首页 > 最新文献

2013 Ninth International Conference on Computational Intelligence and Security最新文献

英文 中文
A Decision Making Model Based on Fuzzy Relation Equations Constraints and Its Algorithm 基于模糊关系方程约束的决策模型及其算法
Jinquan Li, Yongchuan Wen
In this paper, a new decision making model based on fuzzy relation equations is presented. Some properties of this model are obtained. Based on these properties, we show that the decision making problem can be solved in polynomial time. An optimal polynomial time algorithm is proposed for this kind of optimization problem. Numerical examples are provided to illustrate our algorithms.
本文提出了一种新的基于模糊关系方程的决策模型。得到了该模型的一些性质。基于这些性质,我们证明了决策问题可以在多项式时间内解决。针对这类优化问题,提出了一种最优多项式时间算法。给出了数值算例来说明我们的算法。
{"title":"A Decision Making Model Based on Fuzzy Relation Equations Constraints and Its Algorithm","authors":"Jinquan Li, Yongchuan Wen","doi":"10.1109/CIS.2013.77","DOIUrl":"https://doi.org/10.1109/CIS.2013.77","url":null,"abstract":"In this paper, a new decision making model based on fuzzy relation equations is presented. Some properties of this model are obtained. Based on these properties, we show that the decision making problem can be solved in polynomial time. An optimal polynomial time algorithm is proposed for this kind of optimization problem. Numerical examples are provided to illustrate our algorithms.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133306083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Block Cipher Circuit Design against Power Analysis 基于功率分析的分组密码电路设计
Yuxiao Ling, Zheng Guo, Zhimin Zhang, Zhigang Mao, Zeleng Zhuang
In this paper, we will present a block cipher circuit design against Power Analysis. This design consists of usual masking and hiding method. For XOR, permutation and other linear layer, masking method of protection is used, but for S-box and other non-linear layer, hiding method is used in the reason that masking requires a lot of hardware consumption. We accomplished hardware implementation and Power Analysis in our research, whose test results proved that the design had strong capacity against Power Analysis. 200, 000 curves were extracted in our attack simulation, and the key successfully resisted complete recovery.
在本文中,我们将提出一种针对功率分析的分组密码电路设计。该设计由常用的掩蔽和隐藏方法组成。对于异或、置换等线性层,采用掩蔽法进行保护,而对于S-box等非线性层,由于掩蔽需要大量的硬件消耗,采用了隐藏法。我们在研究中完成了硬件实现和功耗分析,测试结果证明该设计具有较强的抗功耗分析能力,在攻击仿真中提取了20万条曲线,密钥成功抵抗了完全恢复。
{"title":"A Block Cipher Circuit Design against Power Analysis","authors":"Yuxiao Ling, Zheng Guo, Zhimin Zhang, Zhigang Mao, Zeleng Zhuang","doi":"10.1109/CIS.2013.101","DOIUrl":"https://doi.org/10.1109/CIS.2013.101","url":null,"abstract":"In this paper, we will present a block cipher circuit design against Power Analysis. This design consists of usual masking and hiding method. For XOR, permutation and other linear layer, masking method of protection is used, but for S-box and other non-linear layer, hiding method is used in the reason that masking requires a lot of hardware consumption. We accomplished hardware implementation and Power Analysis in our research, whose test results proved that the design had strong capacity against Power Analysis. 200, 000 curves were extracted in our attack simulation, and the key successfully resisted complete recovery.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134324754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Managing Public Financial Resources in a Changing World: Analyzing a Budget 在变化的世界中管理公共财政资源:预算分析
Ziqi Zhu
This paper uses statistical method to analyzing a budget to managing public financial resources, including revenue change, non tax resources, General Operating Fund Revenues, etc.
