Online nonlinear modeling for big data applications

ONLINE NONLINEAR MODELING FOR BIG DATA APPLICATIONS Farhan Khan Ph.D. in Electrical and Electronics Engineering Advisor: Suleyman Serdar Kozat December 2017 We investigate online nonlinear learning for several real life, adaptive signal processing and machine learning applications involving big data, and introduce algorithms that are both efficient and effective. We present novel solutions for learning from the data that is generated at high speed and/or have big dimensions in a non-stationary environment, and needs to be processed on the fly. We specifically focus on investigating the problems arising from adverse real life conditions in a big data perspective. We propose online algorithms that are robust against the non-stationarities and corruptions in the data. We emphasize that our proposed algorithms are universally applicable to several real life applications regardless of the complexities involving high dimensionality, time varying statistics, data structures and abrupt changes. To this end, we introduce a highly robust hierarchical trees algorithm for online nonlinear learning in a high dimensional setting where the data lies on a time varying manifold. We escape the curse of dimensionality by tracking the subspace of the underlying manifold and use the projections of the original high dimensional regressor space onto the underlying manifold as the modified regressor vectors for modeling of the nonlinear system. By using the proposed algorithm, we reduce the computational complexity to the order of the depth of the tree and the memory requirement to only linear in the intrinsic dimension of the manifold. We demonstrate the significant performance gains in terms of mean square error over the other state of the art techniques through simulated as well as real data. We then consider real life applications of online nonlinear learning modeling, such as network intrusions detection, customers’ churn analysis and channel estimation for underwater acoustic communication. We propose sequential and online learning methods that achieve significant performance in terms of detection accuracy, compared to the state-of-the-art techniques. We specifically introduce structured and deep learning methods to develop robust learning algorithms. Furthermore, we improve the performance of our proposed online nonlinear learning

[1]  Vladimir Vovk,et al.  Aggregating strategies , 1990, COLT '90.

[2]  Efstathios Stamatatos,et al.  Syntactic N-grams as machine learning features for natural language processing , 2014, Expert Syst. Appl..

[3]  Wojciech Zaremba,et al.  An Empirical Exploration of Recurrent Network Architectures , 2015, ICML.

[4]  Richard Bellman,et al.  Adaptive Control Processes: A Guided Tour , 1961, The Mathematical Gazette.

[5]  Phil Blunsom,et al.  A Convolutional Neural Network for Modelling Sentences , 2014, ACL.

[6]  Lars Schmidt-Thieme,et al.  Ensembles of relational classifiers , 2008, Knowledge and Information Systems.

[7]  Salvatore J. Stolfo,et al.  Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[8]  Jesús Alcalá-Fdez,et al.  KEEL Data-Mining Software Tool: Data Set Repository, Integration of Algorithms and Experimental Analysis Framework , 2011, J. Multiple Valued Log. Soft Comput..

[9]  F. F. Reichheld,et al.  Zero defections: quality comes to services. , 1990, Harvard business review.

[10]  Nathalie Japkowicz,et al.  Boosting support vector machines for imbalanced data sets , 2008, Knowledge and Information Systems.

[11]  Jugal K. Kalita,et al.  Network attacks: Taxonomy, tools and systems , 2014, J. Netw. Comput. Appl..

[12]  Paul C. Etter,et al.  Underwater Acoustic Modeling and Simulation , 2018 .

[13]  Andrew McCallum,et al.  Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data , 2001, ICML.

[14]  Frans M. J. Willems,et al.  The Context-Tree Weighting Method : Extensions , 1998, IEEE Trans. Inf. Theory.

[15]  Farhan Khan,et al.  Online churn detection on high dimensional cellular data using adaptive hierarchical trees , 2016, 2016 24th European Signal Processing Conference (EUSIPCO).

[16]  Qinbao Song,et al.  A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data , 2013, IEEE Transactions on Knowledge and Data Engineering.

[17]  Alfred O. Hero,et al.  Tree-structured nonlinear signal modeling and prediction , 1999, IEEE Trans. Signal Process..

[18]  Santosh Kumar Sahu,et al.  A detail analysis on intrusion detection datasets , 2014, 2014 IEEE International Advance Computing Conference (IACC).

[19]  Salvatore J. Stolfo,et al.  Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.

[20]  Keith Phalp,et al.  Exploring discrepancies in findings obtained with the KDD Cup '99 data set , 2011, Intell. Data Anal..

