International Conference on Machine Learning and Computing最新文献

筛选
英文 中文
A Survey of Feature Selection for Vulnerability Prediction Using Feature-based Machine Learning 基于特征的机器学习漏洞预测特征选择研究
International Conference on Machine Learning and Computing Pub Date : 2019-02-22 DOI: 10.1145/3318299.3318345
Zhanjun Li, Yan Shao
{"title":"A Survey of Feature Selection for Vulnerability Prediction Using Feature-based Machine Learning","authors":"Zhanjun Li, Yan Shao","doi":"10.1145/3318299.3318345","DOIUrl":"https://doi.org/10.1145/3318299.3318345","url":null,"abstract":"This paper summarized the basic process of software vulnerability prediction using feature-based machine learning for the first time. In addition to sorting out the related types and basis of vulnerability features definition, the advantages and disadvantages of different methods are compared. Finally, this paper analyzed the difficulties and challenges in this research field, and put forward some suggestions for future work.","PeriodicalId":164987,"journal":{"name":"International Conference on Machine Learning and Computing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123486033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Chaotic Cuckoo Search Algorithm for Solving Unmanned Combat Aerial Vehicle Path Planning Problems 求解无人机路径规划问题的混沌杜鹃搜索算法
International Conference on Machine Learning and Computing Pub Date : 2019-02-22 DOI: 10.1145/3318299.3318310
Jeng-Shyang Pan, Jenn-Long Liu, Shou-Cheng Hsiung
{"title":"Chaotic Cuckoo Search Algorithm for Solving Unmanned Combat Aerial Vehicle Path Planning Problems","authors":"Jeng-Shyang Pan, Jenn-Long Liu, Shou-Cheng Hsiung","doi":"10.1145/3318299.3318310","DOIUrl":"https://doi.org/10.1145/3318299.3318310","url":null,"abstract":"This paper applies an improved Cuckoo Search algorithm, named Chaotic CS algorithm, to solve Unmanned Combat Aerial Vehicle (UCAV) path planning problems. A circle-type chaotic map for generating chaotic sequences is used to specify the scaling factor (() of step size and fraction probability (pa) of abandonment for host nests formulated in the Original CS algorithm. The advantage of using Chaotic CS algorithm can dynamically change the parameters of ( and pa by using the chaotic sequences over the course of iterations, resulting in an improvement for searching performance to find out the global best solution. The enhanced CS algorithm shows flexible and robust capabilities to optimize complex and multimodal objective functions by evaluating standard benchmark functions. Furthermore, the Chaotic CS algorithm is applied to solve complex design problem. Two scenarios of UCAV path planning problems are carried out for the practical applications. The simulation results indicate that the Chaotic CS algorithm can efficiently be used for computing optimal flight path of UCAV.","PeriodicalId":164987,"journal":{"name":"International Conference on Machine Learning and Computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123622954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Quantifying Customer Review by Integrating Multiple Source of Knowledge 通过整合多个知识来源来量化客户评论
International Conference on Machine Learning and Computing Pub Date : 2019-02-22 DOI: 10.1145/3318299.3318309
Yuanchao Liu, Xinping Li, Mingjiang Wang
{"title":"Quantifying Customer Review by Integrating Multiple Source of Knowledge","authors":"Yuanchao Liu, Xinping Li, Mingjiang Wang","doi":"10.1145/3318299.3318309","DOIUrl":"https://doi.org/10.1145/3318299.3318309","url":null,"abstract":"The recent emergence of a large volume of customer reviews on e--commerce web sites has raised concerns on the provision of intuitive and comprehensive reputation comparisons of feature dimensions. In this paper, we propose and implement a product reputation mining prototype system. A multiple-knowledge based F-O pair extraction model, which is the center piece of our work, is presented for conducting analyses toward deeper sentence-level comprehension of sentiments in customer reviews. Experimental results demonstrate the effectiveness of the proposed method.","PeriodicalId":164987,"journal":{"name":"International Conference on Machine Learning and Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126459688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature Based Data Anonymization with Slicing Method for Data Publishing 基于特征的数据匿名化与切片数据发布方法
