4.7 Article

Unsupervised feature selection by non-convex regularized self-representation

期刊

EXPERT SYSTEMS WITH APPLICATIONS
卷 173, 期 -, 页码 -

出版社

PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.eswa.2021.114643

关键词

Unsupervised feature selection; Self-representation; Non-convex regularization; CCCP; ADMM

资金

  1. National Natural Science Foundation of China [11671379, 71901155, 71932008, U1804159]
  2. Key RAMP
  3. D and Promotion Projects of Henan Province [202102210338, 202102210084]
  4. Natural Science Project of Henan Education Department [21A520010]
  5. High-level Talent Fund Project of Henan University of Technology [2018BS043]
  6. Research Platform of Grain Information Processing Center of Henan University of Technology [KFJJ-2020-105]
  7. Program for Science AMP
  8. Technology Innovation Talents in Universities of Henan Province [18HASTIT022]
  9. Foundation for University Key Teacher of Henan Province [2016GGJS-141]

向作者/读者索取更多资源

Feature selection is a crucial pre-processing stage in expert and intelligent systems, aiming to reduce dimensionality of high-dimensional data and improve interpretability, learning performance, and computational efficiency. This paper proposes a new unsupervised feature selection method using Non-convex Regularized Self-Representation (NOVRSR) which utilizes t'2,1_2 sparse regularization to guarantee sparsity of the representation coefficient matrix. Experimental studies demonstrate the effectiveness of the proposed method.
Feature selection, as a crucial pre-processing stage in expert and intelligent systems, aims at reducing the dimensionality of the high-dimensional data by selecting the optimal subset from original features set. It can enhance the interpretability, improve learning performance, and increase computational efficiency. In real-world applications, obtaining class labels of data is time consuming and labor intensive, thus unsupervised feature selection is more practically important but correspondingly more challenging. Self-representation learning provides some insights on unsupervised feature selection, whose goal is to identify a representative feature subset so that all the features can be well reconstructed by them. In this paper, we propose a new unsupervised feature selection method by using NOn-conVex Regularized Self-Representation (NOVRSR). Different from most prior researches resorting to pseudo labels of data, NOVRSR exploits importance and relevance of features by selfrepresentation. Moreover, the t'2,1_2 sparse regularization, which is non-convex yet Lipschitz continuous, is enforced on the representation coefficient matrix to perform feature selection. We show in theory that the utilization of t'2,1_2 can guarantee the sparsity of the representation coefficient matrix. In addition, to find the solution of the resulting non-convex formula, we design an iterative algorithm in the framework of ConCaveConvex Procedure (CCCP) and prove that the iterative sequence converges to the stationary point satisfying the first-order optimality condition. An adopted Alternating Direction Method of Multipliers (ADMM) is embedded to solve the sequence of convex subproblems of CCCP efficiently. Extensive experimental studies on real-world datasets demonstrate that the effectiveness of the proposed method.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Artificial Intelligence

Privacy-preserving image multi-classification deep learning model in robot system of industrial IoT

Yange Chen, Yuan Ping, Zhili Zhang, Baocang Wang, SuYu He

Summary: A novel privacy-preserving image multi-classification deep-learning (PIDL) model is presented in this paper, with two schemes proposed that adopt secure calculation protocols applied in a fog control center (FCC) with a non-colluding honest server to protect data and model privacy in robot systems. The proposed schemes realize security, correctness, and efficiency with low communication and computational costs, as demonstrated in security analysis and performance evaluation.

NEURAL COMPUTING & APPLICATIONS (2021)

Article Computer Science, Information Systems

A threshold hybrid encryption method for integrity audit without trusted center

Yange Chen, Hequn Liu, Baocang Wang, Baljinnyam Sonompil, Yuan Ping, Zhili Zhang

Summary: This paper proposes a new threshold hybrid encryption for integrity auditing method in cloud storage, using AES and ECC with Shamir secret sharing. The method distributes and manages keys without a trusted center, and also includes an integrity auditing and re-signature method to solve collusion issues. Security analysis and performance evaluation show that the scheme achieves correctness, security, and efficiency with low communication and computation cost.

JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS (2021)

Article Computer Science, Artificial Intelligence

2-SPIFF: a 2-stage packer identification method based on function call graph and file attributes

Hao Liu, Chun Guo, Yunhe Cui, Guowei Shen, Yuan Ping

Summary: This article proposes a 2-stage packer identification method based on function call graph (FCG) and file attributes, achieving high accuracy in malware detection. Analysis of FCG and file attributes differences and experimental results show the effectiveness of the 2-SPIFF method.

APPLIED INTELLIGENCE (2021)

Editorial Material Computer Science, Information Systems

Comment on 'Targeted Ciphers for Format-Preserving Encryption' from Selected Areas in Cryptography 2018

Dachao Wang, Baocang Wang, Yuan Ping

Summary: Format-preserving encryption (FPE) is a method that allows encrypting data while maintaining its original format. In a cryptography study from 2018, two new FPE schemes were proposed, with the second one using the Mix-Swap-Unmix algorithm to achieve a specific matching exchange process. However, it was later proven that this matching exchange process is invalid, leading to the conclusion that the equivalence does not exist.

IET INFORMATION SECURITY (2021)

Article Computer Science, Artificial Intelligence

Extended variational inference for gamma mixture model in positive vectors modeling

Yuping Lai, Huirui Cao, Lijuan Luo, Yongmei Zhang, Fukun Bi, Xiaolin Gui, Yuan Ping

Summary: The paper addresses Bayesian estimation of the finite Gamma mixture model (GaMM) under the extended variational inference (EVI) framework, optimizing model performance by introducing lower-bound approximations and automatically determining the optimal mixture component number. The proposed method shows excellent performance in evaluations with synthesized and real data, demonstrating statistically significant improvements in accuracies and runtime compared to referred methods.

NEUROCOMPUTING (2021)

Article Biochemical Research Methods

Ladder-shape melting temperature isothermal amplification of nucleic acids

Deguo Wang, Yongzhen Wang, Meng Zhang, Yongqing Zhang, Juntao Sun, Chunmei Song, Fugang Xiao, Yuan Ping, Chen Pan, Yushan Hu, Chaoqun Wang, Yanhong Liu

Summary: A novel method called ladder-shape melting temperature isothermal amplification (LMTIA) was developed in this study, which was found to be more sensitive than the existing LAMP assay. This method has the potential to be used for prevention and control of emerging epidemics caused by different types of pathogens.

BIOTECHNIQUES (2021)

Review Mathematics, Interdisciplinary Applications

Recent Advances in Dimensionality Reduction Modeling and Multistability Reconstitution of Memristive Circuit

Yunzhen Zhang, Yuan Ping, Zhili Zhang, Guangzhe Zhao

Summary: This paper discusses the multistability phenomenon and its control strategy in memristor-based nonlinear oscillator circuits, and introduces the dimensionality reduction modeling method and flux-charge analysis method. By examining the theory and application promotion of incremental integral transformation method and multistability reconstitution, the application prospect of memristor-coupled systems is demonstrated.

COMPLEXITY (2021)

Article Computer Science, Artificial Intelligence

Extended variational inference for Dirichlet process mixture of Beta-Liouville distributions for proportional data modeling

Yuping Lai, Wenbo Guan, Lijuan Luo, Qiang Ruan, Yuan Ping, Heping Song, Hongying Meng, Yu Pan

Summary: In this study, an extended VI framework was used to derive a closed-form solution for estimating parameters in the Dirichlet mixture process of the Beta-Liouville distribution. Experimental results demonstrated the superior performance and effectiveness of this method in challenging real-world applications such as object detection and text categorization.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2022)

Article Computer Science, Information Systems

Specification and adaptive verification of access control policy for cyber-physical-social spaces

Yan Cao, Yuan Ping, Shaohua Tao, YongGang Chen, YanXia Zhu

Summary: Cyber-Physical-Social Space (CPSS) is a promising paradigm that combines cyberspace, physical space, and social space to create an intelligent environment. However, existing security analysis methods for CPSS do not take into account its open and dynamic characteristics. This paper proposes an adaptive security analysis framework for CPSS that includes an access control model, a Labelled Transition System (LTS), and a policy adjustment method to prevent unauthorized information flow and ensure space security.

