• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Fan Ye, Peng Shujuan, Liu Xin, Cui Zhen, Wang Nannan. Cross-Modal Anomaly Detection via Hierarchical Deep Networks and Bi-Quintuple Loss[J]. Journal of Computer Research and Development, 2022, 59(12): 2770-2780. DOI: 10.7544/issn1000-1239.20210729
Citation: Fan Ye, Peng Shujuan, Liu Xin, Cui Zhen, Wang Nannan. Cross-Modal Anomaly Detection via Hierarchical Deep Networks and Bi-Quintuple Loss[J]. Journal of Computer Research and Development, 2022, 59(12): 2770-2780. DOI: 10.7544/issn1000-1239.20210729

Cross-Modal Anomaly Detection via Hierarchical Deep Networks and Bi-Quintuple Loss

Funds: This work was supported by the Open Research Projects of Zhejiang Lab (2021KH0AB01), the National Natural Science Foundation of China (61673185, 61922066, 62072244), the Natural Science Foundation of Fujian Province (2020J01083, 2020J01084), and the Open Research Projects of Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education (JYB202102).
More Information
  • Published Date: November 30, 2022
  • Cross-modal anomaly detection in big data environment is a very valuable and challenging work. Existing cross-modal anomaly detection framework often suffers from the incomplete data anomaly detection and low data utilization problems. To alleviate these concerns, an efficient cross-modal anomaly detection framework is proposed via hierarchical deep networks and similarity based bi-quintuple loss. First, the proposed framework introduces a single-view anomaly detection network to detect the attribute anomaly and part of class-attribute anomaly in data samples. Then, the similarity bi-quintuple loss, integrated with double-branch deep networks, is efficiently developed to detect the class anomaly and the remaining part class-attribute anomaly in data samples. Meanwhile, this loss regularizes the different attribute data with orthogonal property, and ensures the linear correlation between the same attribute data, enlarges the feature difference between different attribute data and increases the feature correlation between the same attribute data. Meanwhile, the bidirectional constraint and neighborhood constraint can significantly improve the data utilization and the generalization ability of the model. Extensive experimental results show that the proposed framework is able to detect possible abnormal sample points in different modalities, and outperforms the state-of-the-art corresponding methods, with obvious advantages.
  • Related Articles

    [1]Lai Baoqiang, Li Zheng, Zhao Ruilian, Guo Junxia. Context-Aware Based API Recommendation with Diversity[J]. Journal of Computer Research and Development, 2023, 60(10): 2335-2347. DOI: 10.7544/issn1000-1239.202220317
    [2]Tang Dan, Cai Hongliang, Geng Wei. Decoding Method of Reed-Solomon Erasure Codes[J]. Journal of Computer Research and Development, 2022, 59(3): 582-596. DOI: 10.7544/issn1000-1239.20210575
    [3]Zhang Bing, Wen Zheng, Wei Xiaoyu, Ren Jiadong. InterDroid: An Interpretable Android Malware Detection Method for Conceptual Drift[J]. Journal of Computer Research and Development, 2021, 58(11): 2456-2474. DOI: 10.7544/issn1000-1239.2021.20210560
    [4]Yang Wang, Gao Mingzhe, Jiang Ting. A Malicious Code Static Detection Framework Based on Multi-Feature Ensemble Learning[J]. Journal of Computer Research and Development, 2021, 58(5): 1021-1034. DOI: 10.7544/issn1000-1239.2021.20200912
    [5]Guo Jinyang, Shao Chuanming, Wang Jing, Li Chao, Zhu Haojin, Guo Minyi. Programming and Developing Environment for FPGA Graph Processing: Survey and Exploration[J]. Journal of Computer Research and Development, 2020, 57(6): 1164-1178. DOI: 10.7544/issn1000-1239.2020.20200106
    [6]Zheng Zhen, Zhai Jidong, Li Yan, Chen Wenguang. Workload Analysis for Typical GPU Programs Using CUPTI Interface[J]. Journal of Computer Research and Development, 2016, 53(6): 1249-1262. DOI: 10.7544/issn1000-1239.2016.20148354
    [7]Jiao Sibei, Ying Lingyun, Yang Yi, Cheng Yao, Su Purui, and Feng Dengguo. An Anti-Obfuscation Method for Detecting Similarity Among Android Applications in Large Scale[J]. Journal of Computer Research and Development, 2014, 51(7): 1446-1457.
    [8]Dong Longming, Wang Ji, Chen Liqian, Dong Wei. Memory Leak Detection for Heap-Manipulating Programs Based on Local Heap Abstraction[J]. Journal of Computer Research and Development, 2012, 49(9): 1832-1842.
    [9]Ma Peijun, Wang Tiantian, and Su Xiaohong. Automatic Grading of Student Programs Based on Program Understanding[J]. Journal of Computer Research and Development, 2009, 46(7): 1136-1142.
    [10]Wang Zhaofei and Huang Chun. Static Detection of Deadlocks in OpenMP Fortran Programs[J]. Journal of Computer Research and Development, 2007, 44(3).
  • Cited by

    Periodical cited type(1)

    1. 郭龙,梁灿,李彦丽. 知识库中标注词句序列命名实体识别方法. 计算机仿真. 2024(11): 512-516 .

    Other cited types(2)

Catalog

    Article views PDF downloads Cited by(3)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return