Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Feature selection algorithm for imbalanced data based on pseudo-label consistency
Yiheng LI, Chenxi DU, Yanyan YANG, Xiangyu LI
Journal of Computer Applications    2022, 42 (2): 475-484.   DOI: 10.11772/j.issn.1001-9081.2021050957
Abstract396)   HTML22)    PDF (921KB)(115)       Save

Aiming at the problem that most algorithms of granular computing ignore the class-imbalance of data, a feature selection algorithm integrating pseudo-label strategy was proposed to deal with class-imbalanced data. Firstly, to investigate feature selection from class-imbalanced data conveniently, the sample consistency and dataset consistency were re-defined, and the corresponding greedy forward search algorithm for feature selection was designed. Then, the pseudo-label strategy was introduced to balance the class distribution of the data. By integrating the learned pseudo-label of a sample into consistency measure, the pseudo-label consistency was defined to estimate the features of the class-imbalanced dataset. Finally, an algorithm for Pseudo-Label Consistency based Feature Selection (PLCFS) for class-imbalanced data was developed based on the preservation of the pseudo-label consistency measure for the class-imbalanced dataset. Experimental results indicate that the proposed PLCFS has the performance only lower than max-Relevancy and Min-Redundancy (mRMR) algorithm, but outperforms Relief algorithm and algorithm for Consistency-based Feature Selection (CFS).

Table and Figures | Reference | Related Articles | Metrics
Preventing location disclosure attacks through generating dummy trajectories
Xiangyu LIU, Jinmei CHEN, Xiufeng XIA, Manish Singh, Chuanyu ZONG, Rui ZHU
Journal of Computer Applications    2020, 40 (2): 479-485.   DOI: 10.11772/j.issn.1001-9081.2019081612
Abstract315)   HTML1)    PDF (836KB)(285)       Save

In order to solve the problem of trajectory privacy leakage caused by the collection of numerous trajectory information of moving objects, a dummy trajectory-based trajectory privacy protection algorithm was proposed. In this algorithm, considering the user’s locations under disclosure, a heuristic rule was designed based on the comprehensive measure of trajectory similarity and location diversity to select the dummy trajectories, so that the generated dummy trajectories were able to effectively hide the real trajectory and sensitive locations. Besides, the trajectory directed graph strategy and the grid-based map strategy were proposed to optimize the execution efficiency of the algorithm. Experimental results on real trajectory datasets demonstrate that the proposed algorithm can effectively protect the real trajectory with high data utility.

Table and Figures | Reference | Related Articles | Metrics