COMPUTERS & SECURITY (2022)

Article Engineering, Multidisciplinary

Privacy-Preserving Cross-Zone Ride-Matching for Online Ride-Hailing Service

Hui Ma, Yuan Ping, Yong Zhang

Summary: This paper proposes a novel privacy-preserving cross-zone ride-matching scheme, CRide, which achieves high ride-matching accuracy and acceptable efficiency by extending the zone range and introducing ciphertext technology.

MATHEMATICAL PROBLEMS IN ENGINEERING (2022)

Article Computer Science, Information Systems

Improved Boundary Support Vector Clustering with Self-Adaption Support

Huina Li, Yuan Ping, Bin Hao, Chun Guo, Yujian Liu

Summary: This article proposes an improved boundary support vector clustering (IBSVC) method that achieves reasonable boundaries and comfortable parameters through self-adaptive support. The method enhances the accuracy and efficiency of clustering through movable edge selection and flexible parameter selection.

ELECTRONICS (2022)

Article Computer Science, Artificial Intelligence

Micro-behaviour with Reinforcement Knowledge-aware Reasoning for Explainable Recommendation

Shaohua Tao, Runhe Qiu, Bo Xu, Yuan Ping

Summary: Existing recommendation methods neglect the relationship between micro-behavior and knowledge graph and the explicit reasoning for user-item interaction data. This paper proposes a model that incorporates micro-behavior and knowledge graph into reinforcement learning for explainable recommendation, achieving better recommendation results.

KNOWLEDGE-BASED SYSTEMS (2022)

Article Computer Science, Information Systems

Cryptanalysis and Improvement of DeepPAR: Privacy-Preserving and Asynchronous Deep Learning for Industrial IoT

Yange Chen, Suyu He, Baocang Wang, Pu Duan, Benyu Zhang, Zhiyong Hong, Yuan Ping

Summary: Industrial Internet of Things (IIoT) is changing traditional industries with the development of big data and deep learning. However, the lack of large-scale datasets can lead to performance issues and data leakage. Privacy-preserving federated learning schemes have been proposed, but security issues remain. In this article, the security of a scheme called DeepPAR is analyzed and an improved scheme is proposed to address the security vulnerabilities. Performance analysis illustrates the security and accuracy of the improved scheme.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

MCTVD: A malware classification method based on three-channel visualization and deep learning

Huaxin Deng, Chun Guo, Guowei Shen, Yunhe Cui, Yuan Ping

Summary: With the increase in malware, the detection and classification of malware have become more challenging. Various methods based on malware visualization and deep learning have been proposed, but they fail to retain the semantic and statistical properties in the generated malware images, which are often large and inconsistent in size. This article proposes a new malware visualization method based on assembly instructions and Markov transfer matrices, which effectively characterizes malware. It also introduces a competitive malware classification method, MCTVD, based on three-channel visualization and deep learning, achieving an accuracy of 99.44% on Microsoft's public malware dataset.

COMPUTERS & SECURITY (2023)

Article Computer Science, Information Systems

SDSIOT: An SQL Injection Attack Detection and Stage Identification Method Based on Outbound Traffic

Houlong Fu, Chun Guo, Chaohui Jiang, Yuan Ping, Xiaodan Lv

Summary: An SQL Injection Attack (SQLIA) is a significant cyber security threat to Web services, with different stages causing varying levels of damage. By analyzing outbound traffic from the Web server, we propose an SQLIA detection and stage identification method (SDSIOT) that achieves high accuracy in both detection (98.57%) and stage identification (94.01%). It outperforms ModSecurity by 8.22 percentage points in SQLIA detection accuracy.

