期刊文献+
共找到786篇文章
< 1 2 40 >
每页显示 20 50 100
面向钓鱼网站敏感特征项选取的IIGAIN算法 被引量:5
1
作者 王燕 王兴芬 任俊玲 《计算机应用与软件》 CSCD 2016年第4期297-301,共5页
传统的钓鱼网站检测技术主要采用随机或者凭经验选取敏感特征项用于检测的方法,无法保证检测的准确性。为此,提出一种面向钓鱼网站敏感特征选取的改进的信息增益算法IIGAIN(Improved Information Gain Algorithm)。该算法综合考虑了特... 传统的钓鱼网站检测技术主要采用随机或者凭经验选取敏感特征项用于检测的方法,无法保证检测的准确性。为此,提出一种面向钓鱼网站敏感特征选取的改进的信息增益算法IIGAIN(Improved Information Gain Algorithm)。该算法综合考虑了特征项的类内离散度,通过对特征项的类内离散度差值做相应的处理,以处理后的结果作为惩罚项改进信息增益算法。实验结果表明,利用IIGAIN进行特征项选取的钓鱼网站检测方法的检测准确性明显优于随机选取特征项的钓鱼网站检测方法。 展开更多
关键词 钓鱼网站检测 敏感特征项 信息增益 类内离散度
下载PDF
Novel cued search strategy based on information gain for phased array radar 被引量:4
2
作者 Lu Jianbin Hu Weidong Xiao Hui Yu Wenxian 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期292-297,共6页
A search strategy based on the maximal information gain principle is presented for the cued search of phased array radars. First, the method for the determination of the cued search region, arrangement of beam positio... A search strategy based on the maximal information gain principle is presented for the cued search of phased array radars. First, the method for the determination of the cued search region, arrangement of beam positions, and the calculation of the prior probability distribution of each beam position is discussed. And then, two search algorithms based on information gain are proposed using Shannon entropy and Kullback-Leibler entropy, respectively. With the proposed strategy, the information gain of each beam position is predicted before the radar detection, and the observation is made in the beam position with the maximal information gain. Compared with the conventional method of sequential search and confirm search, simulation results show that the proposed search strategy can distinctly improve the search performance and save radar time resources with the same given detection probability. 展开更多
关键词 phased array radar search strategy cued search beam position information gain.
下载PDF
Information gain based sensor search scheduling for low-earth orbit constellation estimation 被引量:3
3
作者 Bo Wang Jun Li +1 位作者 Wei An Yiyu Zhou 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第6期926-932,共7页
This paper addresses the problem of sensor search scheduling in the complicated space environment faced by the low-earth orbit constellation.Several search scheduling methods based on the commonly used information gai... This paper addresses the problem of sensor search scheduling in the complicated space environment faced by the low-earth orbit constellation.Several search scheduling methods based on the commonly used information gain are compared via simulations first.Then a novel search scheduling method in the scenarios of uncertainty observation is proposed based on the global Shannon information gain and beta density based uncertainty model.Simulation results indicate that the beta density model serves a good option for solving the problem of target acquisition in the complicated space environments. 展开更多
关键词 low-earth orbit constellation sensor network scheduling algorithm information gain acquisition.
下载PDF
Sensor management based on fisher information gain 被引量:2
4
作者 Tian Kangsheng Zhu Guangxi 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第3期531-534,共4页
Multi-sensor system is becoming increasingly important in a variety of military and civilian applications. In general, single sensor system can only provide partial information about environment while multi-sensor sys... Multi-sensor system is becoming increasingly important in a variety of military and civilian applications. In general, single sensor system can only provide partial information about environment while multi-sensor system provides a synergistic effect, which improves the quality and availability of information. Data fusion techniques can effectively combine this environmental information from similar and/or dissimilar sensors. Sensor management, aiming at improving data fusion performance by controlling sensor behavior, plays an important role in a data fusion process. This paper presents a method using fisher information gain based sensor effectiveness metric for sensor assignment in multi-sensor and multi-target tracking applications. The fisher information gain is computed for every sensor-target pairing on each scan. The advantage for this metric over other ones is that the fisher information gain for the target obtained by multi-sensors is equal to the sum of ones obtained by the individual sensor, so standard transportation problem formulation can be used to solve this problem without importing the concept of pseudo sensor. The simulation results show the effectiveness of the method. 展开更多
关键词 data fusion sensor management fisher information gain linear programming.
