• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Jun, Wei Jinmao, Zhang Lu. Multi-Task Feature Learning Algorithm Based on Preserving Classification Information[J]. Journal of Computer Research and Development, 2017, 54(3): 537-548. DOI: 10.7544/issn1000-1239.2017.20150963
Citation: Wang Jun, Wei Jinmao, Zhang Lu. Multi-Task Feature Learning Algorithm Based on Preserving Classification Information[J]. Journal of Computer Research and Development, 2017, 54(3): 537-548. DOI: 10.7544/issn1000-1239.2017.20150963

Multi-Task Feature Learning Algorithm Based on Preserving Classification Information

More Information
  • Published Date: February 28, 2017
  • In pattern recognition, feature selection is an effective technique for dimension reduction. Feature evaluation criteria are utilized for assessing the importance of features. However, there are several shortcomings for currently available criteria. Firstly, these criteria commonly concentrate all along on class separability, whereas class correlation information is ignored in the selection process. Secondly, they are hardly capable of reducing feature redundancy specific to classification. And thirdly, they are often exploited in univariate measurement and unable to achieve global optimality for feature subset. In this work, we introduce a novel feature evaluation criterion called CIP (classification information preserving). CIP is on the basis of preserving classification information, and multi-task learning technology is adopted for formulating and realizing it. Furthermore, CIP is a feature subset selection method. It employs Frobenius norm for minimizing the difference of classification information between the selected feature subset and original data. Also l2,1 norm is used for constraining the number of the selected features. Then the optimal solution of CIP is achieved under the framework of the proximal alternating direction method. Both theoretical analysis and experimental results demonstrate that the optimal feature subset selected by CIP maximally preserves the original class correlation information. Also feature redundancy for classification is reduced effectively.
  • Related Articles

    [1]Du Ruizhong, Wang Yi, Li Mingyue. Dynamic Ciphertext Retrieval Scheme with Two-Way Verification[J]. Journal of Computer Research and Development, 2022, 59(11): 2635-2647. DOI: 10.7544/issn1000-1239.20210153
    [2]Guo Sixu, He Shen, Su Li, Zhang Xing, Zhou Fucai, Zhang Xinyue. Top-k Boolean Searchable Encryption Scheme Based on Multiple Keywords[J]. Journal of Computer Research and Development, 2022, 59(8): 1841-1852. DOI: 10.7544/issn1000-1239.20200605
    [3]Yan Xincheng, Chen Yue, Ba Yang, Jia Hongyong, Wang Zhonghui. Updatable Attribute-Based Encryption Scheme Supporting Dynamic Change of User Rights[J]. Journal of Computer Research and Development, 2020, 57(5): 1057-1069. DOI: 10.7544/issn1000-1239.2020.20190254
    [4]Liu Yining, Zhou Yuanjian, Lan Rushi, Tang Chunming. Blockchain-Based Verification Scheme for Deletion Operation in Cloud[J]. Journal of Computer Research and Development, 2018, 55(10): 2199-2207. DOI: 10.7544/issn1000-1239.2018.20180436
    [5]Wu Qiyu, Zhou Fucai, Wang Qiang, Li Yuxi. Publicly Verifiable Databases Scheme with Efficient Updates and Low Storage Overhead[J]. Journal of Computer Research and Development, 2018, 55(8): 1800-1808. DOI: 10.7544/issn1000-1239.2018.20170320
    [6]Bao Yibao, Yin Lihua, Fang Binxing, Guo Li. Logic-Based Dynamical Security Policy Language and Verification[J]. Journal of Computer Research and Development, 2013, 50(5): 932-941.
    [7]Liu Xiaozhu, Peng Zhiyong. On-Line Dynamic Index Hybrid Update Scheme Based on Self-Learning of Allocated Space[J]. Journal of Computer Research and Development, 2012, 49(10): 2118-2130.
    [8]Xiang Sen, Chen Yiyun, Lin Chunxiao, and Li Long. Safety Verification of Dynamic Storage Management in Coq[J]. Journal of Computer Research and Development, 2007, 44(2): 361-367.
    [9]Zhao Xin, Li Xiaojian, and Wu Wei. A Centralized Warrant Distributing and Updating Approach for Secure Multicast Group Control[J]. Journal of Computer Research and Development, 2006, 43(8): 1391-1397.
    [10]Li Guohui, Wang Hongya, Liu Yunsheng. Updates Dissemination in Mobile Real-Time Database Systems[J]. Journal of Computer Research and Development, 2005, 42(11): 2004-2009.

Catalog

    Article views (1478) PDF downloads (662) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return