Journal of Computer Applications ›› 2024, Vol. 44 ›› Issue (4): 1107-1113.DOI: 10.11772/j.issn.1001-9081.2023050563
Special Issue: 人工智能
• Artificial intelligence • Previous Articles Next Articles
Received:
2023-05-10
Revised:
2023-07-17
Accepted:
2023-07-24
Online:
2023-08-01
Published:
2024-04-10
Contact:
Hua MENG
About author:
WANG Jie, born in 1997, M. S. candidate. Her research interests include topological data analysis,machine learning.Supported by:
通讯作者:
孟华
作者简介:
王杰(1997—),女,四川广元人,硕士研究生,主要研究方向:拓扑数据分析、机器学习基金资助:
CLC Number:
Jie WANG, Hua MENG. Image classification algorithm based on overall topological structure of point cloud[J]. Journal of Computer Applications, 2024, 44(4): 1107-1113.
王杰, 孟华. 基于点云整体拓扑结构的图像分类算法[J]. 《计算机应用》唯一官方网站, 2024, 44(4): 1107-1113.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2023050563
Fig. 1 Local convolutional feature distribution and global topological feature distribution of ninth type (ankle boot) in Fashion-MNIST data before and after disturbance
方法 | MNIST | Fashion-MNIST |
---|---|---|
CNN | 97.80 | 85.56 |
MCN(PCA) | 98.39 | 88.32 |
Mapper-P | 94.02 | 81.74 |
MCN(LDA) | 97.82 | 85.99 |
Mapper-L | 90.40 | 81.36 |
Tab. 1 Initial classification accuracy
方法 | MNIST | Fashion-MNIST |
---|---|---|
CNN | 97.80 | 85.56 |
MCN(PCA) | 98.39 | 88.32 |
Mapper-P | 94.02 | 81.74 |
MCN(LDA) | 97.82 | 85.99 |
Mapper-L | 90.40 | 81.36 |
1 | MIKA S, SCHÖLKOPF B, SMOLA A, et al. Kernel PCA and de-noising in feature spaces [C]// Proceedings of the 11th International Conference on Neural Information Processing Systems. Cambridge: MIT Press, 1998:536-542. |
2 | YANG J, FRANGI A F, YANG J-Y, et al. KPCA plus LDA: a complete kernel Fisher discriminant framework for feature extraction and recognition [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2005, 27(2): 230-244. 10.1109/tpami.2005.33 |
3 | RIFAI S, VINCENT P, MULLER X, et al. Contractive auto-encoders: explicit invariance during feature extraction[C]// Proceedings of the 28th International Conference on Machine Learning. Madison: Omnipress, 2011: 833-840. 10.1007/978-3-642-23783-6_41 |
4 | PHAM D, LE T. Auto-encoding variational Bayes for inferring topics and visualization[C]// Proceedings of the 28th International Conference on Computational Linguistics. London: International Committee on Computational Linguistics, 2020: 5223-5234. 10.18653/v1/2020.coling-main.458 |
5 | LeCUN Y, BOTTOU L, BENGIO Y, et al. Gradient-based learning applied to document recognition[J]. Proceedings of the IEEE, 1998, 86(11):2278-2324. 10.1109/5.726791 |
6 | LIU Y, YAO X. Optimisation and learning in neural network learning[C]// Proceedings of the 2003 IASTED International Conference on Modelling, Simulation and Optimization. Calgary, Canada: IASTED, 2003:167-172. |
7 | SZEGEDY C, ZAREMBA W, SUTSKEVER I, et al. Intriguing properties of neural networks[EB/OL]. [2023-05-01]. . |
8 | XU K, ZHANG G, LIU S, et al. Adversarial T-shirt! evading person detectors in a physical world[C]// Proceedings of the 16th European Conference on Computer Vision. Berlin: Springer, 2020: 665-681. 10.1007/978-3-030-58558-7_39 |
9 | JING P, TANG Q, DU Y, et al. Too good to be safe: tricking lane detection in autonomous driving with crafted perturbations[C]// Proceedings of 30th USENIX Security Symposium. Berkeley: USENIX Association, 2021: 3237-3254. |
10 | XIE C, WU Y, VAN DER MAATEN L, et al. Feature denoising for improving adversarial robustness[C]// Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2019:501-509. 10.1109/cvpr.2019.00059 |
11 | RONY J, HAFEMANN L G, OLIVEIRA L S, et al. Decoupling direction and norm for efficient gradient-based L2 adversarial attacks and defenses[C]// Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2019:4322-4330. 10.1109/cvpr.2019.00445 |