[21]  Yoav Freund,et al.  Boosting a weak learning algorithm by majority , 1995, COLT '90.

[22]  Weilin Huang,et al.  Robust Scene Text Detection with Convolution Neural Network Induced MSER Trees , 2014, ECCV.

[23]  J. Friedman Greedy function approximation: A gradient boosting machine. , 2001 .

[24]  Stefan C. Kremer,et al.  Recurrent Neural Networks , 2013, Handbook on Neural Information Processing.

[25]  Alex M. Andrew,et al.  Boosting: Foundations and Algorithms , 2012 .

[26]  Yanbo Wu,et al.  Signal processing in underwater acoustic communication system for manned deep submersible “Jiaolong” , 2012 .

[27]  Wentao Ma,et al.  Sparse least mean p-power algorithms for channel estimation in the presence of impulsive noise , 2016, Signal Image Video Process..

[28]  J. Jost Riemannian geometry and geometric analysis , 1995 .

[29]  Farhan Khan,et al.  Sequential churn prediction and analysis of cellular network users — A multi-class, multi-label perspective , 2017, 2017 25th Signal Processing and Communications Applications Conference (SIU).

[30]  Haipeng Luo,et al.  Optimal and Adaptive Algorithms for Online Boosting , 2015, ICML.

[31]  Jin Hyeong Park,et al.  Multi-resolution boosting for classification and regression problems , 2009, Knowledge and Information Systems.

[32]  Vladimir Vovk,et al.  Competitive On-line Linear Regression , 1997, NIPS.

[33]  Jae-Hyeon Ahn,et al.  Customer churn analysis: Churn determinants and mediation effects of partial defection in the Korean mobile telecommunications service industry , 2006 .

[34]  Qingyao Wu,et al.  Online transfer learning by leveraging multiple source domains , 2017, Knowledge and Information Systems.

[35]  Jürgen Schmidhuber,et al.  Long Short-Term Memory , 1997, Neural Computation.

[36]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[37]  Samy Bengio,et al.  Taking on the curse of dimensionality in joint distributions using neural networks , 2000, IEEE Trans. Neural Networks Learn. Syst..

[38]  Kyoungok Kim,et al.  Sequential manifold learning for efficient churn prediction , 2012, Expert Syst. Appl..

[39]  J. Hildebrand Anthropogenic and natural sources of ambient noise in the ocean , 2009 .

[40]  Bart Baesens,et al.  Recursive Neural Network Rule Extraction for Data With Mixed Attributes , 2008, IEEE Transactions on Neural Networks.

[41]  Eric Bauer,et al.  An Empirical Comparison of Voting Classification Algorithms: Bagging, Boosting, and Variants , 1999, Machine Learning.

[42]  Tareq Y. Al-Naffouri,et al.  Transient analysis of adaptive filters with error nonlinearities , 2003, IEEE Trans. Signal Process..

[43]  Yoav Freund,et al.  An Adaptive Version of the Boost by Majority Algorithm , 1999, COLT '99.

[44]  Milica Stojanovic,et al.  Underwater acoustic communication channels: Propagation models and statistical characterization , 2009, IEEE Communications Magazine.

[45]  Georg Zeitler,et al.  Universal Piecewise Linear Prediction Via Context Trees , 2007, IEEE Transactions on Signal Processing.

[46]  Hermann Ney,et al.  LSTM Neural Networks for Language Modeling , 2012, INTERSPEECH.

[47]  J. Chambers,et al.  A robust mixed-norm adaptive filter algorithm , 1997, IEEE Signal Processing Letters.

[48]  A. Robert Calderbank,et al.  PETRELS: Subspace estimation and tracking from partial observations , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[49]  Manfred K. Warmuth,et al.  Relative Loss Bounds for On-Line Density Estimation with the Exponential Family of Distributions , 1999, Machine Learning.

[50]  Tomohisa Wada,et al.  An underwater acoustic OFDM communication system with shrimp (impulsive) noise cancelling , 2014, 2014 International Conference on Computing, Management and Telecommunications (ComManTel).

[51]  Rob J. Hyndman,et al.  Boosting multi-step autoregressive forecasts , 2014, ICML.

[52]  Zhong Liu,et al.  Underwater acoustic azimuth and elevation angle estimation using spatial invariance of two identically oriented vector hydrophones at unknown locations in impulsive noise , 2009, Digit. Signal Process..

