jie and WANG Hao. Image Classification and Identification through SVM Based on Fuzzy Kernel Clustering [J]. Computer Science, 2015, 42(3): 307-310. |
[3] | SHENG Jia-chuan. Automatic Categorization of Traditional Chinese Paintings Based on Wavelet Transform [J]. Computer Science, 2014, 41(2): 317-319. |
[4] | . Method for Capture and Classification of New Intrusions [J]. Computer Science, 2012, 39(Z11): 45-50. |
[5] | . Intrusion Detection System Based on Choosing Characters and Weighting Characters [J]. Computer Science, 2012, 39(1): 89-91. |
|