• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Cheng Yusheng, Zhang Lulu, Wang Yibin, Pei Gensheng. Label-Specific Features Learning for Feature-Specific Labels Association Mining[J]. Journal of Computer Research and Development, 2021, 58(1): 34-47. DOI: 10.7544/issn1000-1239.2021.20190674
Citation: Cheng Yusheng, Zhang Lulu, Wang Yibin, Pei Gensheng. Label-Specific Features Learning for Feature-Specific Labels Association Mining[J]. Journal of Computer Research and Development, 2021, 58(1): 34-47. DOI: 10.7544/issn1000-1239.2021.20190674

Label-Specific Features Learning for Feature-Specific Labels Association Mining

Funds: This work was supported by the General Program of the National Natural Science Foundation of China(61702012) and the Fund of Key Laboratory of Intelligent Computing & Signal Processing(Anhui University), Ministry of Education (2020A003).
More Information
  • Published Date: December 31, 2020
  • In multi-label learning, a label may be determined by its own set of unique features only, which are called label-specific features. Using label-specific features in multi-label classification can effectively avoid some useless features affecting the performance of the constructed classification model. However, existing label-specific features methods only extract important features from the label’s perspective, while ignoring extracting important labels from the feature’s perspective. In fact, it’s easier to extract the unique features for labels by focusing on certain labels from the feature’s perspective. Based on this, a novel label-specific features learning algorithm for multi-label classification is proposed. It combines the label’s important features with the feature’s important labels. Firstly, in order to ensure the efficiency and accuracy of the model, the extreme learning machine is used to construct the joint learning model. Subsequently, the elastic network regularization theory is applied to the extreme learning machine’s loss function, and the mutual information theory is used to construct the correlation matrix of feature-specific labels as the L\-2 regularization term, and the label-specific features are extracted by the L\-1 regularization term. The learning model improves the deficiencies of label-specific features and the adaptability of the extreme learning machine in multi-label learning. Compared with several state-of-the-art algorithms on several benchmark multi-label datasets, the experimental results show the rationality and effectiveness of the proposed model.
  • Related Articles

    [1]Li Yuxi, Chen Jingjing, Zhuo Fucai, Xu Jian, Ji Dong. Verifiable Boolean Searchable Encryption Based on Blockchain Index[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440501
    [2]Huang Zhenjie, Lin Zhiwei. Efficient and Secure Attribute-Based Signatures for General Circuits[J]. Journal of Computer Research and Development, 2023, 60(2): 351-361. DOI: 10.7544/issn1000-1239.202110920
    [3]Xu Qian, Tan Chengxiang, Feng Jun, Fan Zhijie, Zhu Wenye. Lattice-Based Forward Secure and Certificateless Signature Scheme[J]. Journal of Computer Research and Development, 2017, 54(7): 1510-1524. DOI: 10.7544/issn1000-1239.2017.20160427
    [4]Chen Ming, Yuan Shaoliang. Provably Secure Identity-Based Multi-Proxy Signature Scheme in Standard Model[J]. Journal of Computer Research and Development, 2016, 53(8): 1879-1892. DOI: 10.7544/issn1000-1239.2016.20150197
    [5]Gu Ke, Jia Weijia, Li Chaoliang, Chen Rongyuan. Identity-Based Group Proxy Signature Scheme in the Standard Model[J]. Journal of Computer Research and Development, 2013, 50(7): 1370-1386.
    [6]Gu Ke, Jia Weijia, Jiang Chunlin. A Group Proxy Signature Scheme Based on Sub-Secret Evolution[J]. Journal of Computer Research and Development, 2012, 49(5): 962-973.
    [7]Wang Feng, Zhou Yousheng, Gu Lize, Yang Yixian. A Multi-Policies Threshold Signature Scheme with Group Verifiability[J]. Journal of Computer Research and Development, 2012, 49(3): 499-505.
    [8]Yu Jia, Kong Fanyu, Hao Rong, Li Daxing. A Note on a Forward Secure Threshold Signature Scheme from Bilinear Pairing[J]. Journal of Computer Research and Development, 2010, 47(4): 605-612.
    [9]Wei Lingbo, Wu Chuankun, Zhou Sujing. A New Verifier-Local Revocation Group Signature with Backward Unlinkability[J]. Journal of Computer Research and Development, 2008, 45(8): 1315-1321.
    [10]Zhong Jun and He Dake. A Kind of Group Signature Scheme with Authorization[J]. Journal of Computer Research and Development, 2007, 44(5): 748-755.
  • Cited by

    Periodical cited type(2)

    1. 武永强,刘正刚. 基于决策树的工业通信网全链路数据异常检测方法. 电子设计工程. 2024(09): 138-141+146 .
    2. 樊娜,李思瑞,邹小敏,高艺丰. 面向VNDN的兴趣包洪泛攻击检测. 计算机系统应用. 2022(12): 41-50 .

    Other cited types(6)

Catalog

    Article views (793) PDF downloads (476) Cited by(8)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return