International Conference on Machine Learning and Computing Pub Date : 2019-02-22 DOI: 10.1145/3318299.3318389
Esther Gachanga, Michael W. Kimwele, L. Nderu
{"title":"Feature Based Data Anonymization with Slicing Method for Data Publishing","authors":"Esther Gachanga, Michael W. Kimwele, L. Nderu","doi":"10.1145/3318299.3318389","DOIUrl":"https://doi.org/10.1145/3318299.3318389","url":null,"abstract":"Information technology has enabled the collection and sharing of large amounts of data. This data is highly dimensional and contains sensitive information which needs to be protected. When the dimensionality of data increases, a feature selection mechanism can be used to determine a subset of the attributes that have high relevance. The information contained in features with high relevance should be preserved as much as possible. Anonymization techniques have been used to protect sensitive information in published datasets. However anonymization approaches may cause a data distortion that affects attributes with high relevance and thus affect classification accuracy. This work proposes information gain based anonymization with slicing method. We conduct experiments on real life datasets. Our results show that by reducing the amount of data distortion for features with high relevance in a dataset the privacy and quality of data can be enhanced.","PeriodicalId":164987,"journal":{"name":"International Conference on Machine Learning and Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128389653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Recommendation Algorithm for Mobile E-commerce Based on Reputation 基于声誉的移动电子商务推荐算法
International Conference on Machine Learning and Computing Pub Date : 2019-02-22 DOI: 10.1145/3318299.3318390
Yuan Chai, Dong Li, Yuchen Wu
{"title":"Recommendation Algorithm for Mobile E-commerce Based on Reputation","authors":"Yuan Chai, Dong Li, Yuchen Wu","doi":"10.1145/3318299.3318390","DOIUrl":"https://doi.org/10.1145/3318299.3318390","url":null,"abstract":"In the new technical background, more and more goods appear in front of the user. Unfortunately, users are increasingly easy to get lost in the massive commodity information. In order to improve the users experience of mobile e-commerce, combined with the advanced technology of large data age, there have been many recommendation algorithms for mobile e-commerce. All of this recommendation algorithms based on customer interests, sales and other different considerations, in order to achieve a purposeful and efficient screening recommendation information. In many ways of thinking, the user reputation as a new era of the spirit of the contract reflects the important value. In this paper, we focus on the current technical situation, designing a set of scoring algorithm through the analysis of the previous behavioral data modeling. After this algorithm, from different customer categories of different needs to start using the mainstream for the score of the business recommendation algorithm algorithm to achieve. And the results are compared with the expected analysis in order to obtain the current algorithm in the credibility of the algorithm under the improvement and adjustment. Finally, we will design a set of recommendation algorithm based on the reputation standards.","PeriodicalId":164987,"journal":{"name":"International Conference on Machine Learning and Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132581088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Hyperspectral Based Dorsal Hand Recognition System 一种新的基于高光谱的手背识别系统
International Conference on Machine Learning and Computing Pub Date : 2019-02-22 DOI: 10.1145/3318299.3318316
Wei Nie, Bob Zhang, Shuping Zhao
{"title":"A Novel Hyperspectral Based Dorsal Hand Recognition System","authors":"Wei Nie, Bob Zhang, Shuping Zhao","doi":"10.1145/3318299.3318316","DOIUrl":"https://doi.org/10.1145/3318299.3318316","url":null,"abstract":"In biometrics, dorsal hand recognition systems are secure, user-friendly, and non-intrusive. Currently, the state-of-the-art in this area uses a single near-infrared spectral band such as 850nm or far-infrared thermography with a range of 8-14μm. This would limit the extraction of only hand veins from a dorsal hand image. However, the dorsal hand contains much more features such as the texture of the skin, pigmented moles, and various chromophores. Therefore, using one spectral band cannot extract all