政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/145946
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文笔数/总笔数 : 114401/145431 (79%)
造访人次 : 53151878      在线人数 : 857
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    政大機構典藏 > 商學院 > 統計學系 > 學位論文 >  Item 140.119/145946


    请使用永久网址来引用或连结此文件: https://nccur.lib.nccu.edu.tw/handle/140.119/145946


    题名: 監督式異常偵測與孿生神經網路
    Supervised Anomaly Detection using Siamese Neural Network
    作者: 謝博丞
    Hsieh, Bo-Cheng
    贡献者: 周珮婷
    陳怡如

    Chou, Pei-Ting
    Chen, Yi-Ju

    謝博丞
    Hsieh, Bo-Cheng
    关键词: 異常偵測
    孿生神經網路
    機器學習
    監督式學習
    結構化資料
    Anomaly Detection
    Siamese Neural Network
    Machine Learning
    Supervised Learning
    Structured Data
    日期: 2023
    上传时间: 2023-07-06 17:05:40 (UTC+8)
    摘要: 孿生神經網路是一種基於度量的小樣本學習 (Few-Shot Learning), 其特殊的訓練方式與神經網路架構,於少量資料情境可有效進行特徵 提取,提升分類器的準確度。孿生神經網路在電腦視覺、自然語言處 理領域已被廣為使用作為非結構化資料的特徵提取方法,但鮮少有研 究將其應用於結構化資料,並與其他演算法進行比較。本研究利用孿 生神經網路與其他四種分類器以及重複採樣技術 SMOTE 組合,共 9 種演算法組合,對 5 筆資料進行監督式異常偵測,並測試異常比例對各種演算法的影響。研究結果發現孿生神經路於結構化資料表現優秀,且相對於其他演算法更不受資料異常比例影響。
    The Siamese neural network is a metric-based few-shot learning method that can effectively extract features from a small amount of data and improve classifier ac- curacy through its special training method and neural network architecture. While it has been widely used as a feature extraction method for unstructured data in com- puter vision and natural language processing, few studies have compared it with other algorithms in structured data applications. In this study, we combined nine algo- rithm combinations using a siamese neural network, four different classifiers, and SMOTE for supervised anomaly detection with 5 datasets. We also tested the effect of anomaly ratios on various algorithms. The results showed that the Siamese neural network performed well in structured data and was less affected by data anomalies than other algorithms.
    參考文獻: Belton, N., Lawlor, A., and Curran, K. M. (2021). Semi-supervised siamese network for identifying bad data in medical imaging datasets. arXiv preprint arXiv:2108.07130.
    Breiman, L. (2001). Random forests. Machine learning, 45:5–32.
    Breunig, M. M., Kriegel, H.-P., Ng, R. T., and Sander, J. (2000). Lof: identifying density- based local outliers. In Proceedings of the 2000 ACM SIGMOD international confer- ence on Management of data, pages 93–104.
    Bromley, J., Guyon, I., LeCun, Y., Säckinger, E., and Shah, R. (1993). Signature verifi- cation using a” siamese” time delay neural network. Advances in neural information processing systems, 6.
    Brümmer, N., Cumani, S., Glembek, O., Karafiát, M., Matějka, P., Pešán, J., Plchot, O., Soufifar, M., Villiers, E. d., and Černockỳ, J. H. (2012). Description and analysis of the brno276 system for lre2011. In Odyssey 2012-the speaker and language recognition workshop.
    Chandola, V., Banerjee, A., and Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3):1–58.
    Chawla, N. V., Bowyer, K. W., Hall, L. O., and Kegelmeyer, W. P. (2002). Smote: syn- thetic minority over-sampling technique. Journal of artificial intelligence research, 16:321–357.
    Cortes, C. and Vapnik, V. (1995). Support-vector networks. Machine learning, 20:273– 297. Cover, T. and Hart, P. (1967). Nearest neighbor pattern classification. IEEE transactions on information theory, 13(1):21–27.
    Durkota, K., Linda, M., Ludvik, M., and Tozicka, J. (2020). Neuron-net: Siamese network for anomaly detection. Technical report, Tech. Report in DCASE2020 Challenge Task 2.
    Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., and Bengio, Y. (2020). Generative adversarial networks. Communi- cations of the ACM, 63(11):139–144.
    Hadsell, R., Chopra, S., and LeCun, Y. (2006). Dimensionality reduction by learning an invariant mapping. In 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’06), volume 2, pages 1735–1742. IEEE.
    Han, S., Hu, X., Huang, H., Jiang, M., and Zhao, Y. (2022). Adbench: Anomaly detection benchmark. arXiv preprint arXiv:2206.09426.
    Hilal, W., Gadsden, S. A., and Yawney, J. (2022). Financial fraud:: A review of anomaly detection techniques and recent advances.
    Khatri, S., Arora, A., and Agrawal, A. P. (2020). Supervised machine learning algorithms for credit card fraud detection: a comparison. In 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence), pages 680–683. IEEE.
    Krizhevsky, A., Sutskever, I., and Hinton, G. E. (2017). Imagenet classification with deep convolutional neural networks. Communications of the ACM, 60(6):84–90.
    LeCun, Y., Bengio, Y., and Hinton, G. (2015). Deep learning. nature, 521(7553):436–444. LeNail, A. (2019). Nn-svg: Publication-ready neural network architecture schematics.
    Journal of Open Source Software, 4(33):747.
    Liu, F. T., Ting, K. M., and Zhou, Z.-H. (2008). Isolation forest. In 2008 eighth ieee international conference on data mining, pages 413–422. IEEE.
    Moustafa, N. and Slay, J. (2015). Unsw-nb15: a comprehensive data set for network intru- sion detection systems (unsw-nb15 network data set). In 2015 military communications and information systems conference (MilCIS), pages 1–6. IEEE.
    Olszewski, R. T. (2001). Generalized feature extraction for structural pattern recognition in time-series data. Carnegie Mellon University.
    Pang, G., Shen, C., and van den Hengel, A. (2019). Deep anomaly detection with devia- tion networks. In Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining, pages 353–362.
    Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., and Duchesnay, E. (2011). Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12:2825–2830.
    Scholkopf, B., Williamson, R., Smola, A., Shawe-Taylor, J., Platt, J., et al. (2000). Sup- port vector method for novelty detection. Advances in neural information processing systems, 12(3):582–588.
    Scott, A. J. and Knott, M. (1974). A cluster analysis method for grouping means in the analysis of variance. Biometrics, pages 507–512.
    Song, S. and Baek, J. G. (2020). New anomaly detection in semiconductor manufacturing process using oversampling method. In 12th International Conference on Agents and Artificial Intelligence, ICAART 2020, pages 926–932. SciTePress.
    Takimoto, H., Seki, J., F. Situju, S., and Kanagawa, A. (2022). Anomaly detection using siamese network with attention mechanism for few-shot learning. Applied Artificial Intelligence, 36(1):2094885.
    Tantithamthavorn, C., Hassan, A. E., and Matsumoto, K. (2018). The impact of class re- balancing techniques on the performance and interpretation of defect prediction models. IEEE Transactions on Software Engineering, 46(11):1200–1219.
    描述: 碩士
    國立政治大學
    統計學系
    110354023
    資料來源: http://thesis.lib.nccu.edu.tw/record/#G0110354023
    数据类型: thesis
    显示于类别:[統計學系] 學位論文

    文件中的档案:

    档案 描述 大小格式浏览次数
    402301.pdf5084KbAdobe PDF20检视/开启


    在政大典藏中所有的数据项都受到原著作权保护.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