Online nonlinear modeling for big data applications
暂无分享,去创建一个
[1] Vladimir Vovk,et al. Aggregating strategies , 1990, COLT '90.
[2] Efstathios Stamatatos,et al. Syntactic N-grams as machine learning features for natural language processing , 2014, Expert Syst. Appl..
[3] Wojciech Zaremba,et al. An Empirical Exploration of Recurrent Network Architectures , 2015, ICML.
[4] Richard Bellman,et al. Adaptive Control Processes: A Guided Tour , 1961, The Mathematical Gazette.
[5] Phil Blunsom,et al. A Convolutional Neural Network for Modelling Sentences , 2014, ACL.
[6] Lars Schmidt-Thieme,et al. Ensembles of relational classifiers , 2008, Knowledge and Information Systems.
[7] Salvatore J. Stolfo,et al. Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[8] Jesús Alcalá-Fdez,et al. KEEL Data-Mining Software Tool: Data Set Repository, Integration of Algorithms and Experimental Analysis Framework , 2011, J. Multiple Valued Log. Soft Comput..
[9] F. F. Reichheld,et al. Zero defections: quality comes to services. , 1990, Harvard business review.
[10] Nathalie Japkowicz,et al. Boosting support vector machines for imbalanced data sets , 2008, Knowledge and Information Systems.
[11] Jugal K. Kalita,et al. Network attacks: Taxonomy, tools and systems , 2014, J. Netw. Comput. Appl..
[12] Paul C. Etter,et al. Underwater Acoustic Modeling and Simulation , 2018 .
[13] Andrew McCallum,et al. Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data , 2001, ICML.
[14] Frans M. J. Willems,et al. The Context-Tree Weighting Method : Extensions , 1998, IEEE Trans. Inf. Theory.
[15] Farhan Khan,et al. Online churn detection on high dimensional cellular data using adaptive hierarchical trees , 2016, 2016 24th European Signal Processing Conference (EUSIPCO).
[16] Qinbao Song,et al. A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data , 2013, IEEE Transactions on Knowledge and Data Engineering.
[17] Alfred O. Hero,et al. Tree-structured nonlinear signal modeling and prediction , 1999, IEEE Trans. Signal Process..
[18] Santosh Kumar Sahu,et al. A detail analysis on intrusion detection datasets , 2014, 2014 IEEE International Advance Computing Conference (IACC).
[19] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[20] Keith Phalp,et al. Exploring discrepancies in findings obtained with the KDD Cup '99 data set , 2011, Intell. Data Anal..
[21] Yoav Freund,et al. Boosting a weak learning algorithm by majority , 1995, COLT '90.
[22] Weilin Huang,et al. Robust Scene Text Detection with Convolution Neural Network Induced MSER Trees , 2014, ECCV.
[23] J. Friedman. Greedy function approximation: A gradient boosting machine. , 2001 .
[24] Stefan C. Kremer,et al. Recurrent Neural Networks , 2013, Handbook on Neural Information Processing.
[25] Alex M. Andrew,et al. Boosting: Foundations and Algorithms , 2012 .
[26] Yanbo Wu,et al. Signal processing in underwater acoustic communication system for manned deep submersible “Jiaolong” , 2012 .
[27] Wentao Ma,et al. Sparse least mean p-power algorithms for channel estimation in the presence of impulsive noise , 2016, Signal Image Video Process..
[28] J. Jost. Riemannian geometry and geometric analysis , 1995 .
[29] Farhan Khan,et al. Sequential churn prediction and analysis of cellular network users — A multi-class, multi-label perspective , 2017, 2017 25th Signal Processing and Communications Applications Conference (SIU).
[30] Haipeng Luo,et al. Optimal and Adaptive Algorithms for Online Boosting , 2015, ICML.
[31] Jin Hyeong Park,et al. Multi-resolution boosting for classification and regression problems , 2009, Knowledge and Information Systems.
[32] Vladimir Vovk,et al. Competitive On-line Linear Regression , 1997, NIPS.
[33] Jae-Hyeon Ahn,et al. Customer churn analysis: Churn determinants and mediation effects of partial defection in the Korean mobile telecommunications service industry , 2006 .
[34] Qingyao Wu,et al. Online transfer learning by leveraging multiple source domains , 2017, Knowledge and Information Systems.
[35] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[36] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[37] Samy Bengio,et al. Taking on the curse of dimensionality in joint distributions using neural networks , 2000, IEEE Trans. Neural Networks Learn. Syst..
[38] Kyoungok Kim,et al. Sequential manifold learning for efficient churn prediction , 2012, Expert Syst. Appl..