本文运用统计方法分析了预算对公共财政资源管理的影响,包括收入变化、非税资源、一般营运基金收入等。
{"title":"Managing Public Financial Resources in a Changing World: Analyzing a Budget","authors":"Ziqi Zhu","doi":"10.1109/CIS.2013.180","DOIUrl":"https://doi.org/10.1109/CIS.2013.180","url":null,"abstract":"This paper uses statistical method to analyzing a budget to managing public financial resources, including revenue change, non tax resources, General Operating Fund Revenues, etc.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131341285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Strategy to Improve the Reliability of Object-Oriented Formal Models 一种提高面向对象形式化模型可靠性的策略
Guo Xie, F. Qian, Xinhong Hei
Considering the challenges in guaranteeing the reliability of a formal model which is established in according with system requirements specification written in natural language with ambiguities, a novel strategy is proposed to improve the correctness of formal model by separating requirement functions and data structures. Specifically, hybrid automata which can analyze system process symbolically are created to characterize system behaviors before formalization. Secondly, UML models are created to improve the accuracy of system structure. Lastly, an object-oriented formal model is established based on the hybrid automata and UML models.
针对用自然语言编写的系统需求规范建立的形式模型存在歧义的问题,提出了一种将需求函数与数据结构分离的方法来提高形式模型的正确性。具体而言,在形式化之前,创建能够对系统过程进行象征性分析的混合自动机来表征系统行为。其次,建立UML模型,提高系统结构的准确性。最后,在混合自动机和UML模型的基础上建立了面向对象的形式化模型。
{"title":"A Strategy to Improve the Reliability of Object-Oriented Formal Models","authors":"Guo Xie, F. Qian, Xinhong Hei","doi":"10.1109/CIS.2013.150","DOIUrl":"https://doi.org/10.1109/CIS.2013.150","url":null,"abstract":"Considering the challenges in guaranteeing the reliability of a formal model which is established in according with system requirements specification written in natural language with ambiguities, a novel strategy is proposed to improve the correctness of formal model by separating requirement functions and data structures. Specifically, hybrid automata which can analyze system process symbolically are created to characterize system behaviors before formalization. Secondly, UML models are created to improve the accuracy of system structure. Lastly, an object-oriented formal model is established based on the hybrid automata and UML models.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133825428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evolutionary Algorithm Based on Automatically Designing of Genetic Operators 基于遗传算子自动设计的进化算法
Dazhi Jiang, Chenfeng Peng, Zhun Fan
At present there is a wide range of evolutionary algorithms available to researchers and practitioners. Despite the great diversity of these algorithms, virtually all of the algorithms share one feature: they have been manually designed. Can evolutionary algorithms be designed automatically by computer? In this paper, a novel evolutionary algorithm based on automatically designing of genetic operators is presented to address this problem. The resulting algorithm not only explores solutions in the problem space, but also automatically generates genetic operators in the operator space for each generation. In order to verify the performance of the proposed algorithm, comprehensive experiments on 23 well-known benchmark optimization problems are conducted, and the results show that the proposed algorithm can outperform standard Differential Evolution (DE) algorithm.
目前有广泛的进化算法可供研究人员和实践者使用。尽管这些算法有很大的多样性,但实际上所有的算法都有一个共同的特点:它们都是人工设计的。进化算法可以由计算机自动设计吗?本文提出了一种基于遗传算子自动设计的进化算法来解决这一问题。所得到的算法不仅在问题空间中探索解,而且在每一代算子空间中自动生成遗传算子。为了验证所提算法的性能,对23个知名的基准优化问题进行了综合实验,结果表明所提算法优于标准的差分进化(DE)算法。
{"title":"Evolutionary Algorithm Based on Automatically Designing of Genetic Operators","authors":"Dazhi Jiang, Chenfeng Peng, Zhun Fan","doi":"10.1109/CIS.2013.21","DOIUrl":"https://doi.org/10.1109/CIS.2013.21","url":null,"abstract":"At present there is a wide range of evolutionary algorithms available to researchers and practitioners. Despite the great diversity of these algorithms, virtually all of the algorithms share one feature: they have been manually designed. Can evolutionary algorithms be designed automatically by computer? In this paper, a novel evolutionary algorithm based on automatically designing of genetic operators is presented to address this problem. The resulting algorithm not only explores solutions in the problem space, but also automatically generates genetic operators in the operator space for each generation. In order to verify the performance of the proposed algorithm, comprehensive experiments on 23 well-known benchmark optimization problems are conducted, and the results show that the proposed algorithm can outperform standard Differential Evolution (DE) algorithm.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132573801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Block Lanczos Algorithm to Solve Large and Sparse Matrixes on GPUs 在gpu上求解大矩阵和稀疏矩阵的改进块Lanczos算法
Wenjuan Ying
The security of the RSA cryptosystem is based on the difficulty of integer factorization. The General Number Field Sieve (GNFS) is one of the state-of-the-art algorithms to solve this problem over 110 digits. The Montgomery Block Lanczos algorithm is often used for solving a large and sparse linear system over GF (2) in the GNFS. AS Graphics Processing Units (GPUs) can provide a significant increase in floating point operations and memory bandwidth over conventional Central Processing Units (CPUs), performing sparse matrix-vector multiplications with these co-processors can decrease the amount of time. In this paper, we will first improve the initialization way of the algorithm to avoid sudden breakdown in the very first stage. Because a very high possibility of failure caused by the random initialization way, we will design a pseudo random way to initialize the algorithm to generate more solutions than traditional Block Lanczos algorithm does. Based on massive research about present sparse matrix storage formats, we will parallelize the improved Block Lanczos algorithm using a newly designed hybrid sparse matrix format on GPUs. Finally, we analyze the cost of our algorithm theoretically. From the results, a speedup can be achieved on GPUs according to related experiments.