ELECTRONICS (2023)

Review Computer Science, Artificial Intelligence

A comprehensive review of slope stability analysis based on artificial intelligence methods

Wei Gao, Shuangshuang Ge

Summary: This study provides a comprehensive review of slope stability research based on artificial intelligence methods, focusing on slope stability computation and evaluation. The review covers studies using quasi-physical intelligence methods, simulated evolutionary methods, swarm intelligence methods, hybrid intelligence methods, artificial neural network methods, vector machine methods, and other intelligence methods. The merits, demerits, and state-of-the-art research advancement of these studies are analyzed, and possible research directions for slope stability investigation based on artificial intelligence methods are suggested.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Machine learning approaches for lateral strength estimation in squat shear walls: A comparative study and practical implications

Khuong Le Nguyen, Hoa Thi Trinh, Saeed Banihashemi, Thong M. Pham

Summary: This study investigated the influence of input parameters on the shear strength of RC squat walls and found that ensemble learning models, particularly XGBoost, can effectively predict the shear strength. The axial load had a greater influence than reinforcement ratio, and longitudinal reinforcement had a more significant impact compared to horizontal and vertical reinforcement. The performance of XGBoost model outperforms traditional design models and reducing input features still yields reliable predictions.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

DHESN: A deep hierarchical echo state network approach for algal bloom prediction

Bo Hu, Huiyan Zhang, Xiaoyi Wang, Li Wang, Jiping Xu, Qian Sun, Zhiyao Zhao, Lei Zhang

Summary: A deep hierarchical echo state network (DHESN) is proposed to address the limitations of shallow coupled structures. By using transfer entropy, candidate variables with strong causal relationships are selected and a hierarchical reservoir structure is established to improve prediction accuracy. Simulation results demonstrate that DHESN performs well in predicting algal bloom.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Learning high-dependence Bayesian network classifier with robust topology

Limin Wang, Lingling Li, Qilong Li, Kuo Li

Summary: This paper discusses the urgency of learning complex multivariate probability distributions due to the increase in data variability and quantity. It introduces a highly scalable classifier called TAN, which utilizes maximum weighted spanning tree (MWST) for graphical modeling. The paper theoretically proves the feasibility of extending one-dependence MWST to model high-dependence relationships and proposes a heuristic search strategy to improve the fitness of the extended topology to data. Experimental results demonstrate that this algorithm achieves a good bias-variance tradeoff and competitive classification performance compared to other high-dependence or ensemble learning algorithms.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Make a song curative: A spatio-temporal therapeutic music transfer model for anxiety reduction

Zhejing Hu, Gong Chen, Yan Liu, Xiao Ma, Nianhong Guan, Xiaoying Wang

Summary: Anxiety is a prevalent issue and music therapy has been found effective in reducing anxiety. To meet the diverse needs of individuals, a novel model called the spatio-temporal therapeutic music transfer model (StTMTM) is proposed.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

A modified reverse-based analysis logic mining model with Weighted Random 2 Satisfiability logic in Discrete Hopfield Neural Network and multi-objective training of Modified Niched Genetic Algorithm

Nur Ezlin Zamri, Mohd. Asyraf Mansor, Mohd Shareduwan Mohd Kasihmuddin, Siti Syatirah Sidik, Alyaa Alway, Nurul Atiqah Romli, Yueling Guo, Siti Zulaikha Mohd Jamaludin

Summary: In this study, a hybrid logic mining model was proposed by combining the logic mining approach with the Modified Niche Genetic Algorithm. This model improves the generalizability and storage capacity of the retrieved induced logic. Various modifications were made to address other issues. Experimental results demonstrate that the proposed model outperforms baseline methods in terms of accuracy, precision, specificity, and correlation coefficient.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

On taking advantage of opportunistic meta-knowledge to reduce configuration spaces for automated machine learning

David Jacob Kedziora, Tien-Dung Nguyen, Katarzyna Musial, Bogdan Gabrys

Summary: The paper addresses the problem of efficiently optimizing machine learning solutions by reducing the configuration space of ML pipelines and leveraging historical performance. The experiments conducted show that opportunistic/systematic meta-knowledge can improve ML outcomes, and configuration-space culling is optimal when balanced. The utility and impact of meta-knowledge depend on various factors and are crucial for generating informative meta-knowledge bases.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Optimal location for an EVPL and capacitors in grid for voltage profile and power loss: FHO-SNN approach

