• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Xin, Li Zhemin, Wei Juhui, Yang Yating, Wang Hongxia. Cross-Domain Adaptive Learning Model Based on Feature Separation[J]. Journal of Computer Research and Development, 2022, 59(1): 105-117. DOI: 10.7544/issn1000-1239.20200765
Citation: Li Xin, Li Zhemin, Wei Juhui, Yang Yating, Wang Hongxia. Cross-Domain Adaptive Learning Model Based on Feature Separation[J]. Journal of Computer Research and Development, 2022, 59(1): 105-117. DOI: 10.7544/issn1000-1239.20200765

Cross-Domain Adaptive Learning Model Based on Feature Separation

Funds: This work was supported by the National Natural Science Foundation of China (61977065) and the Key Research and Development Program of the Ministry of Science and Technology
More Information
  • Published Date: December 31, 2021
  • Cross-domain training tasks are currently an open challenge in the field of machine learning. At present, the latest researches are discussing the use of the cross-domain invariance of real features to predict unknown domain data, so as to achieve cross-domain generalization capabilities. But in fact, when it is known that the data comes from a certain domain, the comprehensive use of real features and false features will achieve better prediction results. This paper focuses on this issue and designs a learning model that is suitable for both cross-domain generalization and adaptation tasks(CDGA). The core of the model is still to separate the real features, so this paper proposes a new more stable training risk function, which not only has a higher test accuracy in the cross-domain generalization problem, but also overcomes the shortcomings of traditional methods that are easy to overfit, so it can be well embedded in the CDGA model. In addition, through the designed training method, the data expression part of the CDGA model can effectively separate the real features and false features, and the classifier part adaptively learns to select the generalized classifier or the classifier of the specific environment, thereby combining the application of false features to achieve efficient prediction in cross-domain tasks. Finally, it is tested on the constructed Colored MNIST data set, and the results are significantly better than the existing methods.
  • Related Articles

    [1]Bai Lifang, Zhu Yuefei, Li Yongjun, Wang Shuai, Yang Xiaoqi. Research Progress of Fully Homomorphic Encryption[J]. Journal of Computer Research and Development, 2024, 61(12): 3069-3087. DOI: 10.7544/issn1000-1239.202221052
    [2]Zhao Xiufeng, Fu Yu, Song Weitao. Circular Secure Homomorphic Encryption Scheme[J]. Journal of Computer Research and Development, 2020, 57(10): 2117-2124. DOI: 10.7544/issn1000-1239.2020.20200422
    [3]Wei Lifei, Chen Congcong, Zhang Lei, Li Mengsi, Chen Yujiao, Wang Qin. Security Issues and Privacy Preserving in Machine Learning[J]. Journal of Computer Research and Development, 2020, 57(10): 2066-2085. DOI: 10.7544/issn1000-1239.2020.20200426
    [4]Yao Hailong, Wang Caifen, Xu Qinbai, Li Wenting. A Distributed Biometric Authentication Protocol Based on Homomorphic Encryption[J]. Journal of Computer Research and Development, 2019, 56(11): 2375-2383. DOI: 10.7544/issn1000-1239.2019.20190293
    [5]Song Lei, Ma Chunguang, Duan Guanghan, Yuan Qi. Privacy-Preserving Logistic Regression on Vertically Partitioned Data[J]. Journal of Computer Research and Development, 2019, 56(10): 2243-2249. DOI: 10.7544/issn1000-1239.2019.20190414
    [6]Xu Wenyu, Wu Lei, Yan Yunxue. Privacy-Preserving Scheme of Electronic Health Records Based on Blockchain and Homomorphic Encryption[J]. Journal of Computer Research and Development, 2018, 55(10): 2233-2243. DOI: 10.7544/issn1000-1239.2018.20180438
    [7]Yang Xiaoyuan, Zhou Tanping, Zhang Wei, Wu Liqiang. Application of a Circular Secure Variant of LWE in the Homomorphic Encryption[J]. Journal of Computer Research and Development, 2015, 52(6): 1389-1393. DOI: 10.7544/issn1000-1239.2015.20131952
    [8]Li Shundong, Dou Jiawei, Wang Daoshun. Survey on Homomorphic Encryption and Its Applications to Cloud Security[J]. Journal of Computer Research and Development, 2015, 52(6): 1378-1388. DOI: 10.7544/issn1000-1239.2015.20131494
    [9]Liu Mingjie, Wang An. Fully Homomorphic Encryption and Its Applications[J]. Journal of Computer Research and Development, 2014, 51(12): 2593-2603. DOI: 10.7544/issn1000-1239.2014.20131168
    [10]Qiang Weizhong, Zou Deqing, and Jin Hai. Research on Privacy Preservation Mechanism for Credentials and Policies in Grid Computing Environment[J]. Journal of Computer Research and Development, 2007, 44(1): 11-19.
  • Cited by

    Periodical cited type(3)

    1. 吴树芳,尹凯,吴汭漩,朱杰. 融入隐式情感和主题增强分布的网络敏感信息深度识别研究. 情报科学. 2024(05): 111-119 .
    2. 王梓宁,张国防. 考虑多交互关系与情感倾向的微博用户可信度评估算法. 计算机应用研究. 2024(10): 3000-3007 .
    3. 吕飞,王帅. 城市空间网红化现象测度及影响因素研究. 城市问题. 2023(12): 50-59 .

    Other cited types(5)

Catalog

    Article views (623) PDF downloads (366) Cited by(8)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return