RSA密码系统的安全性取决于整数分解的难易程度。通用数字字段筛选(GNFS)是解决这个超过110位的问题的最先进的算法之一。在GNFS中,Montgomery Block Lanczos算法常用于求解GF(2)上的大型稀疏线性系统。与传统的中央处理单元(cpu)相比,图形处理单元(gpu)可以显著增加浮点运算和内存带宽,使用这些协处理器执行稀疏矩阵向量乘法可以减少时间。在本文中,我们将首先改进算法的初始化方式,以避免在初始阶段突然崩溃。由于随机初始化的方式导致失败的可能性非常高,我们将设计一种伪随机的方式来初始化算法,以产生比传统Block Lanczos算法更多的解。在对现有稀疏矩阵存储格式进行大量研究的基础上,我们将采用一种新设计的混合稀疏矩阵格式在gpu上并行化改进的Block Lanczos算法。最后,从理论上分析了算法的代价。从结果来看,根据相关实验,可以在gpu上实现加速。
{"title":"An Improved Block Lanczos Algorithm to Solve Large and Sparse Matrixes on GPUs","authors":"Wenjuan Ying","doi":"10.1109/CIS.2013.104","DOIUrl":"https://doi.org/10.1109/CIS.2013.104","url":null,"abstract":"The security of the RSA cryptosystem is based on the difficulty of integer factorization. The General Number Field Sieve (GNFS) is one of the state-of-the-art algorithms to solve this problem over 110 digits. The Montgomery Block Lanczos algorithm is often used for solving a large and sparse linear system over GF (2) in the GNFS. AS Graphics Processing Units (GPUs) can provide a significant increase in floating point operations and memory bandwidth over conventional Central Processing Units (CPUs), performing sparse matrix-vector multiplications with these co-processors can decrease the amount of time. In this paper, we will first improve the initialization way of the algorithm to avoid sudden breakdown in the very first stage. Because a very high possibility of failure caused by the random initialization way, we will design a pseudo random way to initialize the algorithm to generate more solutions than traditional Block Lanczos algorithm does. Based on massive research about present sparse matrix storage formats, we will parallelize the improved Block Lanczos algorithm using a newly designed hybrid sparse matrix format on GPUs. Finally, we analyze the cost of our algorithm theoretically. From the results, a speedup can be achieved on GPUs according to related experiments.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133602936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differential Evolution Based Parameters Selection for Support Vector Machine 基于差分进化的支持向量机参数选择
Li Jun, Ding Lixin, Xing Ying
This paper addresses the problem of SVM parameter optimization. The authors propose an SVM classification system based on differential evolution(DE) to improve the generalization performance of the SVM classifier. For this purpose, the authors have optimized the SVM classifier design by searching for the best value of the parameters that tune its discriminant function. The experiments are conducted on the basis of benchmark dataset. The obtained results clearly confirm the superiority of the DE-SVM approach compared to default parameters SVM classifier and suggest that further substantial improvements in terms of classification accuracy can be achieved by the proposed DE-SVM classification system.
