期刊文献+

不平衡数据知识挖掘:类分布对支持向量机分类的影响 被引量:17

Mining Knowledge from Unbalanced Data: Effect of Class Distribution on SVM Classification
下载PDF
导出
摘要 基于标准支持向量机及其启发,提出并证明支持向量数(率)和边界支持向量数(率)的界,并分别推广到正例类和反例类.在此基础上,证明正例的分类精度依概率小于反例的分类精度.虚拟数据仿真和Benchm ark数据仿真表明本文所提方法的有效性和结论的正确性.* Based on standard support vector machines (SVMs), the bound of both the support vector number (aaul rate) and boundary support vector number( and rate)is proposed and proved. Then the bounds are extended to positive class and negative class respectively. On the basis of the bounds, it is proved that the positive class yields poorer classification and predictive accuracy than the negative class does. Simulation results of both artificial data sets and benchmark data sets show that the conclusion and method in this paper is true and effective.
出处 《信息与控制》 CSCD 北大核心 2005年第6期703-708,共6页 Information and Control
关键词 不平衡数据 有偏分类器 支持向量机 unbalanced data set biased classifier support vector machine (SVM)
  • 相关文献

参考文献13

  • 1Vapnik V N. The Nature of Statistical Learning Theory [ M ].New York, USA: Springer-Verlag, 1999.
  • 2Burges C. A tutorial on support vector machines from pattern recognition [J]. Data Mining and Knowledge Discovery, 1998, 2 (2) : 121 -167.
  • 3Ge M, Zhang G C, Xu Y S, et al. Fault diagnosis using support vector machine with an application in sheet metal stamping operations [J]. Mechanical Systems and Signal Processing, 2004, 18(1): 143-159.
  • 4Chang R F, Wu W J, Woo K M. Support vector machines for diagnosis of breast tumors on US images [ J ]. Academic Radiology, 2003, 10(2): 189-197.
  • 5饶鲜,董春曦,杨绍全.应用支持向量机实现计算机入侵检测[J].西安电子科技大学学报,2003,30(3):353-356. 被引量:5
  • 6Kim H C, Pang S N, Je H M, et al. Constructing support vector machine ensemble [ J]. Pattern Recognition, 2003, 36 ( 12 ) :2757-2767.
  • 7Weiss G M, Provost F. The Effect of Class Distribution on Classifier Learning: an Empirical Study [ R]. New Jersey: Rutgers University, 2001.
  • 8Japkowicz N, Stephen S. The class imbalance problem : a systematic study [ J ]. Intelligent Data Analysis, 2002, 6 ( 5 ) : 429-449.
  • 9Domingos P. Metacost: a general method for making classifiers cost sensitive [ A]. Proceedings of the Fifth International Conference on Knowledge Discovery and Data Mining [ C ]. San Diego,CA: ACM Press, 1999. 155-164.
  • 10Drummond C, Holte R. Exploiting the cost (in) sensitivity of decision tree splitting criteria [ A]. Proceedings of the 17th International Conference on Machine Learning [ C ]. USA: Morgan Kanfraann, 2000. 239 -246.

二级参考文献6

  • 1Vapnik V N. The Nature of Statistical Learning Theory[M]. New York: Springer-Verlag, 1995.
  • 2Warrender C, Forrest S, Pearlmutter B. Detecting Intrusions Using System Calls: Alternative Data Models[ A ]. The 1999 IEEE Symposium on Security and Privacy[C]. Oaklnnd: IEEE Computer Society, 1999. 133-144.
  • 3Denning D E. An Intrusion Detection Model[J]. IEEE Trans on Software Engineering, 1987, 13(2): 222-232.
  • 4Forrest S, Perrelason A S. Self-nonself Discrimination in a Computer[A]. Proceedings of the 1994 IEEE Synposium on Besearch in Security and Privacy[C]. California: IEEE Computer Society, 1997. 202-212.
  • 5Lee W, Xiang D. Information-theoretic Measures for Anomaly Detection[A]. The 2001 IEEE Symposium on Security and Privacy[C].Oaklnnd: IEEE Computer Society, 2001. 130-143.
  • 6李鸿培,王新梅.基于神经网络的入侵检测系统模型[J].西安电子科技大学学报,1999,26(5):667-670. 被引量:41

共引文献4

同被引文献152

引证文献17

二级引证文献101

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部