下载PDF
Application of Information Gain to Estimating the Seismic Tendency 被引量:2
5
作者 Shen Ping,Shen Jing,and Feng GuozhengInstitute of Geophysics,SSB,Beijing 100081,China 《Earthquake Research in China》 1997年第2期44-50,共7页
Considering two seismic parameters,energy and the frequency of an earthquake as a whole from the definition of information gain in entropy,we study the information gain of M≥6.0 earthquakes from the world earthquake ... Considering two seismic parameters,energy and the frequency of an earthquake as a whole from the definition of information gain in entropy,we study the information gain of M≥6.0 earthquakes from the world earthquake catalogue during 1900-1992.The results show that the information gain decreases before strong earthquakes.Our study of the recent seismic tendency of large earthquakes shows that the probability of earthquakes with M≥8.5 is low for the near future around the world.The information gain technique provides a new approach to tracing and predicting earthquakes from the data of moderate and small earthquakes. 展开更多
关键词 Application of information gain to Estimating the Seismic Tendency
下载PDF
基于IG-CPSO-BP的水工钢闸门安全等级识别 被引量:1
6
作者 周伦钢 赵松波 +1 位作者 仝戈 许亮 《人民黄河》 CAS 北大核心 2023年第7期130-133,162,共5页
为提高BP神经网络对水工钢闸门安全等级识别的速度和精度,构建基于信息增益(IG)和混沌粒子群优化(CPSO)算法优化BP神经网络的水工钢闸门安全等级评估模型。该模型利用IG算法精简水工钢闸门安全等级评估的特征指标,避免冗余变量干扰,提... 为提高BP神经网络对水工钢闸门安全等级识别的速度和精度,构建基于信息增益(IG)和混沌粒子群优化(CPSO)算法优化BP神经网络的水工钢闸门安全等级评估模型。该模型利用IG算法精简水工钢闸门安全等级评估的特征指标,避免冗余变量干扰,提升模型的训练速度;利用CPSO算法优化BP神经网络的初始权重,提高模型的收敛性及对水工钢闸门安全等级的分类能力。经过验证分析,基于IG-CPSO-BP的水工钢闸门安全等级评估模型的评估结果与实际的水工钢闸门安全等级基本吻合,识别精度明显优于IG-BP、IG-GA-BP、IG-PSO-BP模型。 展开更多
关键词 信息增益 混沌粒子群优化算法 BP神经网络 安全等级识别 水工钢闸门
下载PDF
Assessment of Sentiment Analysis Using Information Gain Based Feature Selection Approach
7
作者 R.Madhumathi A.Meena Kowshalya R.Shruthi 《Computer Systems Science & Engineering》 SCIE EI 2022年第11期849-860,共12页
Sentiment analysis is the process of determining the intention or emotion behind an article.The subjective information from the context is analyzed by the sentimental analysis of the people’s opinion.The data that is... Sentiment analysis is the process of determining the intention or emotion behind an article.The subjective information from the context is analyzed by the sentimental analysis of the people’s opinion.The data that is analyzed quantifies the reactions or sentiments and reveals the information’s contextual polarity.In social behavior,sentiment can be thought of as a latent variable.Measuring and comprehending this behavior could help us to better understand the social issues.Because