[39] J. Hildebrand. Anthropogenic and natural sources of ambient noise in the ocean , 2009 .
[40] Bart Baesens,et al. Recursive Neural Network Rule Extraction for Data With Mixed Attributes , 2008, IEEE Transactions on Neural Networks.
[41] Eric Bauer,et al. An Empirical Comparison of Voting Classification Algorithms: Bagging, Boosting, and Variants , 1999, Machine Learning.
[42] Tareq Y. Al-Naffouri,et al. Transient analysis of adaptive filters with error nonlinearities , 2003, IEEE Trans. Signal Process..
[43] Yoav Freund,et al. An Adaptive Version of the Boost by Majority Algorithm , 1999, COLT '99.
[44] Milica Stojanovic,et al. Underwater acoustic communication channels: Propagation models and statistical characterization , 2009, IEEE Communications Magazine.
[45] Georg Zeitler,et al. Universal Piecewise Linear Prediction Via Context Trees , 2007, IEEE Transactions on Signal Processing.
[46] Hermann Ney,et al. LSTM Neural Networks for Language Modeling , 2012, INTERSPEECH.
[47] J. Chambers,et al. A robust mixed-norm adaptive filter algorithm , 1997, IEEE Signal Processing Letters.
[48] A. Robert Calderbank,et al. PETRELS: Subspace estimation and tracking from partial observations , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[49] Manfred K. Warmuth,et al. Relative Loss Bounds for On-Line Density Estimation with the Exponential Family of Distributions , 1999, Machine Learning.
[50] Tomohisa Wada,et al. An underwater acoustic OFDM communication system with shrimp (impulsive) noise cancelling , 2014, 2014 International Conference on Computing, Management and Telecommunications (ComManTel).
[51] Rob J. Hyndman,et al. Boosting multi-step autoregressive forecasts , 2014, ICML.
[52] Zhong Liu,et al. Underwater acoustic azimuth and elevation angle estimation using spatial invariance of two identically oriented vector hydrophones at unknown locations in impulsive noise , 2009, Digit. Signal Process..
[53] Jianying Hu,et al. Winning the KDD Cup Orange Challenge with Ensemble Selection , 2009, KDD Cup.
[54] Leo Breiman,et al. Prediction Games and Arcing Algorithms , 1999, Neural Computation.
[55] Jiashu Zhang,et al. Pipelined robust M-estimate adaptive second-order Volterra filter against impulsive noise , 2014, Digit. Signal Process..
[56] Jürgen Schmidhuber,et al. Learning to Forget: Continual Prediction with LSTM , 2000, Neural Computation.
[57] Vangelis Metsis,et al. Boosted ranking models: a unifying framework for ranking predictions , 2011, Knowledge and Information Systems.
[58] Monika Agrawal,et al. On the performance of underwater communication system in noise with Gaussian Mixture statistics , 2014, 2014 Twentieth National Conference on Communications (NCC).
[59] A.B. Baggeroer,et al. The state of the art in underwater acoustic telemetry , 2000, IEEE Journal of Oceanic Engineering.
[60] Konstantinos Pelekanakis,et al. Robust Equalization of Mobile Underwater Acoustic Channels , 2015, IEEE Journal of Oceanic Engineering.
[61] Michael I. Jordan,et al. Regression on manifolds using kernel dimension reduction , 2007, ICML '07.
[62] Wouter A. Serdijn,et al. Effect of smooth nonlinear distortion on OFDM symbol error rate , 2001, IEEE Trans. Commun..
[63] Mark Handley,et al. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics , 2001, USENIX Security Symposium.
[64] Rémi Gribonval,et al. From projection pursuit and CART to adaptive discriminant analysis? , 2005, IEEE Transactions on Neural Networks.
[65] David P. Helmbold,et al. Boosting Methods for Regression , 2002, Machine Learning.
[66] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[67] S. R,et al. Data Mining with Big Data , 2017, 2017 11th International Conference on Intelligent Systems and Control (ISCO).
[68] M. Stojanovic,et al. Statistical Characterization and Computationally Efficient Modeling of a Class of Underwater Acoustic Communication Channels , 2013, IEEE Journal of Oceanic Engineering.
[69] Ali A. Ghorbani,et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..
[70] Vegard Engen. Machine learning for network based intrusion detection : an investigation into discrepancies in findings with the KDD cup '99 data set and multi-objective evolution of neural network classifier ensembles from imbalanced data , 2010 .
[71] Stephen D. Bay,et al. The UCI KDD archive of large data sets for data mining research and experimentation , 2000, SKDD.
[72] Shing-Chow Chan,et al. A recursive least M-estimate algorithm for robust adaptive filtering in impulsive noise: fast algorithm and convergence performance analysis , 2004, IEEE Transactions on Signal Processing.