[53]  Jianying Hu,et al.  Winning the KDD Cup Orange Challenge with Ensemble Selection , 2009, KDD Cup.

[54]  Leo Breiman,et al.  Prediction Games and Arcing Algorithms , 1999, Neural Computation.

[55]  Jiashu Zhang,et al.  Pipelined robust M-estimate adaptive second-order Volterra filter against impulsive noise , 2014, Digit. Signal Process..

[56]  Jürgen Schmidhuber,et al.  Learning to Forget: Continual Prediction with LSTM , 2000, Neural Computation.

[57]  Vangelis Metsis,et al.  Boosted ranking models: a unifying framework for ranking predictions , 2011, Knowledge and Information Systems.

[58]  Monika Agrawal,et al.  On the performance of underwater communication system in noise with Gaussian Mixture statistics , 2014, 2014 Twentieth National Conference on Communications (NCC).

[59]  A.B. Baggeroer,et al.  The state of the art in underwater acoustic telemetry , 2000, IEEE Journal of Oceanic Engineering.

[60]  Konstantinos Pelekanakis,et al.  Robust Equalization of Mobile Underwater Acoustic Channels , 2015, IEEE Journal of Oceanic Engineering.

[61]  Michael I. Jordan,et al.  Regression on manifolds using kernel dimension reduction , 2007, ICML '07.

[62]  Wouter A. Serdijn,et al.  Effect of smooth nonlinear distortion on OFDM symbol error rate , 2001, IEEE Trans. Commun..

[63]  Mark Handley,et al.  Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics , 2001, USENIX Security Symposium.

[64]  Rémi Gribonval,et al.  From projection pursuit and CART to adaptive discriminant analysis? , 2005, IEEE Transactions on Neural Networks.

[65]  David P. Helmbold,et al.  Boosting Methods for Regression , 2002, Machine Learning.

[66]  Todd L. Heberlein,et al.  Network intrusion detection , 1994, IEEE Network.

[67]  S. R,et al.  Data Mining with Big Data , 2017, 2017 11th International Conference on Intelligent Systems and Control (ISCO).

[68]  M. Stojanovic,et al.  Statistical Characterization and Computationally Efficient Modeling of a Class of Underwater Acoustic Communication Channels , 2013, IEEE Journal of Oceanic Engineering.

[69]  Ali A. Ghorbani,et al.  Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..

[70]  Vegard Engen Machine learning for network based intrusion detection : an investigation into discrepancies in findings with the KDD cup '99 data set and multi-objective evolution of neural network classifier ensembles from imbalanced data , 2010 .

[71]  Stephen D. Bay,et al.  The UCI KDD archive of large data sets for data mining research and experimentation , 2000, SKDD.

[72]  Shing-Chow Chan,et al.  A recursive least M-estimate algorithm for robust adaptive filtering in impulsive noise: fast algorithm and convergence performance analysis , 2004, IEEE Transactions on Signal Processing.

[73]  Rocco A. Servedio,et al.  Smooth Boosting and Learning with Malicious Noise , 2001, J. Mach. Learn. Res..

[74]  Yongdai Kim,et al.  Convex Hull Ensemble Machine for Regression and Classification , 2003, Knowledge and Information Systems.

[75]  J. Tenenbaum,et al.  A global geometric framework for nonlinear dimensionality reduction. , 2000, Science.

[76]  Dirk Van den Poel,et al.  Faculteit Economie En Bedrijfskunde Hoveniersberg 24 B-9000 Gent Incorporating Sequential Information into Traditional Classification Models by Using an Element/position-sensitive Sam , 2022 .

[77]  David J. Kriegman,et al.  Online learning of probabilistic appearance manifolds for video-based recognition and tracking , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[78]  Salvatore J. Stolfo,et al.  Cost Complexity-Based Pruning of Ensemble Classifiers , 2001, Knowledge and Information Systems.

[79]  H. Vincent Poor,et al.  Joint channel estimation and symbol detection in Rayleigh flat-fading channels with impulsive noise , 1997, IEEE Communications Letters.

[80]  Sanjoy Dasgupta,et al.  A tree-based regressor that adapts to intrinsic dimension , 2012, J. Comput. Syst. Sci..

[81]  Philip M. Long,et al.  Worst-case quadratic loss bounds for prediction using linear functions and gradient descent , 1996, IEEE Trans. Neural Networks.

