145 results on '"True positive rate"'
Search Results
2. Considerations on the region of interest in the ROC space.
- Author
-
Lavazza, Luigi and Morasca, Sandro
- Subjects
- *
RECEIVER operating characteristic curves , *PYTHON programming language , *BORDERLANDS , *STATISTICAL correlation , *SOFTWARE engineers , *SOFTWARE engineering - Abstract
Receiver Operating Characteristic curves have been widely used to represent the performance of diagnostic tests. The corresponding area under the curve, widely used to evaluate their performance quantitatively, has been criticized in several respects. Several proposals have been introduced to improve area under the curve by taking into account only specific regions of the Receiver Operating Characteristic space, that is, the plane to which Receiver Operating Characteristic curves belong. For instance, a region of interest can be delimited by setting specific thresholds for the true positive rate or the false positive rate. Different ways of setting the borders of the region of interest may result in completely different, even opposing, evaluations. In this paper, we present a method to define a region of interest in a rigorous and objective way, and compute a partial area under the curve that can be used to evaluate the performance of diagnostic tests. The method was originally conceived in the Software Engineering domain to evaluate the performance of methods that estimate the defectiveness of software modules. We compare this method with previous proposals. Our method allows the definition of regions of interest by setting acceptability thresholds on any kind of performance metric, and not just false positive rate and true positive rate: for instance, the region of interest can be determined by imposing that ϕ (also known as the Matthews Correlation Coefficient) is above a given threshold. We also show how to delimit the region of interest corresponding to acceptable costs, whenever the individual cost of false positives and false negatives is known. Finally, we demonstrate the effectiveness of the method by applying it to the Wisconsin Breast Cancer Data. We provide Python and R packages supporting the presented method. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
3. Combining biomarkers by maximizing the true positive rate for a fixed false positive rate.
- Author
-
Meisner, Allison, Carone, Marco, Pepe, Margaret S., and Kerr, Kathleen F.
- Abstract
Biomarkers abound in many areas of clinical research, and often investigators are interested in combining them for diagnosis, prognosis, or screening. In many applications, the true positive rate (TPR) for a biomarker combination at a prespecified, clinically acceptable false positive rate (FPR) is the most relevant measure of predictive capacity. We propose a distribution‐free method for constructing biomarker combinations by maximizing the TPR while constraining the FPR. Theoretical results demonstrate desirable properties of biomarker combinations produced by the new method. In simulations, the biomarker combination provided by our method demonstrated improved operating characteristics in a variety of scenarios when compared with alternative methods for constructing biomarker combinations. Thus, use of our method could lead to the development of better biomarker combinations, increasing the likelihood of clinical adoption. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
4. Ad Fraud Measure and Benchmark
- Author
-
Zhu, Xingquan, Tao, Haicheng, Wu, Zhiang, Cao, Jie, Kalish, Kristopher, Kayne, Jeremy, Zdonik, Stan, Series editor, Shekhar, Shashi, Series editor, Wu, Xindong, Series editor, Jain, Lakhmi C., Series editor, Padua, David, Series editor, Shen, Xuemin Sherman, Series editor, Furht, Borko, Series editor, Subrahmanian, V.S., Series editor, Hebert, Martial, Series editor, Ikeuchi, Katsushi, Series editor, Siciliano, Bruno, Series editor, Jajodia, Sushil, Series editor, Lee, Newton, Series editor, Zhu, Xingquan, Tao, Haicheng, Wu, Zhiang, Cao, Jie, Kalish, Kristopher, and Kayne, Jeremy
- Published
- 2017
- Full Text
- View/download PDF
5. Meta-analysis of Diagnostic Studies : Diagnostic Odds Ratios and Summary Receiver Operating Curves
- Author
-
Cleophas, Ton J., Zwinderman, Aeilko H., Cleophas, Ton J., and Zwinderman, Aeilko H.
- Published
- 2017
- Full Text
- View/download PDF
6. Benchmarking Intrusion Detection Systems with Adaptive Provisioning of Virtualized Resources
- Author
-
Milenkoski, Aleksandar, Jayaram, K. R., Kounev, Samuel, Kounev, Samuel, editor, Kephart, Jeffrey O., editor, Milenkoski, Aleksandar, editor, and Zhu, Xiaoyun, editor