本文研究支持向量机的参数优化问题。为了提高支持向量机分类器的泛化性能,提出了一种基于差分进化的支持向量机分类系统。为此,作者通过搜索调整其判别函数的参数的最佳值来优化SVM分类器设计。实验在基准数据集的基础上进行。得到的结果清楚地证实了DE-SVM方法相对于默认参数SVM分类器的优越性,并表明所提出的DE-SVM分类系统在分类精度方面可以得到进一步的大幅度提高。
{"title":"Differential Evolution Based Parameters Selection for Support Vector Machine","authors":"Li Jun, Ding Lixin, Xing Ying","doi":"10.1109/CIS.2013.67","DOIUrl":"https://doi.org/10.1109/CIS.2013.67","url":null,"abstract":"This paper addresses the problem of SVM parameter optimization. The authors propose an SVM classification system based on differential evolution(DE) to improve the generalization performance of the SVM classifier. For this purpose, the authors have optimized the SVM classifier design by searching for the best value of the parameters that tune its discriminant function. The experiments are conducted on the basis of benchmark dataset. The obtained results clearly confirm the superiority of the DE-SVM approach compared to default parameters SVM classifier and suggest that further substantial improvements in terms of classification accuracy can be achieved by the proposed DE-SVM classification system.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115197867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Key Management Scheme between Body Sensor Networks and the Base Station 一种人体传感器网络与基站之间的密钥管理方案
Huawei Zhao, M. Shu, Jing Qin, Jiankun Hu
In general application scenarios, physiological signals collected by body sensor networks will be delivered to a base station in the medical center for further processing. In this process, the communication between body sensor networks and the base station should be protected for individual's privacy. However, many existing related researches ignored the security requirement in the communication, or merely mentioned that traditional secure mechanisms schemes can be used to secure the communication. In the paper, we applied the Tree Parity Machine model and biometric data extracted from physiological signals to construct a new key management scheme for securing the communication. Analyses show that the new key management scheme has superiority in terms of efficiency and security.
在一般应用场景下,身体传感器网络采集到的生理信号将被传送到医疗中心的基站进行进一步处理。在此过程中,人体传感器网络与基站之间的通信需要保护个人隐私。然而,现有的许多相关研究忽略了通信中的安全要求,或者仅仅提到可以使用传统的安全机制方案来保证通信的安全。本文应用树校验机模型和从生理信号中提取的生物特征数据,构建了一种新的密钥管理方案来保证通信的安全性。分析表明,新的密钥管理方案在效率和安全性方面具有优势。
{"title":"A Key Management Scheme between Body Sensor Networks and the Base Station","authors":"Huawei Zhao, M. Shu, Jing Qin, Jiankun Hu","doi":"10.1109/CIS.2013.162","DOIUrl":"https://doi.org/10.1109/CIS.2013.162","url":null,"abstract":"In general application scenarios, physiological signals collected by body sensor networks will be delivered to a base station in the medical center for further processing. In this process, the communication between body sensor networks and the base station should be protected for individual's privacy. However, many existing related researches ignored the security requirement in the communication, or merely mentioned that traditional secure mechanisms schemes can be used to secure the communication. In the paper, we applied the Tree Parity Machine model and biometric data extracted from physiological signals to construct a new key management scheme for securing the communication. Analyses show that the new key management scheme has superiority in terms of efficiency and security.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114860938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Related Vehicle Routing Problem for Single Distribution Centre Based on Dynamic Constraint 基于动态约束的单配送中心相关车辆路径问题研究
Yuqiang Chen, Xuanzi Hu, G. Ye
Related Vehicle Routing Problem is another form of Vehicle Routing Problem. RVRP also belongs to NP-Hard, The research based on single distribution center RVRP with road capacity dynamic constraint. Road capacity factor shows as a road condition coefficient, then added it into the objective function. To build a model of single distribution center and single vehicle type RVRP with soft time windows and dynamic constraint. The simulated result shows that the self-adapting chaos genetic algorithm is flexible and feasible to solve this kind of model.