[82]  Andrew C. Singer,et al.  Universal linear prediction by model order weighting , 1999, IEEE Trans. Signal Process..

[83]  Yu-To Chen,et al.  Design quality and robustness with neural networks , 1999, IEEE Trans. Neural Networks.

[84]  Hsuan-Tien Lin,et al.  An Online Boosting Algorithm with Theoretical Justifications , 2012, ICML.

[85]  Mark Crovella,et al.  Diagnosing network-wide traffic anomalies , 2004, SIGCOMM '04.

[86]  Azzedine Zerguine,et al.  Channel equalization using simplified least mean-fourth algorithm , 2011, Digit. Signal Process..

[87]  Christopher Krügel,et al.  Using Decision Trees to Improve Signature-Based Intrusion Detection , 2003, RAID.

[88]  Adam Krzyzak,et al.  Radial Basis Function Networks and Complexity Regularization in Function Learning , 2022 .

[89]  Eugenio Cesario,et al.  Boosting text segmentation via progressive classification , 2008, Knowledge and Information Systems.

[90]  Ali A. Ghorbani,et al.  Characterization of Tor Traffic using Time based Features , 2017, ICISSP.

[91]  Jaideep Srivastava,et al.  A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.

[92]  C. K. Michael Tse,et al.  A class of improved least sum of exponentials algorithms , 2016, Signal Process..

[93]  Shai Shalev-Shwartz,et al.  Online Learning and Online Convex Optimization , 2012, Found. Trends Mach. Learn..

[94]  Haixin Sun,et al.  Impulsive Noise Mitigation in Underwater Acoustic OFDM Systems , 2016, IEEE Transactions on Vehicular Technology.

[95]  Aijun Song,et al.  Generalized equalization for underwater acoustic communications , 2005, Proceedings of OCEANS 2005 MTS/IEEE.

[96]  N. Azad,et al.  The customer relationship management process: its measurement and impact on performance , 2015 .

[97]  Heng Tao Shen,et al.  Principal Component Analysis , 2009, Encyclopedia of Biometrics.

[98]  Jürgen Schmidhuber,et al.  LSTM: A Search Space Odyssey , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[99]  Rebecca Willett,et al.  Multiscale online tracking of manifolds , 2012, 2012 IEEE Statistical Signal Processing Workshop (SSP).

[100]  Haipeng Luo,et al.  Online Gradient Boosting , 2015, NIPS.

[101]  S. Wiggins Introduction to Applied Nonlinear Dynamical Systems and Chaos , 1989 .

[102]  Ying Li,et al.  An overview of recent advances on distributed and agile sensing algorithms and implementation , 2015, Digit. Signal Process..

[103]  Ömer Egecioglu,et al.  Dimensionality reduction and similarity computation by inner-product approximations , 2000, IEEE Transactions on Knowledge and Data Engineering.

[104]  Lianhong Cai,et al.  Question detection from acoustic features using recurrent neural network with gated recurrent unit , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[105]  Kai-Uwe Schmidt,et al.  Sequences with small correlation , 2015, Designs, Codes and Cryptography.

[106]  Jacek M. Zurada,et al.  Extraction of rules from artificial neural networks for nonlinear regression , 2002, IEEE Trans. Neural Networks.

[107]  Monika Agrawal,et al.  Underwater acoustic communication in the presence of heavy-tailed impulsive noise with bi-parameter cauchy-Gaussian mixture model , 2013, 2013 Ocean Electronics (SYMPOL).

[108]  Konrad Rieck,et al.  A close look on n-grams in intrusion detection: anomaly detection vs. classification , 2013, AISec.

[109]  Paulo Sergio Ramirez,et al.  Fundamentals of Adaptive Filtering , 2002 .

[110]  S. Haykin,et al.  Adaptive Filter Theory , 1986 .

[111]  Konstantinos Pelekanakis,et al.  Adaptive Sparse Channel Estimation under Symmetric alpha-Stable Noise , 2014, IEEE Transactions on Wireless Communications.

[112]  Monika Agrawal,et al.  Underwater acoustic noise with generalized Gaussian statistics: Effects on error performance , 2013, 2013 MTS/IEEE OCEANS - Bergen.

[113]  Azzedine Zerguine Convergence and steady-state analysis of the normalized least mean fourth algorithm , 2007, Digit. Signal Process..