- Published
- 2017
- Full Text
- View/download PDF
7. Autoscaling Bloom filter: controlling trade-off between true and false positives.
- Author
-
Kleyko, Denis, Rahimi, Abbas, Gayler, Ross W., and Osipov, Evgeny
- Subjects
- *
FILTERS & filtration , *ARTIFICIAL neural networks , *MATHEMATICAL analysis , *PROBABILISTIC databases - Abstract
A Bloom filter is a special case of an artificial neural network with two layers. Traditionally, it is seen as a simple data structure supporting membership queries on a set. The standard Bloom filter does not support the delete operation, and therefore, many applications use a counting Bloom filter to enable deletion. This paper proposes a generalization of the counting Bloom filter approach, called "autoscaling Bloom filters", which allows adjustment of its capacity with probabilistic bounds on false positives and true positives. Thus, by relaxing the requirement on perfect true positive rate, the proposed autoscaling Bloom filter addresses the major difficulty of Bloom filters with respect to their scalability. In essence, the autoscaling Bloom filter is a binarized counting Bloom filter with an adjustable binarization threshold. We present the mathematical analysis of its performance and provide a procedure for minimizing its false positive rate. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
8. Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
- Author
-
Mohd Saudi, Madihah, Abuzaid, Areej Mustafa, Taib, Bachok M., Abdullah, Zul Hilmi, Sulaiman, Hamzah Asyrani, editor, Othman, Mohd Azlishah, editor, Othman, Mohd Fairuz Iskandar, editor, Rahim, Yahaya Abd, editor, and Pee, Naim Che, editor
- Published
- 2015
- Full Text
- View/download PDF
9. Monitoring Rail Condition Based on Sound and Vibration Sensors Installed on an Operational Train
- Author
-
Jensen, T., Chauhan, S., Haddad, K., Song, W., Junge, S., Boersma, Bendiks Jan, Series editor, Fujii, Kozo, Series editor, Haase, Werner, Series editor, Leschziner, Michael A., Series editor, Periaux, Jacques, Series editor, Pirozzoli, Sergio, Series editor, Rizzi, Arthur, Series editor, Roux, Bernard, Series editor, Shokin, Yurii I., Series editor, Nielsen, Jens C.O., editor, Anderson, David, editor, Gautier, Pierre-Etienne, editor, Iida, Masanobu, editor, Nelson, James T., editor, Thompson, David, editor, Tielkes, Thorsten, editor, Towers, David A., editor, and de Vos, Paul, editor
- Published
- 2015
- Full Text
- View/download PDF
10. Idle Mode Detection for Somatosensory-Based Brain-Computer Interface
- Author
-
Shu, Xiaokang, Yao, Lin, Sheng, Xinjun, Zhang, Dingguo, Zhu, Xiangyang, Goebel, Randy, Series editor, Tanaka, Yuzuru, Series editor, Wahlster, Wolfgang, Series editor, Liu, Honghai, editor, Kubota, Naoyuki, editor, Zhu, Xiangyang, editor, Dillmann, Rüdiger, editor, and Zhou, Dalin, editor
- Published
- 2015
- Full Text
- View/download PDF
11. Optimization of Order-Admission Policies
- Author
-
Duan, Qing, Chakrabarty, Krishnendu, Zeng, Jun, Duan, Qing, Chakrabarty, Krishnendu, and Zeng, Jun
- Published
- 2015
- Full Text
- View/download PDF
12. Android Malware Detection Based on Software Complexity Metrics
- Author
-
Protsenko, Mykola, Müller, Tilo, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Kobsa, Alfred, Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Eckert, Claudia, editor, Katsikas, Sokratis K., editor, and Pernul, Günther, editor
- Published
- 2014
- Full Text
- View/download PDF
13. Comparative Analysis of Techniques Oriented on the Recognition of Ligand Binding Area in Proteins
- Author
-
Alejster, Paweł, Banach, Mateusz, Jurkowski, Wiktor, Marchewka, Damian, Roterman-Konieczna, Irena, and Roterman-Konieczna, Irena, editor
- Published
- 2013
- Full Text
- View/download PDF
14. ROC Analysis for Multiple Markers with Tree-Based Classification
- Author
-
Wang, Mei-Cheng, Li, Shanshan, Lee, Mei-Ling Ting, editor, Gail, Mitchell, editor, Pfeiffer, Ruth, editor, Satten, Glen, editor, Cai, Tianxi, editor, and Gandy, Axel, editor
- Published
- 2013
- Full Text
- View/download PDF
15. Formal Framework for Rule Analysis
- Author
-
Fürnkranz, Johannes, Gamberger, Dragan, Lavrač, Nada, Fürnkranz, Johannes, Gamberger, Dragan, and Lavrač, Nada
- Published
- 2012
- Full Text
- View/download PDF
16. Study of Various Neural Networks to Improve the Defuzzification of Fuzzy Clustering Algorithms for ROIs Detection in Lung CTs
- Author
-
Rey, Alberto, Castro, Alfonso, Arcay, Bernardino, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Cabestany, Joan, editor, Rojas, Ignacio, editor, and Joya, Gonzalo, editor
- Published
- 2011
- Full Text
- View/download PDF
17. Can Network Characteristics Detect Spam Effectively in a Stand-Alone Enterprise?
- Author
-
Ouyang, Tu, Ray, Soumya, Rabinovich, Michael, Allman, Mark, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Spring, Neil, editor, and Riley, George F., editor
- Published
- 2011
- Full Text
- View/download PDF
18. Assessing Discriminatory Performance of a Binary Logistic Model: ROC Curves
- Author
-
Kleinbaum, David G., Klein, Mitchel, Kleinbaum, David G., and Klein, Mitchel
- Published
- 2010
- Full Text
- View/download PDF
19. Diagnostic Tests and Diagnostic Accuracy in Surgery
- Author
-
Jones, Catherine M., Darzi, Lord Ara, Athanasiou, Thanos, Athanasiou, Thanos, editor, Debas, Haile, editor, and Darzi, Ara, editor
