期刊文献+

基于自然最近邻相似图的谱聚类 被引量:6

Spectral clustering based on natural nearest neighbor similarity graph
下载PDF
导出
摘要 传统谱聚类算法经常在处理一些结构复杂的数据集时效果不太理想,并且其相似度矩阵构造时参数的选取往往需要依靠多次实验及个人经验。在这种情况下,提出一种基于自然最近邻相似图的谱聚类(NSG-SC)算法。自然最近邻是一种新颖的最近邻概念,可以有效地避免K最近邻以及ε-最近邻方法需要人为设置参数的缺点。该算法构造相似度矩阵时依靠数据集自身的特性进行搜索,避免了参数选取不当以及离散点所带来的影响,更加真实地反映了数据集的结构关系。实验结果表明,提出的NSG-SC算法具有可行性和有效性。 The traditional spectral clustering algorithm cannot often get correct results on complex data sets,and the choice of parameters of affinity matrix construction depends on multiple tests and personal experience.Based on the situation,this paper proposed a spectral clustering algorithm based on natural nearest neighbor similarity graph(NSG-SC).Natural nearest neighbor was a novel concept in terms of nearest neighbor,and it could avoid the disadvantages of K-nearest neighbor andε-nearest neighbor.They usually needed set parameters artificially effectively.The algorithm constructed an affinity matrix depending on the characteristics of the data sets,and it avoided some adverse effects.It was that inappropriate choice of parameters and isolated points cause them.The algorithm could also reflect better characteristics of data.The results of experiment show that the proposed algorithm named NSG-SC has feasibility and effectiveness.
作者 刘友超 张曦煌 Liu Youchao;Zhang Xihuang(School of Internet of Things Engineering,Jiangnan University,Wuxi Jiangsu 214122,China)
出处 《计算机应用研究》 CSCD 北大核心 2020年第1期30-33,39,共5页 Application Research of Computers
基金 江苏省产学研合作项目(BY2015019-30).
关键词 谱聚类 自然最近邻 相似图 相似度矩阵 spectral clustering natural nearest neighbor similarity graph affinity matrix
  • 相关文献

参考文献2

二级参考文献20

  • 1余建桥,张帆.基于数据场改进的PAM聚类算法[J].计算机科学,2005,32(1):165-167. 被引量:15
  • 2淦文燕,李德毅,王建民.一种基于数据场的层次聚类方法[J].电子学报,2006,34(2):258-262. 被引量:82
  • 3高能,冯登国,向继.一种基于数据挖掘的拒绝服务攻击检测技术[J].计算机学报,2006,29(6):944-951. 被引量:44
  • 4ANDERSON J P.Computer Security Threat Monitoring and Surveillance[R].James P Anderson Co,Fort Washington,Pennsylvania,1980.
  • 5PORTNOY L,ESKIN E,STOLFO S J.Intrusion detection with unlabeled data using clustering[A].Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA2001)[C].Philadelphia,2001.5-8.
  • 6JIANG S Y,SONG X,WANG H,et al.A clustering-based method for unsupervised intrusion detections[J].Pattern Recognition Letters,2006,27(7):802-810.
  • 7ESKIN E,ARNOLD A,PRERAU M,et al.A geometric framework for unsupervised anomaly detection:detecting intrusions in unlabeled data[A].Applications of Data Mining in Computer Security[C].Boston,2002.78-99.
  • 8OLDMEADOW J,RAVINUTALA S,LECKIE C.Adaptive clustering for network intrusion detection[A].Advances in Knowledge Discovery and Data Mining[C].Heidelberg,2004.255-259.
  • 9LEUNG K,LECKIE C.Unsupervised anomaly detection in network intrusion detection using clusters[A].Proceedings of the Twenty-Eighth Australasian Computer Science Conference[C].Sydney,2005.333-342.
  • 10ZANERO S,SAVARESI S M.Unsupervised learning techniques for an intrusion detection system[A].Proceedings of the 2004 ACM Symposium on Applied Computing[C].New York,2004.412-419.

共引文献36

同被引文献79

引证文献6

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部