sentiments are domain specific,sentimental analysis in a specific context is critical in any real-world scenario.Textual sentiment analysis is done in sentence,document level and feature levels.This work introduces a new Information Gain based Feature Selection(IGbFS)algorithm for selecting highly correlated features eliminating irrelevant and redundant ones.Extensive textual sentiment analysis on sentence,document and feature levels are performed by exploiting the proposed Information Gain based Feature Selection algorithm.The analysis is done based on the datasets from Cornell and Kaggle repositories.When compared to existing baseline classifiers,the suggested Information Gain based classifier resulted in an increased accuracy of 96%for document,97.4%for sentence and 98.5%for feature levels respectively.Also,the proposed method is tested with IMDB,Yelp 2013 and Yelp 2014 datasets.Experimental results for these high dimensional datasets give increased accuracy of 95%,96%and 98%for the proposed Information Gain based classifier for document,sentence and feature levels respectively compared to existing baseline classifiers. 展开更多
关键词 Sentiment analysis sentence level document level feature level information gain
下载PDF
Intelligent Biometric Information Management
8
作者 Harry Wechsler 《Intelligent Information Management》 2010年第9期499-511,共13页
We advance here a novel methodology for robust intelligent biometric information management with inferences and predictions made using randomness and complexity concepts. Intelligence refers to learning, adap- tation,... We advance here a novel methodology for robust intelligent biometric information management with inferences and predictions made using randomness and complexity concepts. Intelligence refers to learning, adap- tation, and functionality, and robustness refers to the ability to handle incomplete and/or corrupt adversarial information, on one side, and image and or device variability, on the other side. The proposed methodology is model-free and non-parametric. It draws support from discriminative methods using likelihood ratios to link at the conceptual level biometrics and forensics. It further links, at the modeling and implementation level, the Bayesian framework, statistical learning theory (SLT) using transduction and semi-supervised lea- rning, and Information Theory (IY) using mutual information. The key concepts supporting the proposed methodology are a) local estimation to facilitate learning and prediction using both labeled and unlabeled data;b) similarity metrics using regularity