- Published
- 2010
- Full Text
- View/download PDF
20. Two-way partial AUC and its properties.
- Author
-
Yang, Hanfang, Lu, Kun, Lyu, Xiang, and Hu, Feifang
- Subjects
- *
FALSE positive error , *DATA mining , *ASSOCIATION rule mining , *BREAST cancer , *RECEIVER operating characteristic curves , *ROUTINE diagnostic tests , *NONPARAMETRIC statistics - Abstract
Simultaneous control on true positive rate and false positive rate is of significant importance in the performance evaluation of diagnostic tests. Most of the established literature utilizes partial area under receiver operating characteristic (ROC) curve with restrictions only on false positive rate (FPR), called FPR pAUC, as a performance measure. However, its indirect control on true positive rate (TPR) is conceptually and practically misleading. In this paper, a novel and intuitive performance measure, named as two-way pAUC, is proposed, which directly quantifies partial area under ROC curve with explicit restrictions on both TPR and FPR. To estimate two-way pAUC, we devise a nonparametric estimator. Based on the estimator, a bootstrap-assisted testing method for two-way pAUC comparison is established. Moreover, to evaluate possible covariate effects on two-way pAUC, a regression analysis framework is constructed. Asymptotic normalities of the methods are provided. Advantages of the proposed methods are illustrated by simulation and Wisconsin Breast Cancer Data. We encode the methods as a publicly available R package tpAUC. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
21. Domain Transformation for Uniform Motion Identification in Air Traffic Trajectories
- Author
-
Guerrero, José Luis, García, Jesús, Kacprzyk, J., editor, Corchado, Juan M., editor, Rodríguez, Sara, editor, Llinas, James, editor, and Molina, José M., editor
- Published
- 2009
- Full Text
- View/download PDF
22. Competition and Fraud in Online Advertising Markets
- Author
-
Mungamuru, Bob, Weis, Stephen, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, and Tsudik, Gene, editor
- Published
- 2008
- Full Text
- View/download PDF
23. Combining Classifiers Using Their Receiver Operating Characteristics and Maximum Likelihood Estimation
- Author
-
Haker, Steven, Wells, William M., III, Warfield, Simon K., Talos, Ion-Florin, Bhagwat, Jui G., Goldberg-Zimring, Daniel, Mian, Asim, Ohno-Machado, Lucila, Zou, Kelly H., Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Duncan, James S., editor, and Gerig, Guido, editor
- Published
- 2005
- Full Text
- View/download PDF
24. Improving Pattern Recognition Based Pharmacological Drug Selection Through ROC Analysis
- Author
-
Díaz, W., Castro, María José, Ferri, F. J., Pérez, F., Murcia, M., Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Sanfeliu, Alberto, editor, Martínez Trinidad, José Francisco, editor, and Carrasco Ochoa, Jesús Ariel, editor
- Published
- 2004
- Full Text
- View/download PDF
25. Mining Extremely Skewed Trading Anomalies
- Author
-
Fan, Wei, Yu, Philip S., Wang, Haixun, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Bertino, Elisa, editor, Christodoulakis, Stavros, editor, Plexousakis, Dimitris, editor, Christophides, Vassilis, editor, Koubarakis, Manolis, editor, Böhm, Klemens, editor, and Ferrari, Elena, editor
- Published
- 2004
- Full Text
- View/download PDF
26. Decision Support for Data Mining : An introduction to ROC analysis and its applications
- Author
-
Flach, Peter, Blockeel, Hendrik, Ferri, Cèsar, Hernández-Orallo, José, Struyf, Jan, Mladenić, Dunja, editor, Lavrač, Nada, editor, Bohanec, Marko, editor, and Moyle, Steve, editor
- Published
- 2003
- Full Text
- View/download PDF
27. A Systematic Statistical Analysis of Ion Trap Tandem Mass Spectra in View of Peptide Scoring
- Author
-
Colinge, Jacques, Masselot, Alexandre, Magnin, Jérôme, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Istrail, Sorin, editor, Pevzner, Pavel, editor, Waterman, Michael, editor, Benson, Gary, editor, and Page, Roderic D. M., editor
- Published
- 2003
- Full Text
- View/download PDF
28. Estimating time-dependent ROC curves using data under prevalent sampling.
- Author
-
Li, Shanshan
- Abstract
Prevalent sampling is frequently a convenient and economical sampling technique for the collection of time-to-event data and thus is commonly used in studies of the natural history of a disease. However, it is biased by design because it tends to recruit individuals with longer survival times. This paper considers estimation of time-dependent receiver operating characteristic curves when data are collected under prevalent sampling. To correct the sampling bias, we develop both nonparametric and semiparametric estimators using extended risk sets and the inverse probability weighting techniques. The proposed estimators are consistent and converge to Gaussian processes, while substantial bias may arise if standard estimators for right-censored data are used. To illustrate our method, we analyze data from an ovarian cancer study and estimate receiver operating characteristic curves that assess the accuracy of the composite markers in distinguishing subjects who died within 3-5 years from subjects who remained alive. Copyright © 2016 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
29. Interpreting Clusters via Prototype Optimization
- Author
-
Kseniia Kurishchenko, Emilio Carrizosa, Alfredo Marín, and Dolores Romero Morales
- Subjects
Information Systems and Management ,Biobjective optimization ,Computer science ,Strategy and Management ,Management Science and Operations Research ,Mixed-Integer Programming ,Set (abstract data type) ,Machine Learning ,Simulated data ,Cluster (physics) ,Cluster Analysis ,Prototypes ,Interpretability ,False positive rate ,Integer programming ,Algorithm ,True positive rate - Abstract
In this paper, we tackle the problem of enhancing the interpretability of the results of Cluster Analysis. Our goal is to find an explanation for each cluster, such that clusters are characterized as precisely and distinctively as possible, i.e., the explanation is fulfilled by as many as possible individuals of the corresponding cluster, true positive cases, and by as few as possible individuals in the remaining clusters, false positive cases. We assume that a dissimilarity between the individuals is given, and propose distance-based explanations, namely those defined by individuals that are close to its so-called prototype. To find the set of prototypes, we address the biobjective optimization problem that maximizes the total number of true positive cases across all clusters and minimizes the total number of false positive cases, while controlling the true positive rate as well as the false positive rate in each cluster. We develop two mathematical optimization models, inspired by classic Location Analysis problems, that differ in the way individuals are allocated to prototypes. We illustrate the explanations provided by these models and their accuracy in both real-life data as well as simulated data.
- Published
- 2022
30. Considerations on the region of interest in the ROC space
- Author
-
Luigi Lavazza and Sandro Morasca
- Subjects
Statistics and Probability ,Area under the curve ,ratio of relevant areas ,partial area under the curve ,Epidemiology ,false positive rate ,true positive rate ,discrimination capability ,Health Information Management ,ROC Curve ,Area Under Curve ,Matthews Correlation Coefficient ,ROC (Receiver operating characteristic) curve ,Software - Abstract
Receiver Operating Characteristic curves have been widely used to represent the performance of diagnostic tests. The corresponding area under the curve, widely used to evaluate their performance quantitatively, has been criticized in several respects. Several proposals have been introduced to improve area under the curve by taking into account only specific regions of the Receiver Operating Characteristic space, that is, the plane to which Receiver Operating Characteristic curves belong. For instance, a region of interest can be delimited by setting specific thresholds for the true positive rate or the false positive rate. Different ways of setting the borders of the region of interest may result in completely different, even opposing, evaluations. In this paper, we present a method to define a region of interest in a rigorous and objective way, and compute a partial area under the curve that can be used to evaluate the performance of diagnostic tests. The method was originally conceived in the Software Engineering domain to evaluate the performance of methods that estimate the defectiveness of software modules. We compare this method with previous proposals. Our method allows the definition of regions of interest by setting acceptability thresholds on any kind of performance metric, and not just false positive rate and true positive rate: for instance, the region of interest can be determined by imposing that [Formula: see text] (also known as the Matthews Correlation Coefficient) is above a given threshold. We also show how to delimit the region of interest corresponding to acceptable costs, whenever the individual cost of false positives and false negatives is known. Finally, we demonstrate the effectiveness of the method by applying it to the Wisconsin Breast Cancer Data. We provide Python and R packages supporting the presented method.
