A Survey of artificial immune applications

The artificial immune system (AIS) community has been vibrant and active for a number of years now, producing a prolific amount of research ranging from modeling the natural immune system, to tackling real world applications, using an equally diverse set of immune inspired algorithms. We review the current immune applications of the AIS approach, and propose a number of suggestions to the AIS community that can be undertaken to help move the area forward. Despite many successes of AIS techniques, there remain some open issues which have to be addressed in order to make the AIS a real-world problem solving technique.

[1]  Hugues Bersini,et al.  The Immune Learning Mechanisms: Recruitment Reinforcement and their applications , 1993 .

[2]  Zhuhong Zhang,et al.  Immune optimization algorithm for constrained nonlinear multiobjective optimization problems , 2007, Appl. Soft Comput..

[3]  Leandro Nunes de Castro,et al.  ARTIFICIAL IMMUNE SYSTEMS: PART II - A SURVEY OF APPLICATIONS , 2000 .

[4]  Alan S. Perelson,et al.  The immune system, adaptation, and machine learning , 1986 .

[5]  P. Helman,et al.  A formal framework for positive and negative detection schemes , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[6]  Stephanie Forrest,et al.  Computer immunology , 1997, CACM.

[7]  Yoshiteru Ishida Immunity-Based Systems: A Design Perspective , 2010 .

[8]  Liangpei Zhang,et al.  An unsupervised artificial immune classifier for multi/hyperspectral remote sensing imagery , 2006, IEEE Trans. Geosci. Remote. Sens..

[9]  Jonathan Timmis,et al.  Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .

[10]  Leandro Nunes de Castro,et al.  The Clonal Selection Algorithm with Engineering Applications 1 , 2000 .

[11]  Stephanie Forrest,et al.  An immunological model of distributed detection and its application to computer security , 1999 .

[12]  Uwe Aickelin,et al.  Cooperative Automated Worm Response and Detection ImmuNe ALgorithm(CARDINAL) Inspired by T-Cell Immunity and Tolerance , 2005, ICARIS.

[13]  D. Wong,et al.  Negative Selection Algorithm for Aircraft Fault Detection , 2004, ICARIS.

[14]  Hugues Bersini,et al.  Immune Network and Adaptive Control , 1991 .

[15]  Peter Ross,et al.  Studies on the Implications of Shape-Space Models for Idiotypic Networks , 2004, ICARIS.

[16]  Simon M. Garrett,et al.  How Do We Evaluate Artificial Immune Systems? , 2005, Evolutionary Computation.

[17]  Henry Y. K. Lau,et al.  Immunity-based autonomous guided vehicles control , 2007, Appl. Soft Comput..

[18]  Julie Greensmith,et al.  Introducing Dendritic Cells as a Novel Immune-Inspired Algorith for Anomoly Detection , 2005 .

[19]  Jon Timmis,et al.  Once More Unto the Breach: Towards Artificial Homeostasis? , 2005 .

[20]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[21]  Jonathan Timmis,et al.  Artificial immune systems - a new computational intelligence paradigm , 2002 .

[22]  Claudia Eckert,et al.  An Investigation of R-Chunk Detector Generation on Higher Alphabets , 2004, GECCO.

[23]  Hyun-Kyo Jung,et al.  Niching genetic algorithm with restricted competition selection for multimodal function optimization , 1999 .

[24]  L. Segel,et al.  Design Principles for the Immune System and Other Distributed Autonomous Systems , 2001 .

[25]  Jonathan Timmis,et al.  Immune Inspired Somatic Contiguous Hypermutation for Function Optimisation , 2003, GECCO.

[26]  David E. Goldberg,et al.  Genetic Algorithms with Sharing for Multimodalfunction Optimization , 1987, ICGA.

[27]  Fabio A. González,et al.  Anomaly Detection Using Real-Valued Negative Selection , 2003, Genetic Programming and Evolvable Machines.

[28]  Guan-Chun Luh,et al.  An immunological approach to mobile robot reactive navigation , 2008, Appl. Soft Comput..

[29]  D. Dasgupta,et al.  Advances in artificial immune systems , 2006, IEEE Computational Intelligence Magazine.

[30]  Fernando José Von Zuben,et al.  Learning and optimization using the clonal selection principle , 2002, IEEE Trans. Evol. Comput..