[73] Rocco A. Servedio,et al. Smooth Boosting and Learning with Malicious Noise , 2001, J. Mach. Learn. Res..
[74] Yongdai Kim,et al. Convex Hull Ensemble Machine for Regression and Classification , 2003, Knowledge and Information Systems.
[75] J. Tenenbaum,et al. A global geometric framework for nonlinear dimensionality reduction. , 2000, Science.
[76] Dirk Van den Poel,et al. Faculteit Economie En Bedrijfskunde Hoveniersberg 24 B-9000 Gent Incorporating Sequential Information into Traditional Classification Models by Using an Element/position-sensitive Sam , 2022 .
[77] David J. Kriegman,et al. Online learning of probabilistic appearance manifolds for video-based recognition and tracking , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[78] Salvatore J. Stolfo,et al. Cost Complexity-Based Pruning of Ensemble Classifiers , 2001, Knowledge and Information Systems.
[79] H. Vincent Poor,et al. Joint channel estimation and symbol detection in Rayleigh flat-fading channels with impulsive noise , 1997, IEEE Communications Letters.
[80] Sanjoy Dasgupta,et al. A tree-based regressor that adapts to intrinsic dimension , 2012, J. Comput. Syst. Sci..
[81] Philip M. Long,et al. Worst-case quadratic loss bounds for prediction using linear functions and gradient descent , 1996, IEEE Trans. Neural Networks.
[82] Andrew C. Singer,et al. Universal linear prediction by model order weighting , 1999, IEEE Trans. Signal Process..
[83] Yu-To Chen,et al. Design quality and robustness with neural networks , 1999, IEEE Trans. Neural Networks.
[84] Hsuan-Tien Lin,et al. An Online Boosting Algorithm with Theoretical Justifications , 2012, ICML.
[85] Mark Crovella,et al. Diagnosing network-wide traffic anomalies , 2004, SIGCOMM '04.
[86] Azzedine Zerguine,et al. Channel equalization using simplified least mean-fourth algorithm , 2011, Digit. Signal Process..
[87] Christopher Krügel,et al. Using Decision Trees to Improve Signature-Based Intrusion Detection , 2003, RAID.
[88] Adam Krzyzak,et al. Radial Basis Function Networks and Complexity Regularization in Function Learning , 2022 .
[89] Eugenio Cesario,et al. Boosting text segmentation via progressive classification , 2008, Knowledge and Information Systems.
[90] Ali A. Ghorbani,et al. Characterization of Tor Traffic using Time based Features , 2017, ICISSP.
[91] Jaideep Srivastava,et al. A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.
[92] C. K. Michael Tse,et al. A class of improved least sum of exponentials algorithms , 2016, Signal Process..
[93] Shai Shalev-Shwartz,et al. Online Learning and Online Convex Optimization , 2012, Found. Trends Mach. Learn..
[94] Haixin Sun,et al. Impulsive Noise Mitigation in Underwater Acoustic OFDM Systems , 2016, IEEE Transactions on Vehicular Technology.
[95] Aijun Song,et al. Generalized equalization for underwater acoustic communications , 2005, Proceedings of OCEANS 2005 MTS/IEEE.
[96] N. Azad,et al. The customer relationship management process: its measurement and impact on performance , 2015 .
[97] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[98] Jürgen Schmidhuber,et al. LSTM: A Search Space Odyssey , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[99] Rebecca Willett,et al. Multiscale online tracking of manifolds , 2012, 2012 IEEE Statistical Signal Processing Workshop (SSP).
[100] Haipeng Luo,et al. Online Gradient Boosting , 2015, NIPS.
[101] S. Wiggins. Introduction to Applied Nonlinear Dynamical Systems and Chaos , 1989 .
[102] Ying Li,et al. An overview of recent advances on distributed and agile sensing algorithms and implementation , 2015, Digit. Signal Process..
[103] Ömer Egecioglu,et al. Dimensionality reduction and similarity computation by inner-product approximations , 2000, IEEE Transactions on Knowledge and Data Engineering.
[104] Lianhong Cai,et al. Question detection from acoustic features using recurrent neural network with gated recurrent unit , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[105] Kai-Uwe Schmidt,et al. Sequences with small correlation , 2015, Designs, Codes and Cryptography.
[106] Jacek M. Zurada,et al. Extraction of rules from artificial neural networks for nonlinear regression , 2002, IEEE Trans. Neural Networks.
[107] Monika Agrawal,et al. Underwater acoustic communication in the presence of heavy-tailed impulsive noise with bi-parameter cauchy-Gaussian mixture model , 2013, 2013 Ocean Electronics (SYMPOL).