- Published
- 2021
31. Performance evaluation of various classifiers for color prediction of rice paddy plant leaf.
- Author
-
Singh, Amandeep and Singh, Maninder Lal
- Subjects
- *
FOOD quality , *FOOD industry , *NONDESTRUCTIVE testing , *INFRARED testing , *MACHINE learning - Abstract
The food industry is one of the industries that uses machine vision for a nondestructive quality evaluation of the produce. These quality measuring systems and softwares are precalculated on the basis of various image-processing algorithms which generally use a particular type of classifier. These classifiers play a vital role in making the algorithms so intelligent that it can contribute its best while performing the said quality evaluations by translating the human perception into machine vision and hence machine learning. The crop of interest is rice, and the color of this crop indicates the health status of the plant. An enormous number of classifiers are available to solve the purpose of color prediction, but choosing the best among them is the focus of this paper. Performance of a total of 60 classifiers has been analyzed from the application point of view, and the results have been discussed. The motivation comes from the idea of providing a set of classifiers with excellent performance and implementing them on a single algorithm for the improvement of machine vision learning and, hence, associated applications. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
32. Physical Tampering Detection Using Single COTS Wi-Fi Endpoint
- Author
-
Alexander I-Chi Lai, Ruey-Beei Wu, Poh Yuen Chan, and Pei-Yuan Wu
- Subjects
COTS Wi-Fi mobile device ,Artificial neural network ,Orientation (computer vision) ,Computer science ,Chemical technology ,Real-time computing ,Detector ,Data_CODINGANDINFORMATIONTHEORY ,TP1-1185 ,channel state information (CSI) ,Biochemistry ,Article ,Atomic and Molecular Physics, and Optics ,single embedded antenna ,Analytical Chemistry ,deep neural network (DNN) ,Channel state information ,physical tampering detection ,Neural Networks, Computer ,False positive rate ,Electrical and Electronic Engineering ,Antenna (radio) ,Instrumentation ,True positive rate - Abstract
This paper proposes a practical physical tampering detection mechanism using inexpensive commercial off-the-shelf (COTS) Wi-Fi endpoint devices with a deep neural network (DNN) on channel state information (CSI) in the Wi-Fi signals. Attributed to the DNN that identifies physical tampering events due to the multi-subcarrier characteristics in CSI, our methodology takes effect using only one COTS Wi-Fi endpoint with a single embedded antenna to detect changes in the relative orientation between the Wi-Fi infrastructure and the endpoint, in contrast to previous sophisticated, proprietary approaches. Preliminary results show that our detectors manage to achieve a 95.89% true positive rate (TPR) with no worse than a 4.12% false positive rate (FPR) in detecting physical tampering events.
- Published
- 2021
33. Lameness detection of dairy cows based on the YOLOv3 deep learning algorithm and a relative step size characteristic vector
- Author
-
Xuqiang Yin, Han Wang, Dongjian He, Dihua Wu, Bo Jiang, Qian Wu, and Huaibo Song
- Subjects
business.industry ,Decision tree learning ,Deep learning ,010401 analytical chemistry ,Soil Science ,04 agricultural and veterinary sciences ,01 natural sciences ,0104 chemical sciences ,Support vector machine ,Control and Systems Engineering ,Lameness ,040103 agronomy & agriculture ,0401 agriculture, forestry, and fisheries ,False positive rate ,Artificial intelligence ,business ,Agronomy and Crop Science ,Algorithm ,True positive rate ,Eigenvalues and eigenvectors ,Food Science ,Mathematics - Abstract
Intelligent lameness detection is important for improving cow welfare. A method based on YOLOv3 deep learning algorithm and relative step size characteristic vector is proposed to classify lame and non-lame cows. Videos were decomposed into sequence frames, and leg targets of cows in each frame were detected by YOLOv3 algorithm. Relative step sizes of cow's front and rear legs were calculated based on leg coordinates, and the relative step size characteristic vector was constructed. Finally, a trained Long Short-Term Memory (LSTM) classification model was used to classify lame and non-lame cows based on the characteristic vector. A total of 210 videos were selected for verification using LSTM, support vector machine (SVM), K-Nearest Neighbour (KNN) and decision tree classifier (DTC) algorithms. Results showed that accuracy of lameness detection based on LSTM was 98.57%, which was 2.93%, 3.88%, and 9.25% higher than SVM, KNN, and DTC, respectively. True positive rate of the LSTM was 0.97, which was 0.03, 0.04 and 0.06 higher than SVM, KNN and DTC, respectively. False positive rate of LSTM was 0.03, which was 0.03, 0.06 and 0.11 lower than SVM, KNN and DTC, respectively. A bidirectional LSTM performed slightly better than LSTM but would be more demanding on hardware. Comparison of LSTM with a purely deep learning method showed the latter performed slightly better, but was less conducive to interpretation and diagnosis of lameness. The relative step size characteristic vector proposed was effective for classification of lame and non-lame cows, and could lead to intelligent detection of lameness.