相关车辆路线问题是车辆路线问题的另一种形式。RVRP也属于NP-Hard,研究基于道路容量动态约束的单配送中心RVRP。道路通行系数表示为路况系数,然后将其加入目标函数中。建立具有软时间窗和动态约束的单配送中心单车型RVRP模型。仿真结果表明,自适应混沌遗传算法求解这类模型是灵活可行的。
{"title":"Research on Related Vehicle Routing Problem for Single Distribution Centre Based on Dynamic Constraint","authors":"Yuqiang Chen, Xuanzi Hu, G. Ye","doi":"10.1109/CIS.2013.23","DOIUrl":"https://doi.org/10.1109/CIS.2013.23","url":null,"abstract":"Related Vehicle Routing Problem is another form of Vehicle Routing Problem. RVRP also belongs to NP-Hard, The research based on single distribution center RVRP with road capacity dynamic constraint. Road capacity factor shows as a road condition coefficient, then added it into the objective function. To build a model of single distribution center and single vehicle type RVRP with soft time windows and dynamic constraint. The simulated result shows that the self-adapting chaos genetic algorithm is flexible and feasible to solve this kind of model.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115277676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Greedy Search Algorithm for Resolving the Lowermost C Threshold in SVM Classification 一种求解SVM分类中最小C阈值的贪心搜索算法
Huichuan Duan, Naiwen Liu
In this paper, the authors present a greedy search algorithm that solves the SVM classification (SVC) problem at the lowermost C end. By combining the SVC asymptotic behavior with empirical results, it can be sure that at sufficiently small cost, a threshold C0, all the minority samples becomes support vectors each with Lagrange multiplier C0, and equal number of majority samples will become support vectors whose Lagrange multipliers are also C0. With this evidence, SVC is transformed into a C-independent combinatorial optimization problem. Taking all the minority inputs as initial support vectors, a greedy algorithm is devised to choose majority class support vectors one by one each with minimal increase to the objective function in its turn. The greedy nature of the algorithm enables finding out the majority support vectors that near or at the majority margin. By taking the found majority support vectors initially and applying the algorithm to the minority class conversely, the support vectors that near the decision boundary are also resolved. Applying linear least squares fitting to both the majority margin and decision boundary, C0 is obtained as a function of kernel parameters. Experimental results show that the proposed algorithm can find C0 almost perfectly.
本文提出了一种贪心搜索算法,解决了支持向量机在C端最下端的分类问题。将SVC渐近行为与经验结果相结合,可以确定在足够小的代价(阈值为C0)下,所有少数派样本都成为每个拉格朗日乘子为C0的支持向量,相等数量的多数样本也成为拉格朗日乘子为C0的支持向量。在此基础上,将SVC问题转化为与c无关的组合优化问题。将所有少数派输入作为初始支持向量,设计了一种贪婪算法,以最小增量依次选择多数类支持向量。该算法的贪婪特性使其能够找出接近或处于多数边界的多数支持向量。通过初始化找到的多数支持向量,将算法反向应用于少数类,求解出靠近决策边界的支持向量。通过对多数边界和决策边界进行线性最小二乘拟合,得到了C0作为核参数的函数。实验结果表明,该算法几乎可以完美地找到C0。
{"title":"A Greedy Search Algorithm for Resolving the Lowermost C Threshold in SVM Classification","authors":"Huichuan Duan, Naiwen Liu","doi":"10.1109/CIS.2013.47","DOIUrl":"https://doi.org/10.1109/CIS.2013.47","url":null,"abstract":"In this paper, the authors present a greedy search algorithm that solves the SVM classification (SVC) problem at the lowermost C end. By combining the SVC asymptotic behavior with empirical results, it can be sure that at sufficiently small cost, a threshold C0, all the minority samples becomes support vectors each with Lagrange multiplier C0, and equal number of majority samples will become support vectors whose Lagrange multipliers are also C0. With this evidence, SVC is transformed into a C-independent combinatorial optimization problem. Taking all the minority inputs as initial support vectors, a greedy algorithm is devised to choose majority class support vectors one by one each with minimal increase to the objective function in its turn. The greedy nature of the algorithm enables finding out the majority support vectors that near or at the majority margin. By taking the found majority support vectors initially and applying the algorithm to the minority class conversely, the support vectors that near the decision boundary are also resolved. Applying linear least squares fitting to both the majority margin and decision boundary, C0 is obtained as a function of kernel parameters. Experimental results show that the proposed algorithm can find C0 almost perfectly.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128435134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2013 Ninth International Conference on Computational Intelligence and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1