PCA Tail作为异常指标

O. Škvarek, M. Klimo, Jaroslav Kopčan
{"title":"PCA Tail作为异常指标","authors":"O. Škvarek, M. Klimo, Jaroslav Kopčan","doi":"10.1109/ICETA51985.2020.9379267","DOIUrl":null,"url":null,"abstract":"Nowadays, tools based on machine learning becomes an integral part of education. Propper application of these tools brings benefits, but misuse can be dangerous. The pattern recognition system always indicates the class most similar to the submitted pattern based on the features extracted from the training set. Designers optimise recognisers for specific training set classes. Still, users may not be familiar with its preparation methodology, and thus, they may apply the recognition system to samples incompatible to the training set (outliers, novelties, anomalies). This paper analyses a tail remaining after linear principal component analysis as an anomaly indicator. A nonlinear approach based on generative adversarial networks (GAN) is also presented. In addition to the result of the recognition, the user also gets a level of its credibility categorised into three classes: accept, do not decide, reject. For example, Fashion-MNIST queries were submitted to the recogniser trained on the MNIST database. The proposed linear misuse detector refused all of them; the neural network-based detector failed in 4.81 % of queries. For a more detailed analysis, MNIST samples corrupted by Gaussian noise were admitted presented to the misuse detector trained on the noiseless MNIST dataset. The experiments revealed a sharp border between acceptance and non-acceptance (no decision or rejection) decisions.","PeriodicalId":149716,"journal":{"name":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"PCA Tail as the Anomaly Indicator\",\"authors\":\"O. Škvarek, M. Klimo, Jaroslav Kopčan\",\"doi\":\"10.1109/ICETA51985.2020.9379267\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, tools based on machine learning becomes an integral part of education. Propper application of these tools brings benefits, but misuse can be dangerous. The pattern recognition system always indicates the class most similar to the submitted pattern based on the features extracted from the training set. Designers optimise recognisers for specific training set classes. Still, users may not be familiar with its preparation methodology, and thus, they may apply the recognition system to samples incompatible to the training set (outliers, novelties, anomalies). This paper analyses a tail remaining after linear principal component analysis as an anomaly indicator. A nonlinear approach based on generative adversarial networks (GAN) is also presented. In addition to the result of the recognition, the user also gets a level of its credibility categorised into three classes: accept, do not decide, reject. For example, Fashion-MNIST queries were submitted to the recogniser trained on the MNIST database. The proposed linear misuse detector refused all of them; the neural network-based detector failed in 4.81 % of queries. For a more detailed analysis, MNIST samples corrupted by Gaussian noise were admitted presented to the misuse detector trained on the noiseless MNIST dataset. The experiments revealed a sharp border between acceptance and non-acceptance (no decision or rejection) decisions.\",\"PeriodicalId\":149716,\"journal\":{\"name\":\"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICETA51985.2020.9379267\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETA51985.2020.9379267","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

如今,基于机器学习的工具已成为教育不可或缺的一部分。适当地应用这些工具会带来好处,但滥用可能是危险的。模式识别系统总是根据从训练集中提取的特征来指出与提交的模式最相似的类。设计师为特定的训练集类优化识别器。尽管如此,用户可能不熟悉它的准备方法,因此,他们可能会将识别系统应用于与训练集不兼容的样本(异常值、新奇、异常)。本文分析了线性主成分分析后的尾余量作为异常指标。提出了一种基于生成对抗网络(GAN)的非线性方法。除了识别结果之外,用户还会得到一个可信度等级,分为三类:接受、不决定、拒绝。例如,Fashion-MNIST查询被提交给在MNIST数据库上训练的识别器。提出的线性误用检测器拒绝了所有这些;基于神经网络的检测器在4.81%的查询中失败。为了进行更详细的分析,被高斯噪声损坏的MNIST样本被允许提交给在无噪声MNIST数据集上训练的误用检测器。实验揭示了接受和不接受(没有决定或拒绝)决定之间的明显界限。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
PCA Tail as the Anomaly Indicator
Nowadays, tools based on machine learning becomes an integral part of education. Propper application of these tools brings benefits, but misuse can be dangerous. The pattern recognition system always indicates the class most similar to the submitted pattern based on the features extracted from the training set. Designers optimise recognisers for specific training set classes. Still, users may not be familiar with its preparation methodology, and thus, they may apply the recognition system to samples incompatible to the training set (outliers, novelties, anomalies). This paper analyses a tail remaining after linear principal component analysis as an anomaly indicator. A nonlinear approach based on generative adversarial networks (GAN) is also presented. In addition to the result of the recognition, the user also gets a level of its credibility categorised into three classes: accept, do not decide, reject. For example, Fashion-MNIST queries were submitted to the recogniser trained on the MNIST database. The proposed linear misuse detector refused all of them; the neural network-based detector failed in 4.81 % of queries. For a more detailed analysis, MNIST samples corrupted by Gaussian noise were admitted presented to the misuse detector trained on the noiseless MNIST dataset. The experiments revealed a sharp border between acceptance and non-acceptance (no decision or rejection) decisions.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Data Science and its position in university education within National Project IT Academy-Education for 21st Century Massification of Online Education: A Holistic Strategy Speech Emotion Recognition Overview and Experimental Results HIP-Based Security in IoT Networks: A comparison On-Chip Digital Calibration for Analog ICs Towards Improved Reliability in Nanotechnologies
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1