- Published
- 2020
- Full Text
- View/download PDF
34. KS(conf): A Light-Weight Test if a Multiclass Classifier Operates Outside of Its Specifications
- Author
-
Christoph H. Lampert and Rémy Sun
- Subjects
Network architecture ,Deep convolutional networks ,Computer science ,Distribution shift ,Single sample ,02 engineering and technology ,computer.software_genre ,Article ,Specifications ,Multiclass classification ,Artificial Intelligence ,020204 information systems ,Multi-class classification ,0202 electrical engineering, electronic engineering, information engineering ,Statistical reasoning ,A priori and a posteriori ,020201 artificial intelligence & image processing ,Computer Vision and Pattern Recognition ,False positive rate ,Data mining ,Classifier (UML) ,True positive rate ,computer ,Software - Abstract
We study the problem of automatically detecting if a given multi-class classifier operates outside of its specifications (out-of-specs), i.e. on input data from a different distribution than what it was trained for. This is an important problem to solve on the road towards creating reliable computer vision systems for real-world applications, because the quality of a classifier’s predictions cannot be guaranteed if it operates out-of-specs. Previously proposed methods for out-of-specs detection make decisions on the level of single inputs. This, however, is insufficient to achieve low false positive rate and high false negative rates at the same time. In this work, we describe a new procedure named KS(conf), based on statistical reasoning. Its main component is a classical Kolmogorov–Smirnov test that is applied to the set of predicted confidence values for batches of samples. Working with batches instead of single samples allows increasing the true positive rate without negatively affecting the false positive rate, thereby overcoming a crucial limitation of single sample tests. We show by extensive experiments using a variety of convolutional network architectures and datasets that KS(conf) reliably detects out-of-specs situations even under conditions where other tests fail. It furthermore has a number of properties that make it an excellent candidate for practical deployment: it is easy to implement, adds almost no overhead to the system, works with any classifier that outputs confidence scores, and requires no a priori knowledge about how the data distribution could change.
- Published
- 2019
35. Time-Efficient Adaptive Measurement of Change
- Author
-
Matthew Finkelman and Chun Wang
- Subjects
symbols.namesake ,Computer science ,Unit of time ,Respondent ,Statistics ,Item selection ,symbols ,Computerized adaptive testing ,False positive rate ,Fisher information ,True positive rate ,Time efficient - Abstract
The adaptive measurement of change (AMC) refers to the use of computerized adaptive testing (CAT) at multiple occasions to efficiently assess a respondent’s improvement, decline, or sameness from occasion to occasion. Whereas previous AMC research focused on administering the most informative item to a respondent at each stage of testing, the current research proposes the use of Fisher information per time unit as an item selection procedure for AMC. The latter procedure incorporates not only the amount of information provided by a given item but also the expected amount of time required to complete it. In a simulation study, the use of Fisher information per time unit item selection resulted in a lower false positive rate in the majority of conditions studied, and a higher true positive rate in all conditions studied, compared to item selection via Fisher information without accounting for the expected time taken. Future directions of research are suggested.
- Published
- 2019
- Full Text
- View/download PDF
36. Autoscaling Bloom filter: controlling trade-off between true and false positives
- Author
-
Ross W. Gayler, Denis Kleyko, Abbas Rahimi, and Evgeny Osipov
- Subjects
FOS: Computer and information sciences ,0209 industrial biotechnology ,Computer science ,True positive rate ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Counting Bloom filter ,Set (abstract data type) ,Bloom filter ,020901 industrial engineering & automation ,Artificial Intelligence ,Computer Science - Data Structures and Algorithms ,0202 electrical engineering, electronic engineering, information engineering ,False positive paradox ,Data Structures and Algorithms (cs.DS) ,Autoscaling Bloom filter ,False positive rate ,Computer Sciences ,business.industry ,Probabilistic logic ,Pattern recognition ,Autoscaling ,Datavetenskap (datalogi) ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,Software - Abstract
A Bloom filter is a special case of an artificial neural network with two layers. Traditionally, it is seen as a simple data structure supporting membership queries on a set. The standard Bloom filter does not support the delete operation, and therefore, many applications use a counting Bloom filter to enable deletion. This paper proposes a generalization of the counting Bloom filter approach, called “autoscaling Bloom filters”, which allows adjustment of its capacity with probabilistic bounds on false positives and true positives. Thus, by relaxing the requirement on perfect true positive rate, the proposed autoscaling Bloom filter addresses the major difficulty of Bloom filters with respect to their scalability. In essence, the autoscaling Bloom filter is a binarized counting Bloom filter with an adjustable binarization threshold. We present the mathematical analysis of its performance and provide a procedure for minimizing its false positive rate., Neural Computing and Applications, 32 (8), ISSN:1433-3058, ISSN:0941-0643
- Published
- 2019
- Full Text
- View/download PDF
37. Crowdsourcing for click fraud detection
- Author
-
Ayman Kayssi, Imad H. Elhajj, Riwa Mouawi, and Ali Chehab
- Subjects
lcsh:Computer engineering. Computer hardware ,Computer science ,Internet privacy ,0211 other engineering and technologies ,lcsh:TK7885-7895 ,02 engineering and technology ,Crowdsourcing ,In-app ads ,lcsh:QA75.5-76.95 ,Mobile charging model ,Android ,0202 electrical engineering, electronic engineering, information engineering ,Click fraud ,021110 strategic, defence & security studies ,Crowdsource ,business.industry ,020206 networking & telecommunications ,Computer Science Applications ,CPA ,Order (business) ,Signal Processing ,Collusion ,False positive rate ,lcsh:Electronic computers. Computer science ,business ,True positive rate - Abstract
Mobile ads are plagued with fraudulent clicks which is a major challenge for the advertising community. Although popular ad networks use many techniques to detect click fraud, they do not protect the client from possible collusion between publishers and ad networks. In addition, ad networks are not able to monitor the user’s activity for click fraud detection once they are redirected to the advertising site after clicking the ad. We propose a new crowdsource-based system called Click Fraud Crowdsourcing (CFC) that collaborates with both advertisers and ad networks in order to protect both parties from any possible click fraudulent acts. The system benefits from both a global view, where it gathers multiple ad requests corresponding to different ad network-publisher-advertiser combinations, and a local view, where it is able to track the users’ engagement in each advertising website. The results demonstrated that our approach offers a lower false positive rate (0.1) when detecting click fraud as opposed to proposed solutions in the literature, while maintaining a high true positive rate (0.9). Furthermore, we propose a new mobile ad charging model that benefits from our system to charge advertisers based on the duration spent in the advertiser’s website.