[108] Konrad Rieck,et al. A close look on n-grams in intrusion detection: anomaly detection vs. classification , 2013, AISec.
[109] Paulo Sergio Ramirez,et al. Fundamentals of Adaptive Filtering , 2002 .
[110] S. Haykin,et al. Adaptive Filter Theory , 1986 .
[111] Konstantinos Pelekanakis,et al. Adaptive Sparse Channel Estimation under Symmetric alpha-Stable Noise , 2014, IEEE Transactions on Wireless Communications.
[112] Monika Agrawal,et al. Underwater acoustic noise with generalized Gaussian statistics: Effects on error performance , 2013, 2013 MTS/IEEE OCEANS - Bergen.
[113] Azzedine Zerguine. Convergence and steady-state analysis of the normalized least mean fourth algorithm , 2007, Digit. Signal Process..
[114] John M. Lee. Riemannian Manifolds: An Introduction to Curvature , 1997 .
[115] Konrad Rieck,et al. Language models for detection of unknown attacks in network traffic , 2006, Journal in Computer Virology.
[116] Chengqi Zhang,et al. Boosting for graph classification with universum , 2016, Knowledge and Information Systems.
[117] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[118] Neri Merhav,et al. Universal schemes for sequential decision from individual data sequences , 1993, IEEE Trans. Inf. Theory.
[119] Bo Pang,et al. Thumbs up? Sentiment Classification using Machine Learning Techniques , 2002, EMNLP.
[120] Leszek Rutkowski,et al. Generalized regression neural networks in time-varying environment , 2004, IEEE Transactions on Neural Networks.
[121] Robert Givan,et al. Online Ensemble Learning: An Empirical Study , 2000, Machine Learning.
[122] Saswati Sarkar,et al. Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[123] Hui Xiong,et al. Distance metrics for high dimensional nearest neighborhood recovery: Compression and normalization , 2012, Inf. Sci..
[124] Andrew C. Singer,et al. Universal linear least squares prediction: Upper and lower bounds , 2002, IEEE Trans. Inf. Theory.
[125] Sanjoy Dasgupta,et al. Random projection trees for vector quantization , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[126] Takeo Kanade,et al. Introduction to the Special Section on Video Surveillance , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[127] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .
[128] Piyush Malik,et al. Governing Big Data: Principles and practices , 2013, IBM J. Res. Dev..
[129] Fengzhong Qu,et al. Basis expansion model for underwater acoustic channels? , 2008, OCEANS 2008.
[130] Thomas G. Dietterich. An Experimental Comparison of Three Methods for Constructing Ensembles of Decision Trees: Bagging, Boosting, and Randomization , 2000, Machine Learning.
[131] Shai Ben-David,et al. Online learning versus offline learning , 1995, EuroCOLT.
[132] Gábor Lugosi,et al. Prediction, learning, and games , 2006 .
[133] J. Hanley,et al. The meaning and use of the area under a receiver operating characteristic (ROC) curve. , 1982, Radiology.
[134] Rebecca Willett,et al. Change-Point Detection for High-Dimensional Time Series With Missing Data , 2012, IEEE Journal of Selected Topics in Signal Processing.
[135] Elad Hazan,et al. Logarithmic regret algorithms for online convex optimization , 2006, Machine Learning.
[136] Paulo Cortez,et al. A Proactive Intelligent Decision Support System for Predicting the Popularity of Online News , 2015, EPIA.
[137] Souhaib Ben Taieb,et al. A gradient boosting approach to the Kaggle load forecasting competition , 2014 .
[138] Stuart J. Russell,et al. Online bagging and boosting , 2005, 2005 IEEE International Conference on Systems, Man and Cybernetics.
[139] Huan Liu,et al. Toward integrating feature selection algorithms for classification and clustering , 2005, IEEE Transactions on Knowledge and Data Engineering.
[140] Suleyman Serdar Kozat,et al. A Comprehensive Approach to Universal Piecewise Nonlinear Regression Based on Trees , 2013, IEEE Transactions on Signal Processing.
[141] Dezhong Peng,et al. Adaptive blind equalization of time-varying SIMO systems driven by QPSK inputs , 2013, Digit. Signal Process..
[142] Marc Sebban,et al. A new boosting algorithm for provably accurate unsupervised domain adaptation , 2015, Knowledge and Information Systems.
[143] Tianshuang Qiu,et al. Underwater sources location in non-Gaussian impulsive noise environments , 2006, Digit. Signal Process..
