2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA)最新文献

筛选
英文 中文
Computable Expert Knowledge in Computer Games 计算机游戏中的可计算专家知识
K. Fujii, F. Hsieh, Cho-Jui Hsieh
{"title":"Computable Expert Knowledge in Computer Games","authors":"K. Fujii, F. Hsieh, Cho-Jui Hsieh","doi":"10.1109/ICMLA.2017.00-69","DOIUrl":"https://doi.org/10.1109/ICMLA.2017.00-69","url":null,"abstract":"We algorithmically compute and demonstrate multi-scale expert knowledge of computer gaming through pattern compositions on two levels of heterogeneity. Hierarchical clustering (HC) is applied to construct block-based heatmaps: colored matrices framed by two hierarchical trees imposed upon row and column axes. The computed heterogeneity is seen to induce different collections of viable gaming features pertaining to different map-clusters. On the game level, the map-dependent heterogeneity is seen to reveal which gaming-feature-pattern compositions are indeed viable for wins or losses with near-certainty, and which correspond to 50-50 uncertainty in outcome. Hence, such pattern compositions become the critical knowledge bases for pre-game prediction as well as ongoing-gaming strategy. The computer game, TagPro: Capture the Flag, is used as an illustrating example throughout the development of this paper.","PeriodicalId":6636,"journal":{"name":"2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA)","volume":"99 1","pages":"749-754"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76780777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Automated Information Extraction Techniques: Drawbacks of Current Methods, and Enhanced Extractors 网络安全自动信息提取技术:现有方法的缺点,以及增强的提取器
R. A. Bridges, Kelly M. T. Huffer, Corinne L. Jones, Michael D. Iannacone, J. Goodall
{"title":"Cybersecurity Automated Information Extraction Techniques: Drawbacks of Current Methods, and Enhanced Extractors","authors":"R. A. Bridges, Kelly M. T. Huffer, Corinne L. Jones, Michael D. Iannacone, J. Goodall","doi":"10.1109/ICMLA.2017.0-122","DOIUrl":"https://doi.org/10.1109/ICMLA.2017.0-122","url":null,"abstract":"We address a crucial element of applied information extraction—accurate identification of basic security entities in text-—by evaluating previous methods and presenting new labelers. Our survey reveals that the previous efforts have not been tested on documents similar to the targeted sources (news articles, blogs, tweets, etc.) and that no sufficiently large publicly available annotated corpus of these documents exists. By assembling a representative test corpus, we perform a quantitative evaluation of previous methods in a realistic setting, revealing an overall lack of recall, and giving insight to the models' beneficial and inhibiting elements. In particular, our results show that many previous efforts overfit to the non-representative test corpora in this domain. Informed by this evaluation, we present three novel cyber entity extractors, which seek to leverage the available labeled data but remain worthwhile on the more diverse documents encountered in the wild. Each new model increases the state of the art in recall, with maximal or near maximal F1 score. Our results establish that the state of the art in cyber entity tagging is characterized by F1 = 0.61.","PeriodicalId":6636,"journal":{"name":"2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA)","volume":"126 1","pages":"437-442"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73727840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Novel Application of Naive Bayes Classifier in Photovoltaic Energy Prediction 朴素贝叶斯分类器在光伏能量预测中的新应用
R. Bayindir, M. Yesilbudak, Medine Colak, N. Genç
{"title":"A Novel Application of Naive Bayes Classifier in Photovoltaic Energy Prediction","authors":"R. Bayindir, M. Yesilbudak, Medine Colak, N. Genç","doi":"10.1109/ICMLA.2017.0-108","DOIUrl":"https://doi.org/10.1109/ICMLA.2017.0-108","url":null,"abstract":"Solar energy is one of the most affordable and clean renewable energy source in the world. Hence, the solar energy prediction is an inevitable requirement in order to get the maximum solar energy during the day time and to increase the efficiency of solar energy systems. For this purpose, this paper predicts the daily total energy generation of an installed photovoltaic system using the Naïve Bayes classifier. In the prediction process, one-year historical dataset including daily average temperature, daily total sunshine duration, daily total global solar radiation and daily total photovoltaic energy generation parameters are used as the categorical-valued attributes. By means of the Naïve Bayes application, the sensitivity and the accuracy measures are improved for the photovoltaic energy prediction and the effects of other solar attributes on the photovoltaic energy generation are evaluated.","PeriodicalId":6636,"journal":{"name":"2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA)","volume":"20 1","pages":"523-527"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75157623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Anomaly Detection in Earth Dam and Levee Passive Seismic Data Using Multivariate Gaussian 基于多元高斯分布的土坝、堤被动地震数据异常检测
W. Fisher, B. Jackson, T. Camp, V. Krzhizhanovskaya