of patterns, randomness deficiency, and Kolmogorov complexity (similar to MDL) using strangeness/typicality and ranking p-values;and c) the Cover – Hart theorem on the asymptotical performance of k-nearest neighbors approaching the optimal Bayes error. Several topics on biometric inference and prediction related to 1) multi-level and multi-layer data fusion including quality and multi-modal biometrics;2) score normalization and revision theory;3) face selection and tracking;and 4) identity management, are described here using an integrated approach that includes transduction and boosting for ranking and sequential fusion/aggregation, respectively, on one side, and active learning and change/ outlier/intrusion detection realized using information gain and martingale, respectively, on the other side. The methodology proposed can be mapped to additional types of information beyond biometrics. 展开更多
关键词 Authentication Biometrics Boosting Change DETECTION Complexity Cross-Matching Data Fusion Ensemble Methods Forensics Identity MANAGEMENT Imposters Inference INTELLigENT information MANAGEMENT Margin gain MDL Multi-Sensory Integration Outlier DETECTION P-VALUES Quality Randomness Ranking Score Normalization Semi-Supervised Learning Spectral Clustering STRANGENESS Surveillance Tracking TYPICALITY Transduction
下载PDF
Research on the Intelligent Distribution System of College Dormitory Based on the Decision Tree Classification Algorithm 被引量:1
9
作者 Huiping Han Beida Wang 《Journal of Contemporary Educational Research》 2023年第2期7-14,共8页
The trend toward designing an intelligent distribution system based on students’individual differences and individual needs has taken precedence in view of the traditional dormitory distribution system,which neglects... The trend toward designing an intelligent distribution system based on students’individual differences and individual needs has taken precedence in view of the traditional dormitory distribution system,which neglects the students’personality traits,causes dormitory disputes,and affects the students’quality of life and academic quality.This paper collects freshmen's data according to college students’personal preferences,conducts a classification comparison,uses the decision tree classification algorithm based on the information gain principle as the core algorithm of dormitory allocation,determines the description rules of students’personal preferences and decision tree classification preferences,completes the conceptual design of the database of entity relations and data dictionaries,meets students’personality classification requirements for the dormitory,and lays the foundation for the intelligent dormitory allocation system. 展开更多
