Feature data processing: Making medical data fit deep neural networks

Abstract With the rapid development of artificial intelligence technology, deep neural networks (DNNs), especially convolutional neural networks (CNNs) and recurrent neural networks (RNNs), have been widely used. However, the current application fields of DNN are severely limited. For example, CNN is mainly used to process image format data, and RNNs are often used to process voice and text format data. How to use DNNs to process general medical data, especially feature data, is gradually becoming a popular research topic. To effectively improve the current situation of blindly using DNN on feature data, this paper proposes a practical, systematic feature data processing system (FDPS). Using multiple data processing methods, the processed data are more suitable for analysis using DNN. Some constructive advice on choosing a better DNN model architecture suitable for training such data is also provided. Then, network traffic data of the Internet of Medical Things (IoMT) are used as an example to verify the effectiveness of the proposed system separately using CNN and RNN. The experimental results show that the proposed approach can use fewer training data and that a simpler model architecture achieves better performance compared with other existing methods. To the best of our knowledge, this paper is the first to clearly define feature data, propose a detailed and systematic processing method to make it suitable for DNN training, and provide some specific suggestions on how to choose an appropriate DNN model architecture. Furthermore, the system can provide an effective reference for the promotion of DNN applications, especially for the security and analysis of IoMT.

[1]  Nikhil R. Pal,et al.  Feature Selection Using a Neural Framework With Controlled Redundancy , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[2]  Vijay Varadharajan,et al.  A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection , 2019, IEEE Communications Surveys & Tutorials.

[3]  Huan Liu,et al.  Feature Selection for Classification , 1997, Intell. Data Anal..

[4]  Yann LeCun,et al.  Transformation Invariance in Pattern Recognition - Tangent Distance and Tangent Propagation , 2012, Neural Networks: Tricks of the Trade.

[5]  Zhi Xue,et al.  Character-Level Intrusion Detection Based On Convolutional Neural Networks , 2018, 2018 International Joint Conference on Neural Networks (IJCNN).

[6]  Jianwen Luo,et al.  Learning the implicit strain reconstruction in ultrasound elastography using privileged information , 2019, Medical Image Anal..

[7]  Zhiyuan Liu,et al.  Graph Neural Networks: A Review of Methods and Applications , 2018, AI Open.

[8]  Xing Zhao,et al.  Intrusion Detection Algorithm Based on Convolutional Neural Network , 2018 .

[9]  Chaopeng Li,et al.  Using a Recurrent Neural Network and Restricted Boltzmann Machines for Malicious Traffic Detection , 2018 .

[10]  Zahid Akhtar,et al.  KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research , 2019, Computer.

[11]  Yuefei Zhu,et al.  A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.

[12]  Luis Perez,et al.  The Effectiveness of Data Augmentation in Image Classification using Deep Learning , 2017, ArXiv.

[13]  Jeffrey L. Elman,et al.  Finding Structure in Time , 1990, Cogn. Sci..

[14]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[15]  Yang Xin,et al.  Robust detection for network intrusion of industrial IoT based on multi-CNN fusion , 2020 .

[16]  Djamal Zeghlache,et al.  A Cascade-structured Meta-Specialists Approach for Neural Network-based Intrusion Detection , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[17]  Yong Wang,et al.  Learning Traffic as Images: A Deep Convolutional Neural Network for Large-Scale Transportation Network Speed Prediction , 2017, Sensors.

[18]  Vladimir Vapnik,et al.  An overview of statistical learning theory , 1999, IEEE Trans. Neural Networks.

[19]  Yuan-Ting Zhang,et al.  Heartbeats Based Biometric Random Binary Sequences Generation to Secure Wireless Body Sensor Networks , 2018, IEEE Transactions on Biomedical Engineering.

[20]  Hongyi Zhang,et al.  mixup: Beyond Empirical Risk Minimization , 2017, ICLR.

[21]  Yi Yang,et al.  Random Erasing Data Augmentation , 2017, AAAI.

[22]  Qi Shi,et al.  A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.

[23]  Yu Lasheng,et al.  Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection , 2018, IEEE Access.

[24]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.

[25]  Heikki Huttunen,et al.  Convolutional Recurrent Neural Networks for Polyphonic Sound Event Detection , 2017, IEEE/ACM Transactions on Audio, Speech, and Language Processing.

[26]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[27]  Bo Li,et al.  V-CNN: Data Visualizing based Convolutional Neural Network , 2018, 2018 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC).

[28]  Tanja Zseby,et al.  Analysis of network traffic features for anomaly detection , 2014, Machine Learning.

[29]  Yoshua Bengio,et al.  Gradient-based learning applied to document recognition , 1998, Proc. IEEE.

[30]  David Haussler,et al.  Occam's Razor , 1987, Inf. Process. Lett..

[31]  Yixian Yang,et al.  Building an Effective Intrusion Detection System Using the Modified Density Peak Clustering Algorithm and Deep Belief Networks , 2019, Applied Sciences.

[32]  Kehe Wu,et al.  A Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks , 2018, IEEE Access.

[33]  Rob Fergus,et al.  Visualizing and Understanding Convolutional Networks , 2013, ECCV.

[34]  Guang Yang,et al.  SaliencyGAN: Deep Learning Semisupervised Salient Object Detection in the Fog of IoT , 2020, IEEE Transactions on Industrial Informatics.

[35]  Huafeng Liu,et al.  Direct delineation of myocardial infarction without contrast agents using a joint motion feature learning architecture , 2018, Medical Image Anal..

[36]  Muhammad Munwar Iqbal,et al.  Enhanced Network Anomaly Detection Based on Deep Neural Networks , 2018, IEEE Access.

[37]  Michael R. Moore,et al.  Anomaly Detection of Cyber Physical Network Data Using 2D Images , 2019, 2019 IEEE International Conference on Consumer Electronics (ICCE).

[38]  Jürgen Schmidhuber,et al.  Long Short-Term Memory , 1997, Neural Computation.