possible dorsal hand features. To resolve this issue, in this paper we propose a novel hyperspectral based dorsal hand recognition system. First, a novel hyperspectral acquisition device is designed to establish a hyperspectral dorsal hand database consisting of 53 spectra. Next, a region of interest was extracted from all spectral dorsal hand images. Then, the partitioned local binary pattern was applied for feature representation extracting both dorsal hand texture and vein features. Finally, the nearest neighborhood classifier was utilized to perform recognition. To validate the proposed system, extensive experiments were conducted on all spectral bands (individually) and the combination of wavelengths of visible light and NIR for both identification and verification using 120 individuals. The highest accuracy for identification (0.998) was achieved using 600nm and 860nm, while for verification the same spectral combo produced the lowest EER of 0.049.","PeriodicalId":164987,"journal":{"name":"International Conference on Machine Learning and Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134440156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blood Glucose Level Prediction with Minimal Inputs Using Feedforward Neural Network for Diabetic Type 1 Patients 用前馈神经网络最小输入预测1型糖尿病患者血糖水平
International Conference on Machine Learning and Computing Pub Date : 2019-02-22 DOI: 10.1145/3318299.3318354
Muhammad Asad, Usman Qamar, Babar Zeb, Aimal Khan, Younas Khan
{"title":"Blood Glucose Level Prediction with Minimal Inputs Using Feedforward Neural Network for Diabetic Type 1 Patients","authors":"Muhammad Asad, Usman Qamar, Babar Zeb, Aimal Khan, Younas Khan","doi":"10.1145/3318299.3318354","DOIUrl":"https://doi.org/10.1145/3318299.3318354","url":null,"abstract":"Introduction: Diabetes mellitus is one of the rapidly increasing diseases throughout the world. Studies reveal that proper management of blood glucose levels can reduce the complications associated with diabetes type 1. Objective: We use only continuous blood glucose data and predicted future blood glucose level using the previous data. Method: In this research, we input Continuous Glucose Monitoring (CGM) data to train a feedforward neural network using window model, to get optimal neural network for each subject in predicting prior blood glucose values. We have investigated virtual CGM data of 10 subjects in order to depict the efficiency of the proposed method and to validate the ANN. These ten case studies have been compiled from AIDA i.e. the freeware mathematical diabetes simulator. Results: For BGL predictions, improved results have been shown for minimal inputs in the prediction horizon (PH) of 15 minutes. Results produced by experimentation reveal that our ANN is accurate, adaptive, and can be implemented in clinics. Moreover, this study targets to make life easier for T1D patients by minimizing human input to the system. Conclusion and Future work: We conclude that feedforward gives better results for minimal inputs while other methods have better results for multiple inputs. In the future, we intend to investigate a larger collection of AIDA scenarios, and for real patients.","PeriodicalId":164987,"journal":{"name":"International Conference on Machine Learning and Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125869593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
File Matching Based on Secure Authentication and Proxy Homomorphic Re-encryption 基于安全认证和代理同态重加密的文件匹配
International Conference on Machine Learning and Computing Pub Date : 2019-02-22 DOI: 10.1145/3318299.3318392
Bin Yu, Chen Zhang, Weihong Li
{"title":"File Matching Based on Secure Authentication and Proxy Homomorphic Re-encryption","authors":"Bin Yu, Chen Zhang, Weihong Li","doi":"10.1145/3318299.3318392","DOIUrl":"https://doi.org/10.1145/3318299.3318392","url":null,"abstract":"With the rapid development of cloud computing and big data, users often outsource configuration files to the cloud for computing and matching to reduce the burden on the terminals. In order to prevent the leakage of privacy, this paper proposes a new privacy protection scheme based on a dual identity authentication and proxy homomorphic re-encryption private matching, and relies on two non-collusion cloud servers to complete the calculation and matching of attribute configuration files. The plaintext of the configuration file is invisible to both servers from start to finish. Even if the user colludes with one of the servers, they cannot decipher the properties file. The purpose of this is to prevent disguise by attackers and effectively protect personal privacy.","PeriodicalId":164987,"journal":{"name":"International Conference on Machine Learning and Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130127291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Study on the Performance Evaluation of Machine Learning Models for Phoneme Classification 音素分类机器学习模型的性能评价研究