关键词 Intelligent allocation Personal preference information gain Decision tree classification INDIVIDUALIZATION
下载PDF
山地城市江滩型非正式绿地游憩机会谱构建——以重庆两江四岸为例
10
作者 罗丹 邵文怡 罗融融 《风景园林》 北大核心 2024年第2期64-72,共9页
【目的】江滩是山地城市中具有重要游憩价值的特殊的非正式绿地类型,当前存在游憩需求与游憩环境不适配、游憩体验下降的问题。为了探寻合理的江滩空间利用途径,需要从游憩机会的角度对江滩非正式绿地进行识别和分类优化。【方法】明确... 【目的】江滩是山地城市中具有重要游憩价值的特殊的非正式绿地类型,当前存在游憩需求与游憩环境不适配、游憩体验下降的问题。为了探寻合理的江滩空间利用途径,需要从游憩机会的角度对江滩非正式绿地进行识别和分类优化。【方法】明确山地城市江滩型非正式绿地定义与特征,选取重庆两江四岸范围内20个江滩空间单元,通过现场调研、问卷调查与因子分析建立游憩机会指标体系并构建游憩机会谱。【结果】识别出自然体验型、日常生活型、人文特色型和城市观光型4种江滩游憩环境类型及对应特征,构建重庆两江四岸江滩型非正式绿地游憩机会谱,从整体与分类2个维度提出江滩游憩环境品质提升策略。【结论】山地城市江滩型非正式绿地游憩机会谱的构建与应用,可进一步指导各类型江滩及其周边环境的规划、建设与管理,对山地城市蓝绿空间开放共享具有重要意义。 展开更多
关键词 风景园林 非正式绿地 游憩机会谱 江滩 重庆市
下载PDF
集合CHI与IG的特征选择方法 被引量:22
11
作者 王光 邱云飞 史庆伟 《计算机应用研究》 CSCD 北大核心 2012年第7期2454-2456,共3页
通过分析特征词与类别间的相关性,在原有卡方特征选择和信息增益特征选择的基础上提出了两个参数,使得选出的特征词集中分布在某一特定类,并且使特征词在这一类中出现的次数尽可能地多;最后集合CHI与IG两种算法得到一种集合特征选择方法... 通过分析特征词与类别间的相关性,在原有卡方特征选择和信息增益特征选择的基础上提出了两个参数,使得选出的特征词集中分布在某一特定类,并且使特征词在这一类中出现的次数尽可能地多;最后集合CHI与IG两种算法得到一种集合特征选择方法(CCIF)。通过实验对比传统的卡方特征选择、信息增益和CCIF方法,CCIF方法使得算法的微平均查准率得到了明显的提高。 展开更多
关键词 文本分类 特征选择 卡方统计 信息增益
下载PDF
基于IG-LASSO模型的城市空气质量指数混合预测研究 被引量:12
12
作者 刘炳春 郑红梅 张斌 《环境科学与技术》 CAS CSCD 北大核心 2017年第11期144-148,共5页
空气质量指数是各个地区空气污染状况的数据表征,可用于政府对城市空气污染的控制。论文使用天津市2014年1月1日-2016年4月30日的空气质量数据和气象数据,建立一个基于IG(信息增益)和LASSO(最小绝对收缩率和选择算子)的空气质量指数混... 空气质量指数是各个地区空气污染状况的数据表征,可用于政府对城市空气污染的控制。论文使用天津市2014年1月1日-2016年4月30日的空气质量数据和气象数据,建立一个基于IG(信息增益)和LASSO(最小绝对收缩率和选择算子)的空气质量指数混合预测模型,对未来一天的空气质量指数进行预测。整体实验由预测模型选取、特征变量选取和混合预测3个部分组成。实验结果说明基于IG和LASSO的空气质量指数混合预测模型要比单独使用LASSO模型的预测准确性要好,其误差率为4.75%,并且空气质量指数混合预测模型也可以有效的减少输入变量的数量以及降低模型的复杂程度。同时,也得出天津市空气质量指数的预测准确度受PM_(10)、PM_(2.5)、NO_2和SO_(2)4种空气污染物浓度影响较大,与风向、天气现象和风力关联性不强的结论。 展开更多
关键词 空气质量指数 预测 信息增益 LASSO模型
下载PDF
基于词频分布信息的优化IG特征选择方法 被引量:9
13
作者 刘海峰 刘守生 宋阿羚 《计算机工程与应用》 CSCD 北大核心 2017年第4期113-117,122,共6页
文本特征选择是文本分类的核心技术。针对信息增益模型的不足之处,以特征项的频数在文本中不同层面的分布为依据,分别从特征项基于文本的类内分布、基于词频的类内分布以及词频的类间分布等角度对IG模型逐步进行改进,提出了一种基于词... 文本特征选择是文本分类的核心技术。针对信息增益模型的不足之处,以特征项的频数在文本中不同层面的分布为依据,分别从特征项基于文本的类内分布、基于词频的类内分布以及词频的类间分布等角度对IG模型逐步进行改进,提出了一种基于词频分布信息的优化IG特征选择方法。随后的文本分类实验验证了提出的优化IG模型的有效性。 展开更多
关键词 信息增益 特征选择 类内分布 类间分布 文本分类
下载PDF
基于改进RIG算法的动态诊断策略生成 被引量:5
14
作者 李登 万福 +1 位作者 尹亚兰 周红波 《电子测量与仪器学报》 CSCD 2014年第2期159-163,共5页
针对TEAMS生成的静态诊断策略无法满足现场诊断的需求,在研究rollout信息启发式(RIG)算法的基础上,提出了一种基于改进RIG算法的动态诊断策略生成方法。首先通过改进原有的RIG算法使之符合动态诊断的需要;然后根据现场诊断过程中出现的... 针对TEAMS生成的静态诊断策略无法满足现场诊断的需求,在研究rollout信息启发式(RIG)算法的基础上,提出了一种基于改进RIG算法的动态诊断策略生成方法。首先通过改进原有的RIG算法使之符合动态诊断的需要;然后根据现场诊断过程中出现的各种具体情况,获取局部D矩阵;在此基础上利用改进的RIG算法选择出下一步最佳的测试,最终实现了故障诊断策略的动态生成。仿真实例表明,若直接采用基于RIG算法的静态诊断策略,需要4种类型的测试;若采用基于改进RIG算法的动态诊断策略生成方法,只需选择一步测试即能诊断出系统故障。该方法能够实现维修人员的交互式诊断,有效地提高了故障诊断策略的实用性。 展开更多