- Published
- 2019
- Full Text
- View/download PDF
38. Relative discrimination criterion – A novel feature ranking method for text data.
- Author
-
Rehman, Abdur, Javed, Kashif, Babri, Haroon A., and Saeed, Mehreen
- Subjects
- *
DATA analysis , *RANKING (Statistics) , *TEXT mining , *FEATURE selection , *SUPPORT vector machines - Abstract
High dimensionality of text data hinders the performance of classifiers making it necessary to apply feature selection for dimensionality reduction. Most of the feature ranking metrics for text classification are based on document frequencies ( df ) of a term in positive and negative classes. Considering only document frequencies to rank features favors terms frequently occurring in larger classes in unbalanced datasets. In this paper we introduce a new feature ranking metric termed as relative discrimination criterion (RDC), which takes document frequencies for each term count of a term into account while estimating the usefulness of a term. The performance of RDC is compared with four well known feature ranking metrics, information gain (IG), CHI squared (CHI), odds ratio (OR) and distinguishing feature selector (DFS) using support vector machines (SVM) and multinomial naive Bayes (MNB) classifiers on four benchmark datasets, namely Reuters, 20 Newsgroups and two subsets of Ohsumed dataset. Our results based on macro and micro F1 measures show that the performance of RDC is superior than the other four metrics in 65% of our experimental trials. Also, RDC attains highest macro and micro F1 values in 69% of the cases. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
39. Combining biomarkers by maximizing the true positive rate for a fixed false positive rate
- Author
-
Kathleen F. Kerr, Margaret S. Pepe, Marco Carone, and Allison Meisner
- Subjects
FOS: Computer and information sciences ,Statistics and Probability ,Computer science ,Machine learning ,computer.software_genre ,01 natural sciences ,Article ,Methodology (stat.ME) ,010104 statistics & probability ,03 medical and health sciences ,0302 clinical medicine ,Mass Screening ,False Positive Reactions ,030212 general & internal medicine ,0101 mathematics ,Statistics - Methodology ,Probability ,Alternative methods ,business.industry ,General Medicine ,Prognosis ,3. Good health ,Biomarker (medicine) ,Artificial intelligence ,False positive rate ,Statistics, Probability and Uncertainty ,business ,True positive rate ,computer ,Biomarkers - Abstract
Biomarkers abound in many areas of clinical research, and often investigators are interested in combining them for diagnosis, prognosis, or screening. In many applications, the true positive rate for a biomarker combination at a prespecified, clinically acceptable false positive rate is the most relevant measure of predictive capacity. We propose a distribution-free method for constructing biomarker combinations by maximizing the true positive rate while constraining the false positive rate. Theoretical results demonstrate desirable properties of biomarker combinations produced by the new method. In simulations, the biomarker combination provided by our method demonstrated improved operating characteristics in a variety of scenarios when compared with alternative methods for constructing biomarker combinations., 37 pages (including appendices)
- Published
- 2021
40. Using IRP for Malware Detection
- Author
-
Zhang, FuYong, Qi, DeYu, Hu, JingLin, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Jha, Somesh, editor, Sommer, Robin, editor, and Kreibich, Christian, editor
- Published
- 2010
- Full Text
- View/download PDF
41. Experimental Comparison of ML/DL Approaches for Cyberattacks Diagnostics
- Author
-
Aleksandr Krivchenkov, Boriss Misnevs, and Alexander Grakovski
- Subjects
Artificial neural network ,Network security ,business.industry ,Computer science ,Deep learning ,Intrusion detection system ,Machine learning ,computer.software_genre ,Experimental research ,Reduction (complexity) ,False positive rate ,Artificial intelligence ,business ,True positive rate ,computer - Abstract
The main goal of this article is experimental research on machine learning methodology for cyberattacks diagnosing. This study based on two publicly available datasets UNSW-NB15 and NSL-KDD. Its scope included the features reduction problem and calculations of the classification efficiency. We applied Machine Learning (ML) and Deep Learning (DL) methods to classify traffic. The methods of supervised k-nearest neighbours (k-NN) and artificial neural networks (ANN) were used. Accuracy, Precision, True Positive Rate (TPR), False Positive Rate (FPR) were calculated based on a series of numerical experiments for all types of attacks and for DoS (Deny of Service) attacks only. The features number reduction for observation is achieved, and the effect of this reduction on classification accuracy was investigated. We made some conclusions about the possibility of implementing ML/DL methods in intrusion detection systems (IDS).
- Published
- 2021
- Full Text
- View/download PDF
42. Classification of Functional Metagenomes Recovered from Different Environmental Samples
- Author
-
Md. Nurul Haque Mollah, Md. Jahangir Alam, Zobaer Akond, Mohammad Nazmol Hasan, and Munirul Alam
- Subjects
beta-t random forest ,False discovery rate ,false positive rate ,General Medicine ,true positive rate ,metagenomes ,Random forest ,Support vector machine ,Bayes' theorem ,classification ,Metagenomics ,Statistics ,misclassification error ,False positive rate ,AdaBoost ,LogitBoost ,Research Article ,Mathematics - Abstract
Classification of functional metagenomes from the microbial community plays the vital role in the metagenomics research. In this paper, an investigation was made to study the performance of beta-t random forest classifier for classification of metagenomics data. Nine key functional meta-genomic variables were selected using the beta-t test statistic from the 10 different microbial community using p-value at 5% level of significance. Then beta-t random forest classifier showed the higher accuracy (96%), true positive rate (96%) and lower false positive rate (5%), false discovery rate (5%) and misclassification error rate (5%) for classification of metagenomes. This method showed the better performance compare to Bayes, SVM, KNN, AdaBoost and LogitBoost).