{"title":"Anomaly Detection in Earth Dam and Levee Passive Seismic Data Using Multivariate Gaussian","authors":"W. Fisher, B. Jackson, T. Camp, V. Krzhizhanovskaya","doi":"10.1109/ICMLA.2017.00-81","DOIUrl":"https://doi.org/10.1109/ICMLA.2017.00-81","url":null,"abstract":"As earth dams and levees (EDLs) across the United States reach the end of their design lives, effectively monitoring their structural integrity is of critical importance. This paper investigates automatic detection of anomalous events in passive seismic data as a step towards continuous real-time monitoring of EDL health. We use a multivariate Gaussian machine-learning model to identify anomalies in experimental data from two different laboratory earth embankments. Additionally, we explore five wavelet transform methods for signal denoising; removing different signal components. The best performance is achieved with the Haar wavelets (removing the Level 3 component). We achieve up to 97.3% overall accuracy and less than 1.4% false negatives in anomaly detection. These promising approaches could eventually provide a means for identifying internal erosion events in aging EDLs earlier than is currently possible, thereby allowing more time to prevent or mitigate catastrophic failures.","PeriodicalId":6636,"journal":{"name":"2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA)","volume":"41 1","pages":"685-690"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75722328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detection of Exfiltration and Tunneling over DNS DNS的泄漏和隧道检测
Anirban Das, Min-Yi Shen, M. Shashanka, Jisheng Wang
{"title":"Detection of Exfiltration and Tunneling over DNS","authors":"Anirban Das, Min-Yi Shen, M. Shashanka, Jisheng Wang","doi":"10.1109/ICMLA.2017.00-71","DOIUrl":"https://doi.org/10.1109/ICMLA.2017.00-71","url":null,"abstract":"This paper proposes a method to detect two primary means of using the Domain Name System (DNS) for malicious purposes. We develop machine learning models to detect information exfiltration from compromised machines and the establishment of command & control (C&C) servers via tunneling. We validate our approach by experiments where we successfully detect a malware used in several recent Advanced Persistent Threat (APT) attacks [1]. The novelty of our method is its robustness, simplicity, scalability, and ease of deployment in a production environment.","PeriodicalId":6636,"journal":{"name":"2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA)","volume":"33 1","pages":"737-742"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75809124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Performance and Security Strength Trade-Off in Machine Learning Based Biometric Authentication Systems 基于机器学习的生物识别认证系统的性能和安全强度权衡
Koosha Sadeghi, Ayan Banerjee, Javad Sohankar, S. Gupta
{"title":"Performance and Security Strength Trade-Off in Machine Learning Based Biometric Authentication Systems","authors":"Koosha Sadeghi, Ayan Banerjee, Javad Sohankar, S. Gupta","doi":"10.1109/ICMLA.2017.00-12","DOIUrl":"https://doi.org/10.1109/ICMLA.2017.00-12","url":null,"abstract":"In Biometric Authentication Systems (BAS), the variability amongst population biometric data ensures distinctiveness, and helps minimizing false acceptance of non-subject data. However, higher variability implies temporal variations for a given subject, which can potentially reject subject data. Such variations are suppressed using feature extraction and Machine Learning (ML) techniques for improving the performance, but also reduce the adversary’s effort in breaking the system (security strength) using forged data. Typically for BAS design, performance and security strength are evaluated in isolation using experimental analysis. This research provides an analytical approach to evaluate the BAS performance and strength, and their trade-off, by modeling the biometric data, and studying the effect of feature extraction and ML configurations on processing the data. Experimental analysis on 106 subjects’ brain signal validates the analytical methodology results.","PeriodicalId":6636,"journal":{"name":"2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA)","volume":"8 1","pages":"1045-1048"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78908292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Predicting Waiting Times in Radiation Oncology Using Machine Learning 利用机器学习预测放射肿瘤学的等待时间
Akash Joseph, T. Hijal, J. Kildea, L. Hendren, D. Herrera
{"title":"Predicting Waiting Times in Radiation Oncology Using Machine Learning","authors":"Akash Joseph, T. Hijal, J. Kildea, L. Hendren, D. Herrera","doi":"10.1109/ICMLA.2017.00-16","DOIUrl":"https://doi.org/10.1109/ICMLA.2017.00-16","url":null,"abstract":"We describe a method for predicting waiting times in radiation oncology using machine learning. The patient waiting experience remains one of the most vexing challenges facing healthcare. At our comprehensive cancer centre, waiting periods that arise throughout a patient’s course of treatment are generally difficult for staff to predict and only rough estimates are typically provided based on personal experience. To the patient, waiting times feel long and are seemingly unpredictable. Delays for treatment at our centre depend on the durations of preceding patients scheduled in the queue. To that end, we have incorporated the treatment records of all previously-treated patients into a machine learning framework in order to predict treatment durations to infer an overall waiting time. We found that the Random Forest Regression model provides the best predictions for daily fractionated radiotherapy treatment durations. Using this model, we achieved a median residual (actual minus predicted duration) of 0.25 minutes and a standard deviation residual of 6.1 minutes to retrospective treatment data. Waiting times are derived by summing the predicted durations. The main features that generated the best fit model (from most to least significant) are: Allocated appointment time, radiotherapy fraction number, median past duration of treatments, the number of treatment fields, and previous treatment duration.","PeriodicalId":6636,"journal":{"name":"2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA)","volume":"51 1","pages":"1024-1029"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72829418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Component Based Architecture for the Control of Crossing Regions in Railway Networks 基于组件的铁路网络跨区控制体系结构
