期刊文献+

富属性异质信息网络的可约束异常检测 被引量:1

Constrained anomaly detection in heterogeneous information networks with rich attributes
原文传递
导出
摘要 针对仅考虑网络结构来对异质信息网络进行异常点发现可能带来的结果失真、难以理解等问题,提出一种富属性异质信息网络的可约束异常检测算法.通过将信息丰富的交互数据建模成富属性异质信息网络,以带属性元路径来指定用户感兴趣的属性和子空间,综合网络结构和属性内容两方面来评估节点的异常度,给出了可约束的异常检测算法框架.在Arxiv真实数据集上进行了实验,以带属性元路径来指定对作者、论文及论文的标题和摘要等方面的约束,对多个查询输出了异常度从高到低的节点列表及约束域异常点集合.结果表明:相比仅考虑网络结构或仅考虑属性内容的基准算法,平均准确率提高12.95%以上. For heterogeneous information networks,anomalous vertex detection taking into account network structures would possibly distort the results or produce complicated results.To solve this problem,an algorithm for constrained anomaly detection in attributed heterogeneous information networks(CADAHIN)was proposed.In this method,interactive data with rich information was modeled as an attributed heterogeneous information network,where users are allowed to specify attributes and sub-spaces through attributed meta paths and evaluate the outlierness of vertexes in terms of network structure and attribute content.On this basis,a constrained anomaly detection algorithm framework was presented.Experiments were conducted on the real-world dataset Arxiv.Under the constraints specified by attributed meta paths on author,paper,title and abstract,the queries output a top-klist of anomalous vertexes and a set of anomalous vertexes in the constraint domain.The results show that the proposed method outperforms the baseline algorithms considering only network structures or attribute contents by over at least 12.95%.
作者 张蕊 张桂发 郭记眀 蒋洪波 Zhang Rui;Zhang Guifa;Guo Jiming;Jiang Hongbo(School of Computer Science and Technology;Hubei Key Laboratory of Transportation Internet of Things;Hubei Key Laboratory of Inland Shipping Technology, Wuhan University of Technology, Wuhan 430070, China;School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan 430074, China)
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2017年第12期26-31,共6页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(61572219 61502192 61671216 61471408 51479157 51679182) 中央高校基本科研业务费专项资金资助项目(WUT:2016Ⅲ028) 内河航运技术湖北省重点实验室基金资助项目(NHHY2015005)
关键词 异常检测 异质信息网络 富属性 元路径 相似性 anomaly detection heterogeneous information network rich attribute meta path simi-larity
  • 相关文献

参考文献3

二级参考文献50

  • 1冯少冲,邸彦强,朱元昌,杨文兵.IaaS云计算中虚拟机部署算法研究[J].华中科技大学学报(自然科学版),2012,40(S1):359-364. 被引量:4
  • 2Chih-Chung Chang,Chih-Jen Lin.LIBSVM[J]ACM Transactions on Intelligent Systems and Technology (TIST),2011(3).
  • 3Zhan B, Monekosso DN, Remagnino P, Velastin SA, Xu LQ. Crowd analysis: A survey. Machine Vision and Applications, 2008, 19(5-6):345-357. [doi: 10.1007/s00138-008-0132-4].
  • 4Junior JCSJ, Musse SR, Jung CR. Crowd analysis using computer vision techniques. IEEE Signal Processing Magazine, 2010,27(5): 66-77. [doi: 10.1109/MSP.2010.937394].
  • 5Thida M, Yong YL, Climent-Perez p, Eng HL, Remagnino P. A literature review on video analytics of crowded scenes. In: Proc. of the Intelligent Multimedia Surveillance. Berlin, Heidelberg: Springer-Verlag, 2013. 17-36. [doi: 10.1007/978-3-642-41512-8 2].
  • 6Li T, Chang H, Wang M, Ni BB, Hong RC, Yan SC. Crowded scene analysis: A survey. IEEE Trans, on Circuits and Systems for Video Technology, 2014,25(3):367-386. [doi: 10.1109/TCSVT.2014.2358029].
  • 7Kong D, Gray D, Tao H. A viewpoint invariant approach for crowd counting. In: Proc. of the 18th Int’l Conf. on Pattern Recognition. 2006. 1187-1190. [doi: 10.1109/TCSVT.2014.2358029].
  • 8Kratz L, Nishino K. Tracking with local spatio-temporal motion patterns in extremely crowded scenes. In: Proc. of the Computer Vision and Pattern Recognition (CVPR). 2010. 693-700. [doi: 10.1109/CVPR.2010.5540149].
  • 9Benabbas Y, Ihaddadene N, Djeraba C. Motion pattern extraction and event detection for automatic visual surveillance. Journal on Image and Video Processing, 2011,2011(1):413-447. [doi: 10.1155/2011/163682].
  • 10Solmaz B, Moore BE, Shah M. Identifying behaviors in crowd scenes using stability analysis for dynamical systems. IEEE Trans, on Pattern Analysis and Machine Intelligence, 2012,34(10):2064-2070. [doi: 10.1109/TP AMI.2012.123].

共引文献40

同被引文献5

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部