Journal on Communications ›› 2016, Vol. 37 ›› Issue (11): 57-67.doi: 10.11959/j.issn.1000-436x.2016213
• academic paper • Previous Articles Next Articles
De-shan LIU,Yong-he CHU,De-qin YAN
Online:
2016-11-25
Published:
2016-11-30
Supported by:
De-shan LIU,Yong-he CHU,De-qin YAN. Regularized manifold information extreme learning machine[J]. Journal on Communications, 2016, 37(11): 57-67.
"
数据集 | λ=0 | λ=0.1 | λ=0.2 | λ=0.3 | λ=0.4 | λ=0.5 | λ=0.6 | λ=0.7 | λ= 0.8 | λ= 0.9 |
Yale | 71.33% | 60.00% | 74.00% | 74.67% | 76.67% | 70.67% | 70.67% | 69.33% | 62.67% | 64.67% |
ORL | 88.00% | 87.50% | 89.25% | 91.25% | 88.25% | 94.75% | 91.75% | 90.75% | 91.25% | 90.50% |
Yale B | 93.21% | 94.26% | 94.74% | 95.42% | 93.53% | 95.26% | 95.11% | 93.79% | 94.47% | 94.00% |
UMIST | 92.78% | 89.17% | 91.94% | 92.22% | 76.94% | 89.17% | 91.67% | 91.94% | 92.50% | 90.83% |
[1] | TANG J , DENG C , HUANG G B . Extreme learning machine for multilayer perception[J]. IEEE Transactions on Neural Networks and Learning Systems, 2015,(99):1-13. |
[2] | HUANG G B , ZHOU H M , DING X J , et al. Extreme learning machine for regression and multiclass classification[J]. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 2012,42(2):513-529. |
[3] | HUANG G B , CHEN L , SIEW C K . Universal approximation using incremental constructive feedforward networks with random hidden nodes[J]. IEEE Trans Neural Networks, 2006,17(4):879-892. |
[4] | ZHANG R , LAN Y , HUANG G B , et al. Universal approximation of extreme learning machine with adaptive growth of hidden nodes[J]. IEEE Trans Neural Networks Learn Systems, 2012,23(2):365-371. |
[5] | FERNáNDEZ-DELGADO M , CERNADAS E , BARRO S , et al. Direct kernel perceptron (DKP): ultra-fast kernel ELM-based classifi-cation with noniterative closed-form weight calculation[J]. Neural Networks, 2014,50:60-71. |
[6] | HUANG G , SONG S J . Semi-supervised and unsupervised extreme learning machines[J]. IEEE Transactions on Cybernetics, 2014,44(12):2405-2417. |
[7] | HUANG G B , ZHU Q Y , SIEW C K . Extreme learning machine:theory and applications[J]. Neurocomputing. 2006,70:489-501. |
[8] | VAPNIK V N . Statistical learning theory[J]. Encyclopedia of the Sciences of Learning, 2010,41(4):3185-3185. |
[9] | HUANG G B , ZHOU H M , DING X J , et al. Extreme learning ma-chine for regression and multiclass classification[J]. IEEE Transac-tions on Systems, Man, and Cybernetics, Part B: Cybernetics, 2012,42(2):513-529. |
[10] | WANG X Z , SHAO Q Y , MIAO Q , et al. Architecture selection for networks trained with extreme learning machine using localized gen-eralization error model[J]. Neurocomputing, 2013,102:3-9. |
[11] | ZHAO J W , WANG Z H , PARK D S . Online sequential extreme learning machine with forgetting mechanism[J]. Neurocomputing, 2012,87:79-89. |
[12] | RONG H J , HUANG G B , SUNDARARAJAN N , et al. Online se-quential fuzzy extreme learning machine for function approximation and classification problems[J]. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 2009,39(4):1067-1072. |
[13] | LIANG N Y , HUANG G B , SARATCHANDRAN P , et al. A fast and accurate online sequential learning algorithm for feedforward networks[J]. IEEE Transactions on Neural Networks, 2006,17(6):1411-1423. |
[14] | ZONG W W , HUANG G B , CHEN Y . Weighted extreme learning machine for imbalance learning[J]. Neurocomputing, 2013,101:229-242. |
[15] | YU Q , MICHE Y , EIROLA E , et al. Regularized extreme learning machine for regression with missing data[J]. Neurocomputing, 2013,102:45-51. |
[16] | MAN Z H , WANG D H , CAO Z W , et al. Robust single-hidden layer feedforward network-based pattern classifier[J]. IEEE Transactions on Neural Networks and Learning Systems, 2012,23(12):1974-1986. |
