• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Fan Ye, Peng Shujuan, Liu Xin, Cui Zhen, Wang Nannan. Cross-Modal Anomaly Detection via Hierarchical Deep Networks and Bi-Quintuple Loss[J]. Journal of Computer Research and Development, 2022, 59(12): 2770-2780. DOI: 10.7544/issn1000-1239.20210729
Citation: Fan Ye, Peng Shujuan, Liu Xin, Cui Zhen, Wang Nannan. Cross-Modal Anomaly Detection via Hierarchical Deep Networks and Bi-Quintuple Loss[J]. Journal of Computer Research and Development, 2022, 59(12): 2770-2780. DOI: 10.7544/issn1000-1239.20210729

Cross-Modal Anomaly Detection via Hierarchical Deep Networks and Bi-Quintuple Loss

Funds: This work was supported by the Open Research Projects of Zhejiang Lab (2021KH0AB01), the National Natural Science Foundation of China (61673185, 61922066, 62072244), the Natural Science Foundation of Fujian Province (2020J01083, 2020J01084), and the Open Research Projects of Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education (JYB202102).
More Information
  • Published Date: November 30, 2022
  • Cross-modal anomaly detection in big data environment is a very valuable and challenging work. Existing cross-modal anomaly detection framework often suffers from the incomplete data anomaly detection and low data utilization problems. To alleviate these concerns, an efficient cross-modal anomaly detection framework is proposed via hierarchical deep networks and similarity based bi-quintuple loss. First, the proposed framework introduces a single-view anomaly detection network to detect the attribute anomaly and part of class-attribute anomaly in data samples. Then, the similarity bi-quintuple loss, integrated with double-branch deep networks, is efficiently developed to detect the class anomaly and the remaining part class-attribute anomaly in data samples. Meanwhile, this loss regularizes the different attribute data with orthogonal property, and ensures the linear correlation between the same attribute data, enlarges the feature difference between different attribute data and increases the feature correlation between the same attribute data. Meanwhile, the bidirectional constraint and neighborhood constraint can significantly improve the data utilization and the generalization ability of the model. Extensive experimental results show that the proposed framework is able to detect possible abnormal sample points in different modalities, and outperforms the state-of-the-art corresponding methods, with obvious advantages.
  • Related Articles

    [1]Yin Yuyu, Wu Guangqiang, Li Youhuizi, Wang Xinyu, Gao Honghao. A Machine Unlearning Method via Feature Constraint and Adaptive Loss Balance[J]. Journal of Computer Research and Development, 2024, 61(10): 2649-2661. DOI: 10.7544/issn1000-1239.202440476
    [2]Liu Xin, Wang Rui, Zhong Bineng, Wang Nannan. Cross Face-Voice Matching via Double-Stream Networks and Bi-Quintuple Loss[J]. Journal of Computer Research and Development, 2022, 59(3): 694-705. DOI: 10.7544/issn1000-1239.20200547
    [3]Du Ming, Yang Yun, Zhou Junfeng, Chen Ziyang, Yang Anping. Efficient Methods for Label-Constraint Reachability Query[J]. Journal of Computer Research and Development, 2020, 57(9): 1949-1960. DOI: 10.7544/issn1000-1239.2020.20190569
    [4]Yang Xue, Dong Hongbin, Teng Xuyang. Budget Constraint Auction Mechanism for Online Video Advertisement[J]. Journal of Computer Research and Development, 2017, 54(2): 415-427. DOI: 10.7544/issn1000-1239.2017.20160491
    [5]Zheng Jianwei, Yang Ping, Wang Wanliang, Bai Cong. Kernel Sparse Representation Classification with Group Weighted Constraints[J]. Journal of Computer Research and Development, 2016, 53(11): 2567-2582. DOI: 10.7544/issn1000-1239.2016.20150743
    [6]Wang Ruiwei, Li Zhanshan, Li Hongbo. Optimizing eSTR Algorithm for Solving Constraint Satisfaction Problems[J]. Journal of Computer Research and Development, 2016, 53(7): 1586-1595. DOI: 10.7544/issn1000-1239.2016.20150284
    [7]Li Zhanshan, Zhang Qian, Zhang Liang. Constraint Solving Based on the Number of Instantiation[J]. Journal of Computer Research and Development, 2015, 52(5): 1091-1097. DOI: 10.7544/issn1000-1239.2015.20131588
    [8]Li Xiaoling, Guo Changguo, Li Xiaoyong, Wang Huaimin. A Constraint Optimization Based Mapping Method for Virtual Network[J]. Journal of Computer Research and Development, 2012, 49(8): 1601-1610.
    [9]Xia Yimin, Luo Jun, and Zhang Minxuan. Detecting Out-of-Bounds Accesses with Conditional Range Constraint[J]. Journal of Computer Research and Development, 2006, 43(10): 1760-1766.
    [10]Cai Zhiping, Yin Jianping, Liu Xianghui, Liu Fang, and Lü Shaohe. A Distributed Network Monitoring Model with Link Constraint[J]. Journal of Computer Research and Development, 2006, 43(4): 601-606.

Catalog

    Article views (183) PDF downloads (93) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return