Computing and Information Systems - Research Publications

Permanent URI for this collection

Search Results

Now showing 1 - 7 of 7
  • Item
    Thumbnail Image
    Summarizing Significant Changes in Network Traffic Using Contrast Pattern Mining
    Chavary, EA ; Erfani, SM ; Leckie, C (Association for Computing Machinery, 2017)
    Extracting knowledge from the massive volumes of network traffic is an important challenge in network and security management. In particular, network managers require concise reports about significant changes in their network traffic. While most existing techniques focus on summarizing a single traffic dataset, the problem of finding significant differences between multiple datasets is an open challenge. In this paper, we focus on finding important differences between network traffic datasets, and preparing a summarized and interpretable report for security managers. We propose the use of contrast pattern mining, which finds patterns whose support differs significantly from one dataset to another. We show that contrast patterns are highly effective at extracting meaningful changes in traffic data. We also propose several evaluation metrics that reflect the interpretability of patterns for security managers. Our experimental results show that with the proposed unsupervised approach, the vast majority of extracted patterns are pure, i.e., most changes are either attack traffic or normal traffic, but not a mixture of both.
  • Item
    Thumbnail Image
    Anomalous Behavior Detection in Crowded Scenes Using Clustering and Spatio-Temporal Features
    Yang, M ; Rajasegarar, S ; Rao, AS ; Leckie, C ; Palaniswami, M ; Shi, Z ; Vadera, S ; Li, G (Springer, 2016)
    important problem in real-life applications. Detection of anomalous behaviors such as people standing statically and loitering around a place are the focus of this paper. In order to detect anomalous events and objects, ViBe was used for background modeling and object detection at first. Then, a Kalman filter and Hungarian cost algorithm were implemented for tracking and generating trajectories of people. Next, spatio-temporal features were extracted and represented. Finally, hyperspherical clustering was used for anomaly detection in an unsupervised manner. We investigate three different approaches to extracting and representing spatio-temporal features, and we demonstrate the effectiveness of our proposed feature representation on a standard benchmark dataset and a real-life video surveillance environment.
  • Item
    Thumbnail Image
    Training Robust Models with Random Projection
    Nguyen, XV ; Monazam Erfani, S ; Paisitkriangkrai, S ; Bailey, J ; Leckie, C ; Ramamohanarao, K (IEEE, 2016)
    Regularization plays an important role in machine learning systems. We propose a novel methodology for model regularization using random projection. We demonstrate the technique on neural networks, since such models usually comprise a very large number of parameters, calling for strong regularizers. It has been shown recently that neural networks are sensitive to two kinds of samples: (i) adversarial samples, which are generated by imperceptible perturbations of previously correctly-classified samples - yet the network will misclassify them; and (ii) fooling samples, which are completely unrecognizable, yet the network will classify them with extremely high confidence. In this paper, we show how robust neural networks can be trained using random projection. We show that while random projection acts as a strong regularizer, boosting model accuracy similar to other regularizers, such as weight decay and dropout, it is far more robust to adversarial noise and fooling samples. We further show that random projection also helps to improve the robustness of traditional classifiers, such as Random Forrest and Gradient Boosting Machines.
  • Item
    Thumbnail Image
    A bi-ordering approach to linking gene expression with clinical annotations in gastric cancer
    Shi, F ; Leckie, C ; MacIntyre, G ; Haviv, I ; Boussioutas, A ; Kowalczyk, A (BMC, 2010-09-23)
    BACKGROUND: In the study of cancer genomics, gene expression microarrays, which measure thousands of genes in a single assay, provide abundant information for the investigation of interesting genes or biological pathways. However, in order to analyze the large number of noisy measurements in microarrays, effective and efficient bioinformatics techniques are needed to identify the associations between genes and relevant phenotypes. Moreover, systematic tests are needed to validate the statistical and biological significance of those discoveries. RESULTS: In this paper, we develop a robust and efficient method for exploratory analysis of microarray data, which produces a number of different orderings (rankings) of both genes and samples (reflecting correlation among those genes and samples). The core algorithm is closely related to biclustering, and so we first compare its performance with several existing biclustering algorithms on two real datasets - gastric cancer and lymphoma datasets. We then show on the gastric cancer data that the sample orderings generated by our method are highly statistically significant with respect to the histological classification of samples by using the Jonckheere trend test, while the gene modules are biologically significant with respect to biological processes (from the Gene Ontology). In particular, some of the gene modules associated with biclusters are closely linked to gastric cancer tumorigenesis reported in previous literature, while others are potentially novel discoveries. CONCLUSION: In conclusion, we have developed an effective and efficient method, Bi-Ordering Analysis, to detect informative patterns in gene expression microarrays by ranking genes and samples. In addition, a number of evaluation metrics were applied to assess both the statistical and biological significance of the resulting bi-orderings. The methodology was validated on gastric cancer and lymphoma datasets.
  • Item
    Thumbnail Image
    Clustering elliptical anomalies in sensor networks
    Bezdek, JC ; Havens, TC ; Keller, JM ; Leckie, C ; Park, L ; Palaniswami, M ; Rajasegarar, S (IEEE, 2010)
  • Item
    Thumbnail Image
    Combining real and virtual graphs to enhance data clustering
    Wang, L ; Leckie, C ; Kotagiri, R (IEEE, 2010-11-18)
  • Item
    Thumbnail Image
    iVAT and aVAT: Enhanced Visual Analysis for Cluster Tendency Assessment
    Wang, L ; Nguyen, UTV ; Bezdek, JC ; Leckie, CA ; Ramamohanarao, K ; Zaki, MJ ; Yu, JX ; Ravindran, B ; Pudi, V (SPRINGER-VERLAG BERLIN, 2010)