12 | CARLSSON G. Topological pattern recognition for point cloud data[J]. Acta Numerica, 2014, 23: 289-368. 10.1017/s0962492914000051 |
13 | NIELSON J L, PAQUETTE J, LIU A W, et al. Topological data analysis for discovery in preclinical spinal cord injury and traumatic brain injury[J]. Nature Communications, 2015, 6: 8581. 10.1038/ncomms9581 |
14 | SINGH G, MÉMOLI F, CARLSSON G E. Topological methods for the analysis of high dimensional data sets and 3D object recognition[C]// Proceedings of the 2007 Eurographics Symposium on Point-Based Graphics. Eindhoven, The Netherlands: Eurographics Association, 2007: 91-100. |
15 | LONGCOPE D W. Topological methods for the analysis of solar magnetic fields[J]. Living Reviews in Solar Physics, 2005, 2: 7. 10.12942/lrsp-2005-7 |
16 | ALMGREN K, KIM M, LEE J. Extracting knowledge from the geometric shape of social network data using topological data analysis[J]. Entropy, 2017, 19(7): 360. 10.3390/e19070360 |
17 | ROSSI-deVRIES J, PEDOIA V, SAMAAN M A, et al. Using multidimensional topological data analysis to identify traits of hip osteoarthritis[J]. Journal of Magnetic Resonance Imaging, 2018, 48(4): 1046-1058. 10.1002/jmri.26029 |
18 | CYRANKA J, GEORGES A, MEYER D. Mapper based classifier[C]// Proceedings of the 2019 18th IEEE International Conference on Machine Learning and Applications. Piscataway: IEEE, 2019: 1099-1106. 10.1109/icmla.2019.00184 |
19 | COHEN G, AFSHAR S, TAPSON J, et al. EMNIST: extending MNIST to handwritten letters[C]// Proceedings of the 2017 International Joint Conference on Neural Networks. Piscataway: IEEE, 2017: 2921-2926. 10.1109/ijcnn.2017.7966217 |
20 | TANG Y, CUI H, LIU S. Optimal design of deep residual network based on image classification of Fashion-MNIST dataset[J]. Journal of Physics Conference Series, 2020, 1624:052011. 10.1088/1742-6596/1624/5/052011 |
21 | PAPERNOT N, MCDANIEL P, WU X, et al. Distillation as a defense to adversarial perturbations against deep neural networks[C]// Proceedings of the 2016 IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 2016: 582-597. 10.1109/sp.2016.41 |
22 | TRAMÈR F, KURAKIN A, PAPERNOT N, et al. Ensemble adversarial training: attacks and defenses[C/OL]// Proceedings of the 2018 International Conference on Learning Representations. Rosten, VA:The Internet Society [2023-05-01]. . |
23 | GU S, RIGAZIO L. Towards deep neural network architectures robust to adversarial examples[C/OL]// Proceedings of the 2015 International Conference on Learning Representations [2023-05-01]. . |
24 | XU W, EVANS D, QI Y. Feature squeezing: detecting adversarial examples in deep neural networks[C/OL]// Proceedings of the 2018 Network and Distributed System Security Symposium. Rosten, VA:The Internet Society [2023-05-01]. . 10.14722/ndss.2018.23198 |
25 | BHATTACHARYA S, GHRIST R, KUMAR V. Persistent homology for path planning in uncertain environments[J]. IEEE Transactions on Robotics, 2017, 31(3): 578-590. 10.1109/TRO.2015.2412051 |
26 | DE SILVA V, GHRIST R. Coverage in sensor networks via persistent homology[J]. Algebraic & Geometric Topology, 2007, 7(1): 339-358. 10.2140/agt.2007.7.339 |
27 | EDELSBRUNNER H, LETSCHER D, ZOMORODIAN A. Topological persistence and simplification[J]. Discrete & Computational Geometry, 2002, 28(4):511-533. 10.1007/s00454-002-2885-2 |
28 | MILNOR J W, SPIVAK M, WELLS R, et al. Morse Theory[M]. Princeton: Princeton University Press, 1963:1-133. |
29 | NICOLAU M, LEVINE A J, CARLSSON G. Topology based data analysis identifies a subgroup of breast cancers with a unique mutational profile and excellent survival[J]. Proceedings of the National Academy of Sciences, 2011, 108(17): 7265-7270. 10.1073/pnas.1102826108 |
