期刊文献+

带虚警抑制的基于归一化残差的野值检测方法 被引量:4

Normalized Residual-based Outlier Detection with False-alarm Probability Controlling
下载PDF
导出
摘要 野值检测,或称异常值检测是模式识别和知识发现中一个重要的问题。以往的野值检测方法难以有效地抑制虚警概率,针对这一问题,该文提出一种带监督情形下基于归一化残差(Normalized Residual,NR)的野值检测方法。首先利用训练样本计算待考查模式的NR值,其次比较NR值与野值检测门限的相对大小,从而判断待考查模式是否为野值。该文理论上推导了野值门限与虚警概率之间的关系表达式,以此为依据设置检测门限,可实现在少量训练样本情况下仍能抑制虚警率的目的。计算机仿真和实测数据测试验证了所提方法在野值检测和虚警抑制方面的优越性能。 Outlier detection, also called anomaly detection, is an important issue in pattern recognition and knowledge discovery. Previous outlier detection methods can not effectively control the false-alarm probability. To solve the problem, a supervised method based on Normalized Residual(NR) is proposed. Using the training patterns, it first calculates the NR value of the query pattern, which is compared with a predefined detection threshold to determine whether the pattern is an outlier. In this paper, the relationship between the threshold and false-alarm probability is theoretically derived, based on which an appropriate threshold can be chosen. In this way,the desired false-alarm probability can be obtained even when few training patterns are available. Simulations and measured data experiments validate the superior performance of the proposed method on outlier detection and false-alarm probability controlling.
出处 《电子与信息学报》 EI CSCD 北大核心 2015年第12期2898-2905,共8页 Journal of Electronics & Information Technology
关键词 模式识别 监督 野值检测 虚警概率 归一化残差 Pattern recognition Supervised Outlier detection False-alarm probability Normalized Residual(NR)
  • 相关文献

参考文献19

  • 1Hawkins D.Identification of Outliers[M].London:Chapman and Hall,1980:Chapter 1-2.
  • 2Liu J,Wan J,Zheng H,et al..A method of specific emitter verification based on CSDA and SVDD[C].Proceedings of the IEEE 2nd International Conference on Computer Science and Network Technology,Changchun,China,2012:562-565.
  • 3Miller D J and Browning J.A mixture model and EM-based algorithm for class discovery,robust classification,and outlier rejection in mixed labeled/unlabeled data sets[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2003,25(11):1468-1483.
  • 4Westerweel J and Scarano F.Universal outlier detection for PIV data[J].Experiments in Fluids,2005,39(6):1096-1100.
  • 5Duncan J,Dabiri D,Hove J,et al..Universal outlier detection for Particle Image Velocimetry (PIV) and Particle Tracking Velocimetry (PTV) data[J].Measurement Science and Technology,2010,21(5):57002-57006.
  • 6Wu S and Wang S R.Information-theoretic outlier detection for large-scale categorical data[J].IEEE Transactions on Knowledge and Data Engineering,2013,25(3):589-602.
  • 7Li Z G,Baseman R J,Zhu Y D,et al..A unified framework for outlier detection in trace data analysis[J].IEEE Transactions on Semiconductor Manufacturing,2014,27(1):95-103.
  • 8Albanese A,Pal S K,and Petrosino A.Rough sets,kernel set,and spatiotemporal outlier detection[J].IEEE Transactions on Knowledge and Data Engineering,2014,26(1):194-207.
  • 9Ghosh A K and Chaudhuri P.On maximum depth and related classifiers[J].Scandinavian Journal of Statistics,2005,32(2):327-350.
  • 10Ru X H,Liu Z,and Jiang W L.Normalized residual-based outlier detection[C].Proceedings of the IEEE International Conference on Signal Processing,Communications and Computing (ICSPCC),Guilin,China,2014:190-193.

二级参考文献20

  • 1Wiley R G. ELINT: The Interception and Analysis of Radar Signals [M]. Norwood: Artech House, 2006, Chapter 1.
  • 2Langley L E. Specific emitter identification (SEI) and classical parameter fusion technology[C]. Proceedings of IEEE WESCON, San Francisco, 1993: 28-30.
  • 3Nichols J M, Bucholtz F, and Nousain B. Automated, rapid classification of signals using locally linear embedding[J]. Expert Systems with Applications, 2011, 38(10): 13472-13474.
  • 4Kazakevich G M, Pavlov V M, Jeong Y U, et al.. Intrapulse frequency stability of a magnetron frequency-locked through a wave reflected from an accelerating cavity[J]. Nuclear Instruments and Methods in Physics Research A, 2011, 647(1): 10-16.
  • 5Hammi O, Younes M, and Ghannouchi F M. Metrics and methods for benchmarking of RF transmitter behavioral models with application to the development of a hybrid memory polynomial model[J]. IEEE Transactions on Broadcast, 2010, 56(3): 350-357.
  • 6D'agostino S, Foglia G, and Pistoia D. Specific emitter identification: analysis on real radar signal data [C]. Proceedings of the 6th European Radar Conference, Rome, Italy, 2009: 242-245.
  • 7Aubry A, Bazzoni A, Carotenuto V, et al.. Cumulants-based radar specific emitter identification[C]. Proceedings of IEEE International Workshop on Information Forensics and Security (WIFS), Iguacu Falls, Brazil, 2011: 1-6.
  • 8Song C, Xu J, and Zhan Y. A method for specific emitter identification based on empirical mode decomposition[C], Proceedings of IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), Beijing, China, 2010: 54-57.
  • 9Conning M and Potgieter F. Analysis of measured radar data for specific emitter identification[C]. Proceedings of IEEE Radar Conference, Arlington, VA, USA, 2010: 35-38.
  • 10Kawalec A, Owczarek R, and Dudczyk J. Data modeling and simulation applied to radar signal recognition[J]. Molecular and Quantum Acoustics, 2005, 26(7): 165-173.

共引文献10

同被引文献25

引证文献4

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部