- Published
- 2019
- Full Text
- View/download PDF
43. ROC Solid: Receiver Operator Characteristic (ROC) Curves as a Foundation for Better Diagnostic Tests
- Author
-
Joseph R. Dettori and Mark Junge
- Subjects
0301 basic medicine ,EBSJ Special Section: Science-in-Spine ,Receiver operating characteristic ,business.industry ,030106 microbiology ,Diagnostic test ,specificity ,Pattern recognition ,sensitivity ,Test (assessment) ,03 medical and health sciences ,Area Under the Curve ,Diagnostic analysis ,Receiver Operator Curves ,Medicine ,Orthopedics and Sports Medicine ,Surgery ,ROC ,Neurology (clinical) ,Sensitivity (control systems) ,False positive rate ,Artificial intelligence ,business ,True positive rate - Abstract
An ROC curve describes the relationship between the sensitivity and specificity of a test by plotting the two against one another while varying the CV. It is helpful when the outcome of a diagnostic test is continuous or ordinal. The key to an effective diagnostic test is to accurately classify 2 distinct populations into their respective groups of diseased versus nondiseased. Choosing the optimum CV is a tradeoff between the sensitivity (true positive rate) and the false positive rate. ROC curves are an important tool in evaluating the shape of uncertainty and are a valuable method in characterizing the strengths and weaknesses of diagnostic tests. The AUC provides a single quantitative, index measure for assessing the performance of a diagnostic test. They also provide an intuitive, qualitative assessment of the interrelated dynamics influencing decisions behind diagnostic tests. Their effectiveness spans multiple fields of study and their presence in modern diagnostic analysis is likely only to grow.
- Published
- 2018
44. Comparisons of power of statistical methods for gene-environment interaction analyses.
- Author
-
Ege, Markus and Strachan, David
- Subjects
STATISTICAL power analysis ,GENOMICS ,GENOTYPE-environment interaction ,LOCUS (Genetics) ,HEALTH outcome assessment ,DISEASE prevalence ,UNBIASED estimation (Statistics) - Abstract
Any genome-wide analysis is hampered by reduced statistical power due to multiple comparisons. This is particularly true for interaction analyses, which have lower statistical power than analyses of associations. To assess gene-environment interactions in population settings we have recently proposed a statistical method based on a modified two-step approach, where first genetic loci are selected by their associations with disease and environment, respectively, and subsequently tested for interactions. We have simulated various data sets resembling real world scenarios and compared single-step and two-step approaches with respect to true positive rate (TPR) in 486 scenarios and (study-wide) false positive rate (FPR) in 252 scenarios. Our simulations confirmed that in all two-step methods the two steps are not correlated. In terms of TPR, two-step approaches combining information on gene-disease association and gene-environment association in the first step were superior to all other methods, while preserving a low FPR in over 250 million simulations under the null hypothesis. Our weighted modification yielded the highest power across various degrees of gene-environment association in the controls. An optimal threshold for step 1 depended on the interacting allele frequency and the disease prevalence. In all scenarios, the least powerful method was to proceed directly to an unbiased full interaction model, applying conventional genome-wide significance thresholds. This simulation study confirms the practical advantage of two-step approaches to interaction testing over more conventional one-step designs, at least in the context of dichotomous disease outcomes and other parameters that might apply in real-world settings. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
45. Meta-analyses of diagnostic studies.
- Author
-
Cleophas, Ton J. and Zwinderman, Aeilko H.
- Subjects
- *
META-analysis , *DIAGNOSIS , *SENSITIVITY & specificity (Statistics) , *STATISTICAL correlation , *REGRESSION analysis - Abstract
Background: Diagnostic reviews often include the sensitivity/specificity results of individual studies. A problem occurs when these data are pooled because the correlation between sensitivity and specificity is generally strongly negative, causing overestimation of the pooled results. The diagnostic odds ratio (DOR), defined as the odds of true positives vs. that of false positives, may avoid this problem. The aim of the study was to review the advantages and limitations of the DORs. Methods: A systematic review of 44 previously published diagnostic studies was used as an example. Results: DORs can be readily implemented in diagnostic research. Advantages include: (1) they adjust for the negative and curvilinear correlations between sensitivities and specificities, (2) they take account of the heterogeneity between studies with respect to the different thresholds chosen by the investigators in the original studies, and (3) it is easy to extend the model with covariates representing between-study differences in design. Limitations include: 1) the outcome parameter is a summary estimate of both sensitivity and specificity, and 2) the magnitude of the studies included is not taken into account. Conclusions: Reported sensitivities and specificities of different studies assessing similar diagnostic tests are not only negatively correlated, but also negatively correlated in a curvilinear manner. It is appropriate to take this negative curvilinear correlation into account in the data pooling of such meta-analyses. The DORs can be applied for that purpose. Clin Chem Lab Med 2009;47:1351–4. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
46. New criteria for selecting differentially expressed genes.
- Author
-
Lit-Hsin Loo, Roberts, S., Hrebien, L., and Kam, M.
