Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (222)
  • Open Access

    ARTICLE

    Information Theoretic Weighted Fuzzy Clustering Ensemble

    Yixuan Wang1, Liping Yuan2,3, Harish Garg4, Ali Bagherinia5, Parvïn Hamïd6,7,8,*, Kim-Hung Pho9, Zulkefli Mansor10

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 369-392, 2021, DOI:10.32604/cmc.2021.012850

    Abstract In order to improve performance and robustness of clustering, it is proposed to generate and aggregate a number of primary clusters via clustering ensemble technique. Fuzzy clustering ensemble approaches attempt to improve the performance of fuzzy clustering tasks. However, in these approaches, cluster (or clustering) reliability has not paid much attention to. Ignoring cluster (or clustering) reliability makes these approaches weak in dealing with low-quality base clustering methods. In this paper, we have utilized cluster unreliability estimation and local weighting strategy to propose a new fuzzy clustering ensemble method which has introduced Reliability Based weighted co-association matrix Fuzzy C-Means (RBFCM),… More >

  • Open Access

    ARTICLE

    Robust Attack Detection Approach for IIoT Using Ensemble Classifier

    V. Priya1, I. Sumaiya Thaseen1, Thippa Reddy Gadekallu1, Mohamed K. Aboudaif2,*, Emad Abouel Nasr3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2457-2470, 2021, DOI:10.32604/cmc.2021.013852

    Abstract Generally, the risks associated with malicious threats are increasing for the Internet of Things (IoT) and its related applications due to dependency on the Internet and the minimal resource availability of IoT devices. Thus, anomaly-based intrusion detection models for IoT networks are vital. Distinct detection methodologies need to be developed for the Industrial Internet of Things (IIoT) network as threat detection is a significant expectation of stakeholders. Machine learning approaches are considered to be evolving techniques that learn with experience, and such approaches have resulted in superior performance in various applications, such as pattern recognition, outlier analysis, and speech recognition.… More >

  • Open Access

    ARTICLE

    Soft Computing Based Evolutionary Multi-Label Classification

    Rubina Aslam1,*, Manzoor Illahi Tamimy1, Waqar Aslam2

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1233-1249, 2020, DOI:10.32604/iasc.2020.013086

    Abstract Machine Learning (ML) has revolutionized intelligent systems that range from self-driving automobiles, search engines, business/market analysis, fraud detection, network intrusion investigation, and medical diagnosis. Classification lies at the core of Machine Learning and Multi-label Classification (MLC) is the closest to real-life problems related to heuristics. It is a type of classification problem where multiple labels or classes can be assigned to more than one instance simultaneously. The level of complexity in MLC is increased by factors such as data imbalance, high dimensionality, label correlations, and noise. Conventional MLC techniques such as ensembles-based approaches, Multi-label Stacking, Random k-label sets, and Hierarchy… More >

  • Open Access

    ARTICLE

    Large-Scale KPI Anomaly Detection Based on Ensemble Learning and Clustering

    Ji Qian1, Fang Liu2,*, Donghui Li3, Xin Jin4, Feng Li4

    Journal of Cyber Security, Vol.2, No.4, pp. 157-166, 2020, DOI:10.32604/jcs.2020.011169

    Abstract Anomaly detection using KPI (Key Performance Indicator) is critical for Internet-based services to maintain high service availability. However, given the velocity, volume, and diversified nature of monitoring data, it is difficult to obtain enough labelled data to build an accurate anomaly detection model for using supervised machine leaning methods. In this paper, we propose an automatic and generic transfer learning strategy: Detecting anomalies on a new KPI by using pretrained model on existing selected labelled KPI. Our approach, called KADT (KPI Anomaly Detection based on Transfer Learning), integrates KPI clustering and model pretrained techniques. KPI clustering is used to obtain… More >

  • Open Access

    ARTICLE

    A Stacking-Based Deep Neural Network Approach for Effective Network Anomaly Detection

    Lewis Nkenyereye1, Bayu Adhi Tama2, Sunghoon Lim3,*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 2217-2227, 2021, DOI:10.32604/cmc.2020.012432