30 | LUM P Y, SINGH G, LEHMAN A, et al. Extracting insights from the shape of complex data using topology[J]. Scientific Reports, 2013, 3: 1236. 10.1038/srep01236 |
31 | 张德学. 一般拓扑学基础[M]. 北京:科学出版社, 2012:62-70. |
ZHANG D X. Fundamentals of General Topology[M]. Beijing: Science Press, 2012:62-70. | |
32 | HATCHER A. Algebraic Topology[M]. Cambridge: Cambridge University Press, 2002:754-756. |
33 | ZOMORODIAN A, CARLSSON G. Computing persistent homology[C]// Proceedings of the 20th Annual Symposium on Computational Geometry. New York: ACM, 2004: 347-356. 10.1145/997817.997870 |
34 | DONG Y, LIAO F, PANG T, et al. Boosting adversarial attacks with momentum[C]// Proceedings of the 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Washington, DC: IEEE Computer Society, 2018: 9185-9193. 10.1109/cvpr.2018.00957 |
[1] | Yun LI, Fuyou WANG, Peiguang JING, Su WANG, Ao XIAO. Uncertainty-based frame associated short video event detection method [J]. Journal of Computer Applications, 2024, 44(9): 2903-2910. |
[2] | Shunyong LI, Shiyi LI, Rui XU, Xingwang ZHAO. Incomplete multi-view clustering algorithm based on self-attention fusion [J]. Journal of Computer Applications, 2024, 44(9): 2696-2703. |
[3] | Hong CHEN, Bing QI, Haibo JIN, Cong WU, Li’ang ZHANG. Class-imbalanced traffic abnormal detection based on 1D-CNN and BiGRU [J]. Journal of Computer Applications, 2024, 44(8): 2493-2499. |
[4] | Dongwei WANG, Baichen LIU, Zhi HAN, Yanmei WANG, Yandong TANG. Deep network compression method based on low-rank decomposition and vector quantization [J]. Journal of Computer Applications, 2024, 44(7): 1987-1994. |
[5] | Yangyi GAO, Tao LEI, Xiaogang DU, Suiyong LI, Yingbo WANG, Chongdan MIN. Crowd counting and locating method based on pixel distance map and four-dimensional dynamic convolutional network [J]. Journal of Computer Applications, 2024, 44(7): 2233-2242. |
[6] | Yao DONG, Yixue FU, Yongfeng DONG, Jin SHI, Chen CHEN. Survey of incomplete multi-view clustering [J]. Journal of Computer Applications, 2024, 44(6): 1673-1682. |
[7] | Mengyuan HUANG, Kan CHANG, Mingyang LING, Xinjie WEI, Tuanfa QIN. Progressive enhancement algorithm for low-light images based on layer guidance [J]. Journal of Computer Applications, 2024, 44(6): 1911-1919. |
[8] | Jianjing LI, Guanfeng LI, Feizhou QIN, Weijun LI. Multi-relation approximate reasoning model based on uncertain knowledge graph embedding [J]. Journal of Computer Applications, 2024, 44(6): 1751-1759. |
[9] | Wenshuo GAO, Xiaoyun CHEN. Point cloud classification network based on node structure [J]. Journal of Computer Applications, 2024, 44(5): 1471-1478. |
[10] | Min SUN, Qian CHENG, Xining DING. CBAM-CGRU-SVM based malware detection method for Android [J]. Journal of Computer Applications, 2024, 44(5): 1539-1545. |
[11] | Tianhua CHEN, Jiaxuan ZHU, Jie YIN. Bird recognition algorithm based on attention mechanism [J]. Journal of Computer Applications, 2024, 44(4): 1114-1120. |
[12] | Lijun XU, Hui LI, Zuyang LIU, Kansong CHEN, Weixuan MA. 3D-GA-Unet: MRI image segmentation algorithm for glioma based on 3D-Ghost CNN [J]. Journal of Computer Applications, 2024, 44(4): 1294-1302. |
[13] | Ruifeng HOU, Pengcheng ZHANG, Liyuan ZHANG, Zhiguo GUI, Yi LIU, Haowen ZHANG, Shubin WANG. Iterative denoising network based on total variation regular term expansion [J]. Journal of Computer Applications, 2024, 44(3): 916-921. |
[14] | Xinye LI, Yening HOU, Yinghui KONG, Zhiqi YAN. Few-shot object detection combining feature fusion and enhanced attention [J]. Journal of Computer Applications, 2024, 44(3): 745-751. |
[15] | Yongfeng DONG, Jiaming BAI, Liqin WANG, Xu WANG. Chinese named entity recognition combining prior knowledge and glyph features [J]. Journal of Computer Applications, 2024, 44(3): 702-708. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||