- Abstract
Two new criteria for identifying differentially expressed genes, the average difference score (ADS) and the mean difference score (MDS), are formulated. The performance of ADS and MDS were compared to that of several commonly used criteria, including Welch t-statistic (WTS), Fisher correlation score (FCS), Wilcoxon rank sum (WRS) and independently consistent expression (ICE) on simulated and real biological datasets. We find that ADS and MDS outperform these existing criteria. When high-sensitivity screening is required, ADS appears to be preferable to WTS. When a false positive rate (FPR) similar to WTS is desired, MDS should be used. The popular Wilcoxon rank sum is a more conservative approach that should be employed when the lowest FPR is desired, even at the expense of lower true positive rate (TPR). ICE is a less desirable criterion because it does not perform well for data generated by the normal model. FCS gave results similar to those of WTS. Evaluation of these algorithms using real biological datasets showed that ADS and MDS flagged several biologically significant genes that were missed by WTS, besides selecting most of the genes that are also selected by WTS [ABSTRACT FROM PUBLISHER]
- Published
- 2007
- Full Text
- View/download PDF
47. Towards detection of phishing websites on client-side using machine learning based approach
- Author
-
Ankit Kumar Jain and Brij B. Gupta
- Subjects
Source code ,Computer science ,business.industry ,Social engineering (security) ,media_common.quotation_subject ,020206 networking & telecommunications ,02 engineering and technology ,Hyperlink ,Client-side ,Machine learning ,computer.software_genre ,Phishing ,Blacklist ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,False positive rate ,Electrical and Electronic Engineering ,business ,True positive rate ,computer ,media_common - Abstract
The existing anti-phishing approaches use the blacklist methods or features based machine learning techniques. Blacklist methods fail to detect new phishing attacks and produce high false positive rate. Moreover, existing machine learning based methods extract features from the third party, search engine, etc. Therefore, they are complicated, slow in nature, and not fit for the real-time environment. To solve this problem, this paper presents a machine learning based novel anti-phishing approach that extracts the features from client side only. We have examined the various attributes of the phishing and legitimate websites in depth and identified nineteen outstanding features to distinguish phishing websites from legitimate ones. These nineteen features are extracted from the URL and source code of the website and do not depend on any third party, which makes the proposed approach fast, reliable, and intelligent. Compared to other methods, the proposed approach has relatively high accuracy in detection of phishing websites as it achieved 99.39% true positive rate and 99.09% of overall detection accuracy.
- Published
- 2017
- Full Text
- View/download PDF
48. Classification of Malicious Webpages in Mobile Environment
- Author
-
Mallu Suman and Sagam Sravanth Kumar
- Subjects
Multidisciplinary ,Computer science ,Static analysis ,JavaScript ,computer.software_genre ,Web page ,Statistical analysis ,False positive rate ,Data mining ,Feature set ,computer ,True positive rate ,Mobile device ,computer.programming_language - Abstract
Objective: To study the detection of malicious web page in mobile environment by lowering the false positive rate (FPR) and False Negative Rate (FNR) in real time and also how this CMW blocks the access of malicious webpages to the user are to be studied. Methods/Statistical Analysis: Now a days, Mobile devices are progressively being used to access the webpages. Content, Layout size, Functionaity have commonly been used to perform the static analysis to check the maliciousness in desktop space. In this paper we have presented a methodology named as CMW (Classification of malicious webpages) which detects the malicious mobile webpages in mobile environment. Here we used static features of mobile webpages derived from the HTML and Javascript content, URL and leading mobile specific capabilities. We then collected over 3500 mobile benign and malicious webpages. Findings: We have extracted a feature set consists of 44 features. 11 of which are not previously identified nor used. we then used a binomial classification technique to build a model for CMW to provide 90% accuracy and 89% true positive rate. It also detects a number of malicious webpages which are not accurately detected by existing techniques such as VirusTotal and Google Safe Browsing. Application/Improvements: We have used 11 new features in our feature set. Due to these new features, the detection of malicious webpages rate will be increased and false positive and false negative rates are reduced. Keywords: Classification, Features, Machine Learning, Malicious Web Pages, Static Detection
- Published
- 2017
- Full Text
- View/download PDF
49. An artificial immunity approach to malware detection in a mobile platform
- Author
-
Gerry Dozier, Mohd Anwar, and James Brown
- Subjects
lcsh:Computer engineering. Computer hardware ,Computer science ,Feature selection ,lcsh:TK7885-7895 ,02 engineering and technology ,Machine learning ,computer.software_genre ,Negative selection ,Mobile malware ,lcsh:QA75.5-76.95 ,0202 electrical engineering, electronic engineering, information engineering ,Android (operating system) ,Artificial immunity ,Artificial immune system ,business.industry ,Static flow analysis ,Detector ,020207 software engineering ,Computer Science Applications ,Signal Processing ,Malware ,020201 artificial intelligence & image processing ,Artificial intelligence ,False positive rate ,Data mining ,lcsh:Electronic computers. Computer science ,business ,computer ,True positive rate - Abstract
Inspired by the human immune system, we explore the development of a new Multiple-Detector Set Artificial Immune System (mAIS) for the detection of mobile malware based on the information flows in Android apps. mAISs differ from conventional AISs in that multiple-detector sets are evolved concurrently via negative selection. Typically, the first detector set is composed of detectors that match information flows associated with malicious apps while the second detector set is composed of detectors that match the information flows associated with benign apps. The mAIS presented in this paper incorporates feature selection along with a negative selection technique known as the split detector method (SDM). This new mAIS has been compared with a variety of conventional AISs and mAISs using a dataset of information flows captured from malicious and benign Android applications. This approach achieved a 93.33% accuracy with a true positive rate of 86.67% and a false positive rate of 0.00%.
- Published
- 2017
- Full Text
- View/download PDF
50. Novel Probabilistic Clustering with Adaptive Actor Critic Neural Network (AACN) for Intrusion Detection Techniques
- Author
-
P. V. Venkateswara Rao, N. Mohan Krishna Varma, and R. Sudhakar
- Subjects
Artificial neural network ,Computer science ,business.industry ,Path (graph theory) ,Artificial intelligence ,Intrusion detection system ,Probabilistic clustering ,False positive rate ,Dimension (data warehouse) ,business ,Cluster analysis ,True positive rate - Abstract
Interruption detection is the procedure of assault distinguishing proof in the PC frameworks and it clears path for the recognizable proof of entrances, breakings, and other PC-related maltreatment. However, the development of the web-based gadgets makes the discovery procedure a confused strategy, representing the requirement for the robotized framework to recognize the assaults. In view of this, the paper proposes method of intrusion detection using the Novel Brainstorm-Crow Search-based Adaptive Actor Critic Neural Network. Clustering is the way toward making a gathering of conceptual objects into classes of comparative items. The clusters are subjected to the different-advance arrangement that is advanced utilizing the proposed enhancement calculation, and in the second dimension of characterization, the interruption in the information is distinguished. The experimentation of the proposed strategy utilizing the KDD cup dataset yields a precision of 0.69, True Positive Rate of 0.68, and False Positive Rate of 0.55.
- Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.