Browse > Article
http://dx.doi.org/10.5370/JEET.2016.11.5.1383

A Granular Classifier By Means of Context-based Similarity Clustering  

Huang, Wei (School of Computer and Communication Engineering, Tianjin University of Technology, China.)
Wang, Jinsong (Corresponding Author: School of Computer and Communication Engineering, Tianjin University of Technology, China.)
Liao, Jiping (Tianjin Key Laboratory of Intelligent and Novel Software Technology, Tianjin University of Technology, China.)
Publication Information
Journal of Electrical Engineering and Technology / v.11, no.5, 2016 , pp. 1383-1394 More about this Journal
Keywords
Network intrusion detection; Context-based similarity clustering (CSC); Granular classifier;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Parikh and T. Chen, “Data fusion and cost minimization for intrusion detection,” IEEE Transacions on Information Forensics and Security, Vol. 3, No. 3, pp. 381-389, 2008.   DOI
2 V. A. Sotiris, P.W. Tse and M.G. Pecht, “Anomaly detection through a Bayesian support vector machine,” IEEE Transactions on Reliability, Vol. 59, No. 2, pp. 277-286, 2010.   DOI
3 X. Xu, “Adaptive intrusion detection based on machine learning: Feature extraction, classifier construction and sequential pattern prediction,” International Journal of Web Services Practices, Vol. 2, No.1, pp. 49-58, 2006.
4 H. A. Nguyen, and D. Choi, Application of data mining to network intrusion detection: Classifier selection model. Berlin Heidelberg: Springer. 2014.
5 M. A. M. Hasan, M. Nasser, B. Pal, and S. Ahmad, “Support vector machine and random forest modeling for intrusion detection system (IDS),” Journal of Intelligent Learning Systems and Applications, Vol. 6, pp. 45-52, 2014.
6 L. Lu, L. Di and Y. Ye, “A decision-tree classifier for extracting transparent plastic-mulched land cover from landsat-5 TM images,” IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, Vol. 7, No. 11, pp. 1314-1330, 2014.   DOI
7 C. Thomas and N. Balakrishnan, “Improvement in intrusion detection with advances in sensor fusion,” IEEE Transacions on Information Forensics and Security, Vol. 4, No. 3, pp. 542-551, 2009.   DOI
8 N. Li, W. L. Tsang and Z.H. Zhou, “Efficient optimization of performance measures by classifier adaption,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 13, No. 5, pp. 2683-2695, 2014.
9 A.J. Ma, P.C. Yuen and J.H. Lai, “Linear dependency modeling for classifier fusion and feature combination,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 35, No. 5, pp. 1135-1148, 2013.   DOI
10 B. Verma and A. Rahman, “Cluster-Oriented ensemble classifier: impact of multi-cluster characterization on ensemble classifier learning,” IEEE Transactions on Knowledge and Data Engineering, Vol. 24, No. 4, pp. 605-618, 2012.   DOI
11 S.W. Thomas, M. Nagappan, D. Blostein and A.E. Hassan, “The impact of classifier configuration and classifier combination on bug localization,” IEEE Transactions on Software Engineering, Vol. 7, No. 11, pp. 1314-1330, 2014.
12 C. Gao, Q. Ge and L. Jian, “Rule extraction from fuzzy-based blast furnace SVM multiclassifier for decision-making,” IEEE Transactions on Fuzzy Systems, Vol. 22, No. 3, pp. 586-596, 2014.   DOI
13 D. Fisch, E. Kalkowski and B. Sick, “Knowledge fusion for probabilistic generative classifiers with data mining applications,” IEEE Transactions on Knowledge and Data Engineering, Vol. 26, No. 3, pp. 652-666, 2014.   DOI
14 D. J. Sebald and J.A. Bucklew, “Support vector machine techniques for nonlinear equalization,” IEEE Transactions on Signal Processing, Vol. 48, No. 11, pp. 3217-3226, 2000.   DOI
15 Z. Ma, Y. Yang, N. Sebe, K. zheng and A.G. Hauptmann, “Multimedia event detection using a classifier-specific intermediate representation,” IEEE Transactions on Multimedia, Vol. 15, No. 7, pp. 1628-1637, 2013.   DOI
16 X. Zhai, K. Appiah, S. Ehsan, G. Howells, H. Hu, D. Gu, and K.D. McDonald-Maier, “A method for detecting abnormal program behavior on embedded devices,” IEEE Transacions on Information Forensics and Security, Vol. 10, No. 8, pp. 1692-1704, 2015.   DOI
17 H. Xue, S. Chen and Q. Yang, “Structural regularized support vector machine: A framework for structural large margin classifier,” IEEE Transactions on Neural Networks, Vol. 22, No. 4, pp. 573-587, 2011.   DOI
18 M.R. Alam and K.M. Muttaqi, A. Bouzerdoum, “An approach for assessing the effectiveness of multiple-feature-based SVM method for islanding detection of distributed generation,” IEEE Transactions on Industry Applications, Vol. 50, No. 4, pp. 2844-2852, 2014.   DOI
19 F.D. Morsier, D. Tuia, M. Borgeaud, V. Gass and J.P. Thiran, “Semi-Supervised novelty detection using SVM entire solution path,” IEEE Transactions on Geoscience and Remote Sensing, Vol. 51, No. 4, pp. 1939-1950, 2013.   DOI
20 C. Cortes and V. vapnik, “Support-vector networks,” Machine Learning, Vol. 20, No. 3, pp.273-297, 1995.   DOI
21 M.S. Yang and K.L. Wu, “A similarity-based robust clustering method,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 26, No. 4, pp. 434-448, 2004.   DOI
22 B. Minaei-Bidgoli, H. Parvin, H. Alinejad-Rokny, H. Alizadeh and W.E. Punch, “Effects of resampling method and adaptation on clustering ensemble efficacy,” Artif. Intell. Rev., Vol. 41, No. 1, pp. 27-48, 2014.   DOI
23 T. Xiong and V. Cherkassy, “A combined SVM and LDA approach for classification,” Proceedings of the International Joint Conference on Neural Networks, pp. 1455-1459, 2005.
24 S. Mika et al, “Fisher discriminant analysis with kernels,” Proceedings of IEEE Neural Networks for Signal Processing Workshop, pp. 41-48, 1999.
25 R. Ksantini and B. Boufama, “Combining partially global and local characteristics for improved classification,” International Journal of Machine Learning, Vol. 3, pp. 119-131, 2012.
26 H. Parvin, M. Mirnabibaboli and H. Alinejad-Rokny, “Proposing a classifier ensemble framework based on classifier selection and decision tree,” Engineering Applications of Artificial Intelligence, Vol. 37, pp. 34-42, 2015.   DOI
27 V. Jaiganesh, S. Mangayarkarasi, and P. Sumathi, “An efficient algorithm for network intrusion detection system,” International Journal of Computer Applications, Vol. 90, No. 12, pp. 12-16, 2014.   DOI
28 D. M. Farid, N. Harbi, and M.Z. Rahman, “Combining Naïve Bayes and decision tree for adaptive intrusion detection,” International Journal of Network Security and Its Applications, Vol. 2, No. 2, pp. 12-25, 2010.   DOI
29 V. Vapnik, “The Nature of Statistical Learning Theory,” Spring-Verlag, 1995.