关键词 诊断策略 D矩阵 Rig算法 故障诊断
下载PDF
一种用于运动想象脑电信号的混合特征选择算法
15
作者 刘紫恒 周建华 《兰州大学学报(自然科学版)》 CAS CSCD 北大核心 2024年第2期167-172,共6页
针对过滤式特征选择算法精度不高和包裹式特征选择算法训练时间长的缺点,提出一种融合信息增益(IG)和自适应遗传算法(AGA)的混合特征选择算法.用滤波器组公共空间模式提取运动想象脑电信号特征,计算每个特征的IG并排序,根据排序用阈值... 针对过滤式特征选择算法精度不高和包裹式特征选择算法训练时间长的缺点,提出一种融合信息增益(IG)和自适应遗传算法(AGA)的混合特征选择算法.用滤波器组公共空间模式提取运动想象脑电信号特征,计算每个特征的IG并排序,根据排序用阈值法剔除部分无用特征,用AGA在剩余特征中搜索出最优特征子集.用2个公共数据集验证所提出算法的有效性,取得81.24%±15.04%的平均分类准确率,平均用时3.68 s.所提出算法的分类准确率大于过滤式算法,训练时长短于包裹式算法. 展开更多
关键词 运动想象 特征选择 信息增益 自适应遗传算法
下载PDF
基于特征加权的KNN模型岩性识别方法
16
作者 郭雨姗 王万银 《物探与化探》 CAS 2024年第2期428-436,共9页
岩性识别是一项重要的地质工作,为固体矿产勘探与油气勘探奠定了坚实的地质基础。岩石物性是连接岩性和地球物理场的桥梁,可以通过物性之间的差异进行岩性识别,但不同岩石的物性数据往往存在一定重合,仅靠交会图无法准确地识别岩性。KN... 岩性识别是一项重要的地质工作,为固体矿产勘探与油气勘探奠定了坚实的地质基础。岩石物性是连接岩性和地球物理场的桥梁,可以通过物性之间的差异进行岩性识别,但不同岩石的物性数据往往存在一定重合,仅靠交会图无法准确地识别岩性。KNN(K近邻)模型是一种简单、直接的机器学习方法,准确度和灵敏度都很高,适用于多分类问题。基于此,本文将基于特征加权的KNN模型引入岩性识别中,该方法将传统KNN模型与属性特征的信息增益相结合,对不同特征赋予不同权重,可以直观地反映属性特征对分类的重要程度。实验证明,相比于传统KNN方法,基于特征加权的KNN模型对岩性交界处的识别能力有大幅提升,整体提高了岩性识别的准确性和稳定性。 展开更多
关键词 KNN 岩性识别 信息增益 特征权重
下载PDF
基于IG-SVM模型的供应链融资企业信用风险预测 被引量:11
17
作者 潘永明 王雅杰 来明昭 《南京理工大学学报》 EI CAS CSCD 北大核心 2020年第1期117-126,共10页
为了提高对供应链融资中小企业信用风险预测的精度,在通过对中小企业信用风险评价研究基础上集成机器学习算法构建了能够提高信用风险预测的组合模型。该模型采用支持向量机(Support vector machine,SVM)建立供应链中小企业信用风险分... 为了提高对供应链融资中小企业信用风险预测的精度,在通过对中小企业信用风险评价研究基础上集成机器学习算法构建了能够提高信用风险预测的组合模型。该模型采用支持向量机(Support vector machine,SVM)建立供应链中小企业信用风险分类预测模型,并引入信息增益(Information gain,IG)提取对预测结果有显著贡献的特征变量,优化模型特征输入。在与其他模型的对比实验中可知,采用IG-SVM模型预测的测试样本精确度为97.62%,比单一SVM模型精度提高8.97%。采用IG进行特征优化,能进一步提高SVM模型的预测能力。 展开更多
关键词 供应链融资 信息增益 支持向量机 信用风险 分类预测
下载PDF
融合稀疏注意力机制在DDoS攻击检测中的应用
18
作者 王博 万良 +2 位作者 叶金贤 刘明盛 孙菡迪 《计算机工程与设计》 北大核心 2024年第5期1312-1320,共9页
针对现有的DDoS(distributed denial of service)攻击检测模型面临大量数据时,呈现出检测效率低的问题。为适应当前网络环境,通过研究DDoS攻击检测模型、提取流量特征、计算攻击密度,提出一种基于融合稀疏注意力机制的DDoS攻击检测模型G... 针对现有的DDoS(distributed denial of service)攻击检测模型面临大量数据时,呈现出检测效率低的问题。为适应当前网络环境,通过研究DDoS攻击检测模型、提取流量特征、计算攻击密度,提出一种基于融合稀疏注意力机制的DDoS攻击检测模型GVBNet(global variable block net),使用攻击密度自适应计算稀疏注意力。利用信息熵以及信息增益分析提取攻击流量的连续字节作为特征向量,通过构建基于GVBNet的网络模型在两种数据集上进行训练。实验结果表明,该方法具有良好的识别效果、检测速度以及抗干扰能力,在不同的环境下具有应用价值。 展开更多
关键词 分布式拒绝服务攻击 稀疏注意力机制 攻击密度 信息熵 信息增益 模型优化 攻击检测
下载PDF
基于特征加权混合隶属度的模糊孪生支持向量机
19
作者 吕思雨 赵嘉 +2 位作者 吴烈阳 张翼英 韩龙哲 《南昌工程学院学报》 CAS 2024年第1期93-101,118,共10页