G. Sophia Jasmine, Rajasekaran Stanislaus, N. Manoj Kumar, Thangamuthu Logeswaran

Summary: In the context of a rapidly expanding electric vehicle market, this research investigates the ideal locations for EV charging stations and capacitors in power grids to enhance voltage stability and reduce power losses. A hybrid approach combining the Fire Hawk Optimizer and Spiking Neural Network is proposed, which shows promising results in improving system performance. The optimization approach has the potential to enhance the stability and efficiency of electric grids.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

NLP-based approach for automated safety requirements information retrieval from project documents

Zhijiang Wu, Guofeng Ma

Summary: This study proposes a natural language processing-based framework for requirement retrieval and document association, which can help to mine and retrieve documents related to project managers' requirements. The framework analyzes the ontology relevance and emotional preference of requirements. The results show that the framework performs well in terms of iterations and threshold, and there is a significant matching between the retrieved documents and the requirements, which has significant managerial implications for construction safety management.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Dog nose-print recognition based on the shape and spatial features of scales

Yung-Kuan Chan, Chuen-Horng Lin, Yuan-Rong Ben, Ching-Lin Wang, Shu-Chun Yang, Meng-Hsiun Tsai, Shyr-Shen Yu

Summary: This study proposes a novel method for dog identification using nose-print recognition, which can be applied to controlling stray dogs, locating lost pets, and pet insurance verification. The method achieves high recognition accuracy through two-stage segmentation and feature extraction using a genetic algorithm.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Fostering supply chain resilience for omni-channel retailers: A two-phase approach for supplier selection and demand allocation under disruption risks

Shaohua Song, Elena Tappia, Guang Song, Xianliang Shi, T. C. E. Cheng

Summary: This study aims to optimize supplier selection and demand allocation decisions for omni-channel retailers in order to achieve supply chain resilience. It proposes a two-phase approach that takes into account various factors such as supplier evaluation and demand allocation.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Accelerating Benders decomposition approach for shared parking spaces allocation considering parking unpunctuality and no-shows

Jinyan Hu, Yanping Jiang

Summary: This paper examines the allocation problem of shared parking spaces considering parking unpunctuality and no-shows. It proposes an effective approach using sample average approximation (SAA) combined with an accelerating Benders decomposition (ABD) algorithm to solve the problem. The numerical experiments demonstrate the significance of supply-demand balance for the operation and user satisfaction of the shared parking system.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Review Computer Science, Artificial Intelligence

Financial fraud detection using graph neural networks: A systematic review

Soroor Motie, Bijan Raahemi

Summary: Financial fraud is a persistent problem in the finance industry, but Graph Neural Networks (GNNs) have emerged as a powerful tool for detecting fraudulent activities. This systematic review provides a comprehensive overview of the current state-of-the-art technologies in using GNNs for financial fraud detection, identifies gaps and limitations in existing research, and suggests potential directions for future research.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Review Computer Science, Artificial Intelligence

Occluded person re-identification with deep learning: A survey and perspectives

Enhao Ning, Changshuo Wang, Huang Zhang, Xin Ning, Prayag Tiwari

Summary: This review provides a detailed overview of occluded person re-identification methods and conducts a systematic analysis and comparison of existing deep learning-based approaches. It offers important theoretical and practical references for future research in the field.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

A hierarchical attention detector for bearing surface defect detection

Jiajun Ma, Songyu Hu, Jianzhong Fu, Gui Chen

Summary: The article presents a novel visual hierarchical attention detector for multi-scale defect location and classification, utilizing texture, semantic, and instance features of defects through a hierarchical attention mechanism, achieving multi-scale defect detection in bearing images with complex backgrounds.

EXPERT SYSTEMS WITH APPLICATIONS (2024)