[114]  John M. Lee Riemannian Manifolds: An Introduction to Curvature , 1997 .

[115]  Konrad Rieck,et al.  Language models for detection of unknown attacks in network traffic , 2006, Journal in Computer Virology.

[116]  Chengqi Zhang,et al.  Boosting for graph classification with universum , 2016, Knowledge and Information Systems.

[117]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[118]  Neri Merhav,et al.  Universal schemes for sequential decision from individual data sequences , 1993, IEEE Trans. Inf. Theory.

[119]  Bo Pang,et al.  Thumbs up? Sentiment Classification using Machine Learning Techniques , 2002, EMNLP.

[120]  Leszek Rutkowski,et al.  Generalized regression neural networks in time-varying environment , 2004, IEEE Transactions on Neural Networks.

[121]  Robert Givan,et al.  Online Ensemble Learning: An Empirical Study , 2000, Machine Learning.

[122]  Saswati Sarkar,et al.  Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[123]  Hui Xiong,et al.  Distance metrics for high dimensional nearest neighborhood recovery: Compression and normalization , 2012, Inf. Sci..

[124]  Andrew C. Singer,et al.  Universal linear least squares prediction: Upper and lower bounds , 2002, IEEE Trans. Inf. Theory.

[125]  Sanjoy Dasgupta,et al.  Random projection trees for vector quantization , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[126]  Takeo Kanade,et al.  Introduction to the Special Section on Video Surveillance , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[127]  Thomas Henry Ptacek,et al.  Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .

[128]  Piyush Malik,et al.  Governing Big Data: Principles and practices , 2013, IBM J. Res. Dev..

[129]  Fengzhong Qu,et al.  Basis expansion model for underwater acoustic channels? , 2008, OCEANS 2008.

[130]  Thomas G. Dietterich An Experimental Comparison of Three Methods for Constructing Ensembles of Decision Trees: Bagging, Boosting, and Randomization , 2000, Machine Learning.

[131]  Shai Ben-David,et al.  Online learning versus offline learning , 1995, EuroCOLT.

[132]  Gábor Lugosi,et al.  Prediction, learning, and games , 2006 .

[133]  J. Hanley,et al.  The meaning and use of the area under a receiver operating characteristic (ROC) curve. , 1982, Radiology.

[134]  Rebecca Willett,et al.  Change-Point Detection for High-Dimensional Time Series With Missing Data , 2012, IEEE Journal of Selected Topics in Signal Processing.

[135]  Elad Hazan,et al.  Logarithmic regret algorithms for online convex optimization , 2006, Machine Learning.

[136]  Paulo Cortez,et al.  A Proactive Intelligent Decision Support System for Predicting the Popularity of Online News , 2015, EPIA.

[137]  Souhaib Ben Taieb,et al.  A gradient boosting approach to the Kaggle load forecasting competition , 2014 .

[138]  Stuart J. Russell,et al.  Online bagging and boosting , 2005, 2005 IEEE International Conference on Systems, Man and Cybernetics.

[139]  Huan Liu,et al.  Toward integrating feature selection algorithms for classification and clustering , 2005, IEEE Transactions on Knowledge and Data Engineering.

[140]  Suleyman Serdar Kozat,et al.  A Comprehensive Approach to Universal Piecewise Nonlinear Regression Based on Trees , 2013, IEEE Transactions on Signal Processing.

[141]  Dezhong Peng,et al.  Adaptive blind equalization of time-varying SIMO systems driven by QPSK inputs , 2013, Digit. Signal Process..

[142]  Marc Sebban,et al.  A new boosting algorithm for provably accurate unsupervised domain adaptation , 2015, Knowledge and Information Systems.

[143]  Tianshuang Qiu,et al.  Underwater sources location in non-Gaussian impulsive noise environments , 2006, Digit. Signal Process..

[144]  Ali H. Sayed,et al.  Combinations of Adaptive Filters: Performance and convergence properties , 2021, IEEE Signal Processing Magazine.

[145]  Yoram Singer,et al.  On the equivalence of weak learnability and linear separability: new relaxations and efficient boosting algorithms , 2010, Machine Learning.

[146]  Hamid Beigy,et al.  An ensemble of cluster-based classifiers for semi-supervised classification of non-stationary data streams , 2016, Knowledge and Information Systems.