    Abstract An anomaly-based intrusion detection system (A-IDS) provides a critical aspect in a modern computing infrastructure since new types of attacks can be discovered. It prevalently utilizes several machine learning algorithms (ML) for detecting and classifying network traffic. To date, lots of algorithms have been proposed to improve the detection performance of A-IDS, either using individual or ensemble learners. In particular, ensemble learners have shown remarkable performance over individual learners in many applications, including in cybersecurity domain. However, most existing works still suffer from unsatisfactory results due to improper ensemble design. The aim of this study is to emphasize the effectiveness… More >

  • Open Access

    ARTICLE

    Ensemble Learning Based on GBDT and CNN for Adoptability Prediction

    Yunfan Ye1, Fang Liu1, *, Shan Zhao2, Wanting Hu3, Zhiyao Liang4

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1361-1372, 2020, DOI:10.32604/cmc.2020.011632

    Abstract By efficiently and accurately predicting the adoptability of pets, shelters and rescuers can be positively guided on improving attraction of pet profiles, reducing animal suffering and euthanization. Previous prediction methods usually only used a single type of content for training. However, many pets contain not only textual content, but also images. To make full use of textual and visual information, this paper proposed a novel method to process pets that contain multimodal information. We employed several CNN (Convolutional Neural Network) based models and other methods to extract features from images and texts to obtain the initial multimodal representation, then reduce… More >

  • Open Access

    ARTICLE

    Ensemble Strategy for Insider Threat Detection from User Activity Logs

    Shihong Zou1, Huizhong Sun1, *, Guosheng Xu1, Ruijie Quan2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1321-1334, 2020, DOI:10.32604/cmc.2020.09649

    Abstract In the information era, the core business and confidential information of enterprises/organizations is stored in information systems. However, certain malicious inside network users exist hidden inside the organization; these users intentionally or unintentionally misuse the privileges of the organization to obtain sensitive information from the company. The existing approaches on insider threat detection mostly focus on monitoring, detecting, and preventing any malicious behavior generated by users within an organization’s system while ignoring the imbalanced ground-truth insider threat data impact on security. To this end, to be able to detect insider threats more effectively, a data processing tool was developed to… More >

  • Open Access

    ARTICLE

    The Design and Implementation of a Multidimensional and Hierarchical Web Anomaly Detection System

    Jianfeng Guan*, Jiawei Li, Zhongbai Jiang

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 131-141, 2019, DOI:10.31209/2018.100000050

    Abstract The traditional web anomaly detection systems face the challenges derived from the constantly evolving of the web malicious attacks, which therefore result in high false positive rate, poor adaptability, easy over-fitting, and high time complexity. Due to these limitations, we need a new anomaly detection system to satisfy the requirements of enterprise-level anomaly detection. There are lots of anomaly detection systems designed for different application domains. However, as for web anomaly detection, it has to describe the network accessing behaviours characters from as many dimensions as possible to improve the performance. In this paper we design and implement a Multidimensional… More >

  • Open Access

    ARTICLE

    Multi-Level Feature-Based Ensemble Model for Target-Related Stance Detection

    Shi Li1, Xinyan Cao1, *, Yiting Nan2

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 777-788, 2020, DOI:10.32604/cmc.2020.010870

    Abstract Stance detection is the task of attitude identification toward a standpoint. Previous work of stance detection has focused on feature extraction but ignored the fact that irrelevant features exist as noise during higher-level abstracting. Moreover, because the target is not always mentioned in the text, most methods have ignored target information. In order to solve these problems, we propose a neural network ensemble method that combines the timing dependence bases on long short-term memory (LSTM) and the excellent extracting performance of convolutional neural networks (CNNs). The method can obtain multi-level features that consider both local and global features. We also… More >

  • Open Access

    ARTICLE

    KAEA: A Novel Three-Stage Ensemble Model for Software Defect Prediction

    Nana Zhang1, Kun Zhu1, Shi Ying1, *, Xu Wang2

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 471-499, 2020, DOI:10.32604/cmc.2020.010117

    Abstract Software defect prediction is a research hotspot in the field of software engineering. However, due to the limitations of current machine learning algorithms, we can’t achieve good effect for defect prediction by only using machine learning algorithms. In previous studies, some researchers used extreme learning machine (ELM) to conduct defect prediction. However, the initial weights and biases of the ELM are determined randomly, which reduces the prediction performance of ELM. Motivated by the idea of search based software engineering, we propose a novel software defect prediction model named KAEA based on kernel principal component analysis (KPCA), adaptive genetic algorithm, extreme… More >

Displaying 201-210 on page 21 of 222. Per Page