[17] | PENG Y , LU B L . Discriminative graph regularized extreme learning machine and its application to face recognition[J]. Neurocomputing, 2015,149:340-353. |
[18] | BELKIN M , NIYOGI P . Laplacian eigenmaps for dimensionality reduction and data representation[J]. Neural Computation, 2003,15(6):1373-1396. |
[19] | HE X , NIYOGI P . Locality preserving projections[J]. Advances in Neural Information Processing Systems, 2004,17:153-160. |
[20] | LI H , JIANG T , ZHANG K . Efficient robust feature extraction by maximum margin criterion[J]. Advances in Neural Information Proc-essing Systems, 2003,144:71-78 |
[21] | LIU S , FENG L , XIAO Y . Robust activation function and its applica-tion: semi-supervised kernel extreme learning method[J]. Neurocom-puting, 2014,144:318-328. |
[22] | HUANG G B . An insight into extreme learning machines: random neurons, random features and kernels[J]. Cognitive Computation, 2014,6:376-390. |
[23] | HINTON G E , OSINDERO S . A fast learning algorithm for deep belief nets[J]. Neural Computation, 2006,18(7):1527-1554. |
[1] | Qianyi DAI, Bin ZHANG, Song GUO, Kaiyong XU. Blockchain network layer anomaly traffic detection method based on multiple classifier integration [J]. Journal on Communications, 2023, 44(3): 66-80. |
[2] | Gaofeng HE, Qianfeng WEI, Xiancai XIAO, Haiting ZHU, Bingfeng XU. Confirmation method for the detection of malicious encrypted traffic with data privacy protection [J]. Journal on Communications, 2022, 43(2): 156-170. |
[3] | Zhibin FENG, Yuhua XU, Zhiyong DU, Xin LIU, Wen LI, Hao HAN, Xiaobo ZHANG. Active defense technology against intelligent jammer [J]. Journal on Communications, 2022, 43(10): 42-54. |
[4] | Yanhui LU, Han LIU, Hang LI, Guangxu ZHU. Time series generation model based on multi-discriminator generative adversarial network [J]. Journal on Communications, 2022, 43(10): 167-176. |
[5] | Kai MEI, Haitao ZHAO, Xiaoran LIU, Jun LIU, Jun XIONG, Baoquan REN, Jibo WEI. Efficient model-and-data based channel estimation algorithm [J]. Journal on Communications, 2022, 43(1): 59-70. |
[6] | Changgen PENG, Ting GAO, Huilan LIU, Hongfa DING. PCA-based membership inference attack for machine learning models [J]. Journal on Communications, 2022, 43(1): 149-160. |
[7] | Futai ZOU, Yue TAN, Lin WANG, Yongkang JIANG. Botnet detection based on generative adversarial network [J]. Journal on Communications, 2021, 42(7): 95-106. |
[8] | Liu LIU, Jianhua ZHANG, Yuanyuan FAN, Li YU, Jiachi ZHANG. Survey of application of machine learning in wireless channel modeling [J]. Journal on Communications, 2021, 42(2): 134-153. |
[9] | Yusun FU,Genke YANG. Application of artificial intelligence in mobile communication:challenge and practice [J]. Journal on Communications, 2020, 41(9): 190-201. |
[10] | Tieming CHEN,Chengqiang JIN,Mingqi LYU,Tiantian ZHU. Intelligent detection method on network malicious traffic based on sample enhancement [J]. Journal on Communications, 2020, 41(6): 128-138. |
[11] | Chunyu HAN,Yongzheng ZHANG,Yu ZHANG. Fast-flucos:malicious domain name detection method for Fast-flux based on DNS traffic [J]. Journal on Communications, 2020, 41(5): 37-47. |
[12] | Bonan YIN,Mugen PENG,Chenxi LIU. Analysis of UAV wireless network coverage and handover performance [J]. Journal on Communications, 2020, 41(11): 22-29. |
[13] | Taoyun ZHOU,Baowang LIAN,Dongdong YANG,Yi ZHANG,Chenglin CAI. Research on GPS geometry-based observational stochastic error model [J]. Journal on Communications, 2019, 40(9): 74-85. |
[14] | Xin ZHOU,Xiaoxin HE,Changwen ZHENG. Radio signal recognition based on image deep learning [J]. Journal on Communications, 2019, 40(7): 114-125. |
[15] | Xuehui DU,Yangdong LIN,Yi SUN. Malicious PDF document detection based on mixed feature [J]. Journal on Communications, 2019, 40(2): 118-128. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|