International Conference on Machine Learning and Computing Pub Date : 2019-02-22 DOI: 10.1145/3318299.3318385
Ali Shariq Imran, Abdolreza Sabzi Shahrebabaki, Negar Olfati, T. Svendsen
{"title":"A Study on the Performance Evaluation of Machine Learning Models for Phoneme Classification","authors":"Ali Shariq Imran, Abdolreza Sabzi Shahrebabaki, Negar Olfati, T. Svendsen","doi":"10.1145/3318299.3318385","DOIUrl":"https://doi.org/10.1145/3318299.3318385","url":null,"abstract":"This paper provides a comparative performance analysis of both shallow and deep machine learning classifiers for speech recognition task using frame-level phoneme classification. Phoneme recognition is still a fundamental and equally crucial initial step toward automatic speech recognition (ASR) systems. Often conventional classifiers perform exceptionally well on domain-specific ASR systems having a limited set of vocabulary and training data in contrast to deep learning approaches. It is thus imperative to evaluate performance of a system using deep artificial networks in terms of correctly recognizing atomic speech units, i.e., phonemes in this case with conventional state-of-the-art machine learning classifiers. Two deep learning models - DNN and LSTM with multiple configuration architectures by varying the number of layers and the number of neurons in each layer on the OLLO speech corpora along with six shallow machine learning classifiers for Filterbank acoustic features are thoroughly studied.\u0000 Additionally, features with three and ten frames temporal context are computed and compared with no-context features for different models. The classifier's performance is evaluated in terms of precision, recall, and F1 score for 14 consonants and 10 vowels classes for 10 speakers with 4 different dialects. High classification accuracy of 93% and 95% F1 score is obtained with DNN and LSTM networks respectively on context-dependent features for 3-hidden layers containing 1024 nodes each. SVM surprisingly obtained even a higher classification score of 96.13% and a misclassification error of less than 5% for consonants and 4% for vowels.","PeriodicalId":164987,"journal":{"name":"International Conference on Machine Learning and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130182089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research of Integrated Reorganization of Mineral Rock and Fossil Specimen Data Based on ETL Technology 基于ETL技术的矿物岩石与化石标本数据整合重组研究
International Conference on Machine Learning and Computing Pub Date : 2019-02-22 DOI: 10.1145/3318299.3318393
Zhiyuan Wu, Yang Mei, Yinqian Cheng
{"title":"Research of Integrated Reorganization of Mineral Rock and Fossil Specimen Data Based on ETL Technology","authors":"Zhiyuan Wu, Yang Mei, Yinqian Cheng","doi":"10.1145/3318299.3318393","DOIUrl":"https://doi.org/10.1145/3318299.3318393","url":null,"abstract":"In the integrated reorganization of mineral, rock and fossil specimen data [1], standards and norms are the prerequisite, and the collection and integration of resource data are the core. ETL technology has the ability to realize data extracting, transforming and loading. In this paper, it has been introduced into the integrated reorganization of mineral, rock and fossil specimen data. Kettle which is an ETL tool was selected to collect and integrate multi-source and heterogeneous specimen data, and have get good application results. It proved the effectiveness of ETL technology in the integrated reorganization of specimen data. The method has a certain practical reference significance, providing some scientific reference for the integrated reorganization of other resources data.","PeriodicalId":164987,"journal":{"name":"International Conference on Machine Learning and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130476158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信