[31]  G. Grimmett,et al.  Probability and random processes , 2002 .

[32]  Zulfiqur Ali,et al.  Chemical Sensors for Electronic Nose Systems , 2005 .

[33]  Jerne Nk Towards a network theory of the immune system. , 1974 .

[34]  Carlos A. Coello Coello,et al.  Convergence Analysis of a Multiobjective Artificial Immune System Algorithm , 2004, ICARIS.

[35]  Sadık Kara,et al.  Medical application of information gain-based artificial immune recognition system (IG-AIRS): Classification of microorganism species , 2009, Expert Syst. Appl..

[36]  Dipankar Dasgupta,et al.  Novelty detection in time series data using ideas from immunology , 1996 .

[37]  Alex Alves Freitas,et al.  Revisiting the Foundations of Artificial Immune Systems: A Problem-Oriented Perspective , 2003, ICARIS.

[38]  Jonatan Gómez,et al.  Self adaptation of operator rates for multimodal optimization , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[39]  Alex Alves Freitas,et al.  AISEC: an artificial immune system for e-mail classification , 2003, IEEE Congress on Evolutionary Computation.

[40]  Carlos A. Coello Coello,et al.  Handling Constraints in Global Optimization Using an Artificial Immune System , 2005, ICARIS.

[41]  Alex Alves Freitas,et al.  Revisiting the Foundations of Artificial Immune Systems for Data Mining , 2007, IEEE Transactions on Evolutionary Computation.

[42]  Jonathan Timmis,et al.  Exploiting Parallelism Inherent in AIRS, an Artificial Immune Classifier , 2004, ICARIS.

[43]  Jonathan Timmis,et al.  Application Areas of AIS: The Past, The Present and The Future , 2005, ICARIS.

[44]  Andrew Hone,et al.  Optima, Extrema, and Artificial Immune Systems , 2004, ICARIS.

[45]  Claudia Eckert,et al.  Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.

[46]  Alan S. Perelson,et al.  The Evolution of Emergent Organization in Immune System Gene Libraries , 1995, ICGA.

[47]  Jia Chen,et al.  Definition of Danger Signal in Artificial Immune System with Cloud Method , 2008, 2008 Fourth International Conference on Natural Computation.

[48]  F. Burnet The clonal selection theory of acquired immunity , 1959 .

[49]  Vincenzo Cutello,et al.  Exploring the Capability of Immune Algorithms: A Characterization of Hypermutation Operators , 2004, ICARIS.

[50]  Chou-Yuan Lee,et al.  An immunity-based ant colony optimization algorithm for solving weapon-target assignment problem , 2002, Appl. Soft Comput..

[51]  A. Pavlou,et al.  Recognition of anaerobic bacterial isolates in vitro using electronic nose technology , 2002, Letters in applied microbiology.

[52]  Stephanie Forrest,et al.  A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[53]  Jonathan Timmis,et al.  Inspiration for the Next Generation of Artificial Immune Systems , 2005, ICARIS.

[54]  Uwe Aickelin,et al.  Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.

[55]  Stephanie Forrest,et al.  Architecture for an Artificial Immune System , 2000, Evolutionary Computation.

[56]  D. Dasgupta,et al.  Immunity-based systems: a survey , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.

[57]  L.N. de Castro,et al.  An artificial immune network for multimodal function optimization , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[58]  Ralph R. Martin,et al.  A Sequential Niche Technique for Multimodal Function Optimization , 1993, Evolutionary Computation.

[59]  Peter Ross,et al.  A Role for Immunology in "Next Generation" Robot Controllers , 2003, ICARIS.

[60]  D. Dasgupta Artificial Immune Systems and Their Applications , 1998, Springer Berlin Heidelberg.

[61]  H. Abbass,et al.  aiNet : An Artificial Immune Network for Data Analysis , 2022 .

[62]  Jonathan Timmis,et al.  Artificial immune systems—today and tomorrow , 2007, Natural Computing.

[63]  Yoshiteru Ishida,et al.  Immunity-Based Systems , 2004, Advanced Information Processing.

[64]  Tao Li,et al.  An immunity based network security risk estimation , 2005, Science in China Series F: Information Sciences.

[65]  Guan-Chun Luh,et al.  An Immunological Approach to Mobile Robot Navigation , 2008 .