模糊孪生支持向量机(FTSVM)忽略了不同特征间的差异,导致核函数或距离的计算无法准确反映样本间的相似性,使FTSVM在处理含有大量不相关或弱相关特征的高维数据分类时,难以达到良好分类效果;且隶属度的设计未有效区分离群点或噪声。针对... 模糊孪生支持向量机(FTSVM)忽略了不同特征间的差异,导致核函数或距离的计算无法准确反映样本间的相似性,使FTSVM在处理含有大量不相关或弱相关特征的高维数据分类时,难以达到良好分类效果;且隶属度的设计未有效区分离群点或噪声。针对以上问题,提出了一种基于特征加权混合隶属度的FM-FTSVM。首先计算每个特征的信息增益,并依据信息增益值的大小为特征赋予权重,降低不相关或弱相关特征的作用,使其能更好地应用于高维数据分类;然后,为每一类样本构造一个最小包围球计算基于紧密度的特征加权隶属度,并结合基于距离的特征加权隶属度得到特征加权混合隶属度,综合考虑样本点到类中心的特征加权欧式距离和样本间的紧密程度,可更好识别离群点或噪声数据;最后,融合特征加权核函数,降低不相关特征对核函数或距离计算产生的影响。与对比算法在人工数据集、高维数据集和UCI数据集上进行比较,发现本文提出的方法在区分离群点、噪声和有效样本上有明显优势,且在高维数据集上可获得更好分类效果。 展开更多
关键词 模糊孪生支持向量机 特征加权 信息增益 紧密度 隶属度 高维数据
下载PDF
Cluster DetectionMethod of Endogenous Security Abnormal Attack Behavior in Air Traffic Control Network
20
作者 Ruchun Jia Jianwei Zhang +2 位作者 Yi Lin Yunxiang Han Feike Yang 《Computers, Materials & Continua》 SCIE EI 2024年第5期2523-2546,共24页
In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set f... In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set for ATC cybersecurity attacks is constructed by setting the feature states,adding recursive features,and determining the feature criticality.The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data.An autoencoder is introduced into the AI(artificial intelligence)algorithm to encode and decode the characteristics of ATC network security attack behavior to reduce the dimensionality of the ATC network security attack behavior data.Based on the above processing,an unsupervised learning algorithm for clustering detection of ATC network security attacks is designed.First,determine the distance between the clustering clusters of ATC network security attack behavior characteristics,calculate the clustering threshold,and construct the initial clustering center.Then,the new average value of all feature objects in each cluster is recalculated as the new cluster center.Second,it traverses all objects in a cluster of ATC network security attack behavior feature data.Finally,the cluster detection of ATC network security attack behavior is completed by the computation of objective functions.The experiment took three groups of experimental attack behavior data sets as the test object,and took the detection rate,false detection rate and recall rate as the test indicators,and selected three similar methods for comparative test.The experimental results show that the detection rate of this method is about 98%,the false positive rate is below 1%,and the recall rate is above 97%.Research shows that this method can improve the detection performance of security attacks in air traffic control network. 展开更多
关键词 Air traffic control network security attack behavior cluster detection behavioral characteristics information gain cluster threshold automatic encoder
下载PDF
上一页 1 2 40 下一页 到第
使用帮助 返回顶部