F. Ahmad, A. Sadiq, A. Enríquez, A. Muhammad, M. Anwar, Usama Ujaz Bajwa, M. Naseer, S. Khan
{"title":"Component Based Architecture for the Control of Crossing Regions in Railway Networks","authors":"F. Ahmad, A. Sadiq, A. Enríquez, A. Muhammad, M. Anwar, Usama Ujaz Bajwa, M. Naseer, S. Khan","doi":"10.1109/ICMLA.2017.0-105","DOIUrl":"https://doi.org/10.1109/ICMLA.2017.0-105","url":null,"abstract":"The research work in this paper discusses an improved Petri net model of railway crossing regions which are important and critical components of a railway networks. A control algorithm has been developed showing the interaction of the controller to other component of the system. A formal approach viz. Petri net (PN) is applied to model the safety requirement of trains along the crossing regions in railway networks. For the modeling, the component based modeling and the state-oriented modeling approaches have been integrated. First the track components and the control component are identified. The interaction of identified components, satisfying the safety requirements, is also defined in the high level architecture. Finally, state-oriented modeling approach has been adopted to design the detailed model of crossing region. Further, this paper uses the coverability tree to verify the specifications of crossing regions. By taking the crossing point as center, a circular region is introduced for safety purpose. Further, safety properties have been defined in term of place-invariants which have been verified by the state-space analysis.","PeriodicalId":6636,"journal":{"name":"2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA)","volume":"25 1","pages":"540-545"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87392926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
UoI-NMF Cluster: A Robust Nonnegative Matrix Factorization Algorithm for Improved Parts-Based Decomposition and Reconstruction of Noisy Data UoI-NMF聚类:一种改进的基于部件的噪声数据分解与重构鲁棒非负矩阵分解算法
Shashanka Ubaru, Kesheng Wu, K. Bouchard
{"title":"UoI-NMF Cluster: A Robust Nonnegative Matrix Factorization Algorithm for Improved Parts-Based Decomposition and Reconstruction of Noisy Data","authors":"Shashanka Ubaru, Kesheng Wu, K. Bouchard","doi":"10.1109/ICMLA.2017.0-152","DOIUrl":"https://doi.org/10.1109/ICMLA.2017.0-152","url":null,"abstract":"With the ever growing collection of large volumes of scientific data, development of interpretable machine learning tools to analyze such data is becoming more important. However, robust, interpretable machine learning tools are lacking, threatening extraction of scientific insight and discovery. Nonnegative Matrix Factorization (NMF) algorithms decompose an m × n nonnegative data matrix A into a k × n basis matrix H and an m × k weight matrix W, such that A ≈ WH, where k is the desired rank. In this paper, we present a novel two stage algorithm, UoI-NMF_cluster for NMF, which is based on three innovations: (i) completely separate bases learning from weight estimation, (ii) learn bases by clustering NMF results across bootstrap resamples of the data, and (iii) use the recently introduced Union of Intersections (UoI) framework to estimate ultra-sparse weights that maximize data reconstruction accuracy. We deploy our algorithm on various synthetic and scientific data to illustrate its performance, with a focus on neuroscience data. Compared to other NMF algorithms, UoI-NMF_cluster yields: a) more accurate parts-based decompositions of noisy data, b) a sparse and accurate weight matrix, and c) high accuracy reconstructions of the de-noised data. Together, these improvements enhance the performance and interpretability of NMF application to noisy data, and suggest similar approaches may benefit other matrix decomposition algorithms.","PeriodicalId":6636,"journal":{"name":"2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA)","volume":"6 1","pages":"241-248"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82272011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Machine Learning Approach to Detecting Sensor Data Modification Intrusions in WBANs 基于机器学习的传感器数据修改入侵检测方法
A. Verner, Dany Butvinik
{"title":"A Machine Learning Approach to Detecting Sensor Data Modification Intrusions in WBANs","authors":"A. Verner, Dany Butvinik","doi":"10.1109/ICMLA.2017.0-163","DOIUrl":"https://doi.org/10.1109/ICMLA.2017.0-163","url":null,"abstract":"Wireless Body Area Networks (WBANs) are widely used for collecting and monitoring patients' vital healthcare parameters, such as breathing, heart function and muscle activity. A serious flaw of WBANs is their vulnerability to various security issues, one of which is the physical tampering of the sensors. Transmission of invalid data by a damaged or compromised sensor may lead to incorrect diagnosis, improper treatment and undesirable results. In this paper, we analyze blood glucose-level sensors and propose a machine learning algorithm that detects intentional and inadvertent data modification intrusions for this type of sensors. The proposed algorithm uses Otsu’s Thresholding Method and other statistical measures to create features that estimate boundaries, averages, deviations and patterns of sensor data. Feature vectors are then classified by a Support Vector Machine (SVM) model with a linear kernel and varying misclassification parameter. Experiments on a large real-patient dataset show that the proposed algorithm achieves 100% precision and 99.22% recall.","PeriodicalId":6636,"journal":{"name":"2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA)","volume":"13 1","pages":"161-169"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82451288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信