[144] Ali H. Sayed,et al. Combinations of Adaptive Filters: Performance and convergence properties , 2021, IEEE Signal Processing Magazine.
[145] Yoram Singer,et al. On the equivalence of weak learnability and linear separability: new relaxations and efficient boosting algorithms , 2010, Machine Learning.
[146] Hamid Beigy,et al. An ensemble of cluster-based classifiers for semi-supervised classification of non-stationary data streams , 2016, Knowledge and Information Systems.
[147] Rebecca Willett,et al. Online logistic regression on manifolds , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[148] David L Streiner,et al. What's under the ROC? An Introduction to Receiver Operating Characteristics Curves , 2007, Canadian journal of psychiatry. Revue canadienne de psychiatrie.
[149] Farhan Khan,et al. Universal Nonlinear Regression on High Dimensional Data Using Adaptive Hierarchical Trees , 2016, IEEE Transactions on Big Data.
[150] Gunnar Rätsch,et al. An introduction to kernel-based learning algorithms , 2001, IEEE Trans. Neural Networks.
[151] Léon Bottou,et al. The Tradeoffs of Large Scale Learning , 2007, NIPS.
[152] Ali H. Sayed,et al. Ability of adaptive filters to track carrier offsets and channel nonstationarities , 2002, IEEE Trans. Signal Process..
[153] Yoshua Bengio,et al. Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling , 2014, ArXiv.
[154] Durga L. Shrestha,et al. Experiments with AdaBoost.RT, an Improved Boosting Scheme for Regression , 2006, Neural Computation.
[155] Mehmet Burak Guldogan,et al. Joint underwater target detection and tracking with the Bernoulli filter using an acoustic vector sensor , 2016, Digit. Signal Process..
[156] Yoav Freund,et al. A decision-theoretic generalization of on-line learning and an application to boosting , 1995, EuroCOLT.
[157] Thierry Bertin-Mahieux,et al. The Million Song Dataset , 2011, ISMIR.
[158] Andrew C. Singer,et al. Nonlinear Autoregressive Modeling and Estimation in the Presence of Noise , 1994 .
[159] Yoshua Bengio,et al. Convolutional networks for images, speech, and time series , 1998 .
[160] Andrew Y. Ng,et al. Parsing Natural Scenes and Natural Language with Recursive Neural Networks , 2011, ICML.
[161] Stefan Axelsson,et al. Intrusion Detection Systems: A Survey and Taxonomy , 2002 .
[162] Aníbal R. Figueiras-Vidal,et al. New algorithms for improved adaptive convex combination of LMS transversal filters , 2005, IEEE Transactions on Instrumentation and Measurement.
[163] Christin Schäfer,et al. Learning Intrusion Detection: Supervised or Unsupervised? , 2005, ICIAP.
[164] Ting Liu,et al. Document Modeling with Gated Recurrent Neural Network for Sentiment Classification , 2015, EMNLP.
[165] Suleyman Serdar Kozat,et al. A Novel Family of Adaptive Filtering Algorithms Based on the Logarithmic Cost , 2013, IEEE Transactions on Signal Processing.
[166] Konrad Rieck,et al. Machine learning for application layer intrusion detection , 2011 .
[167] Ming-Hsuan Yang,et al. A family of online boosting algorithms , 2009, 2009 IEEE 12th International Conference on Computer Vision Workshops, ICCV Workshops.
[168] Ali H. Sayed,et al. Steady-State MSE Performance Analysis of Mixture Approaches to Adaptive Filtering , 2010, IEEE Transactions on Signal Processing.
[169] Magno T. M. Silva,et al. Improving the Tracking Capability of Adaptive Filters via Convex Combination , 2008, IEEE Transactions on Signal Processing.
[170] S T Roweis,et al. Nonlinear dimensionality reduction by locally linear embedding. , 2000, Science.
[171] Andrew C. Singer,et al. Universal Switching Linear Least Squares Prediction , 2008, IEEE Transactions on Signal Processing.
[172] Frans M. J. Willems,et al. Coding for a binary independent piecewise-identically-distributed source , 1996, IEEE Trans. Inf. Theory.
[173] Vern Paxson,et al. A high-level programming environment for packet trace anonymization and transformation , 2003, SIGCOMM '03.
[174] I. Miller. Probability, Random Variables, and Stochastic Processes , 1966 .
[175] Paola Campadelli,et al. A Boosting Algorithm for Regression , 1997, ICANN.
[176] Shie Mannor,et al. On the Existence of Linear Weak Learners and Applications to Boosting , 2002, Machine Learning.
[177] Xue Li,et al. Dynamic classifier ensemble for positive unlabeled text stream classification , 2012, Knowledge and Information Systems.