[147]  Rebecca Willett,et al.  Online logistic regression on manifolds , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[148]  David L Streiner,et al.  What's under the ROC? An Introduction to Receiver Operating Characteristics Curves , 2007, Canadian journal of psychiatry. Revue canadienne de psychiatrie.

[149]  Farhan Khan,et al.  Universal Nonlinear Regression on High Dimensional Data Using Adaptive Hierarchical Trees , 2016, IEEE Transactions on Big Data.

[150]  Gunnar Rätsch,et al.  An introduction to kernel-based learning algorithms , 2001, IEEE Trans. Neural Networks.

[151]  Léon Bottou,et al.  The Tradeoffs of Large Scale Learning , 2007, NIPS.

[152]  Ali H. Sayed,et al.  Ability of adaptive filters to track carrier offsets and channel nonstationarities , 2002, IEEE Trans. Signal Process..

[153]  Yoshua Bengio,et al.  Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling , 2014, ArXiv.

[154]  Durga L. Shrestha,et al.  Experiments with AdaBoost.RT, an Improved Boosting Scheme for Regression , 2006, Neural Computation.

[155]  Mehmet Burak Guldogan,et al.  Joint underwater target detection and tracking with the Bernoulli filter using an acoustic vector sensor , 2016, Digit. Signal Process..

[156]  Yoav Freund,et al.  A decision-theoretic generalization of on-line learning and an application to boosting , 1995, EuroCOLT.

[157]  Thierry Bertin-Mahieux,et al.  The Million Song Dataset , 2011, ISMIR.

[158]  Andrew C. Singer,et al.  Nonlinear Autoregressive Modeling and Estimation in the Presence of Noise , 1994 .

[159]  Yoshua Bengio,et al.  Convolutional networks for images, speech, and time series , 1998 .

[160]  Andrew Y. Ng,et al.  Parsing Natural Scenes and Natural Language with Recursive Neural Networks , 2011, ICML.

[161]  Stefan Axelsson,et al.  Intrusion Detection Systems: A Survey and Taxonomy , 2002 .

[162]  Aníbal R. Figueiras-Vidal,et al.  New algorithms for improved adaptive convex combination of LMS transversal filters , 2005, IEEE Transactions on Instrumentation and Measurement.

[163]  Christin Schäfer,et al.  Learning Intrusion Detection: Supervised or Unsupervised? , 2005, ICIAP.

[164]  Ting Liu,et al.  Document Modeling with Gated Recurrent Neural Network for Sentiment Classification , 2015, EMNLP.

[165]  Suleyman Serdar Kozat,et al.  A Novel Family of Adaptive Filtering Algorithms Based on the Logarithmic Cost , 2013, IEEE Transactions on Signal Processing.

[166]  Konrad Rieck,et al.  Machine learning for application layer intrusion detection , 2011 .

[167]  Ming-Hsuan Yang,et al.  A family of online boosting algorithms , 2009, 2009 IEEE 12th International Conference on Computer Vision Workshops, ICCV Workshops.

[168]  Ali H. Sayed,et al.  Steady-State MSE Performance Analysis of Mixture Approaches to Adaptive Filtering , 2010, IEEE Transactions on Signal Processing.

[169]  Magno T. M. Silva,et al.  Improving the Tracking Capability of Adaptive Filters via Convex Combination , 2008, IEEE Transactions on Signal Processing.

[170]  S T Roweis,et al.  Nonlinear dimensionality reduction by locally linear embedding. , 2000, Science.

[171]  Andrew C. Singer,et al.  Universal Switching Linear Least Squares Prediction , 2008, IEEE Transactions on Signal Processing.

[172]  Frans M. J. Willems,et al.  Coding for a binary independent piecewise-identically-distributed source , 1996, IEEE Trans. Inf. Theory.

[173]  Vern Paxson,et al.  A high-level programming environment for packet trace anonymization and transformation , 2003, SIGCOMM '03.

[174]  I. Miller Probability, Random Variables, and Stochastic Processes , 1966 .

[175]  Paola Campadelli,et al.  A Boosting Algorithm for Regression , 1997, ICANN.

[176]  Shie Mannor,et al.  On the Existence of Linear Weak Learners and Applications to Boosting , 2002, Machine Learning.

[177]  Xue Li,et al.  Dynamic classifier ensemble for positive unlabeled text stream classification , 2012, Knowledge and Information Systems.