• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Ye Qiaolin, Zhao Chunxia, and Chen Xiaobo. A Feature Selection Method for TWSVM via a Regularization Technique[J]. Journal of Computer Research and Development, 2011, 48(6): 1029-1037.
Citation: Ye Qiaolin, Zhao Chunxia, and Chen Xiaobo. A Feature Selection Method for TWSVM via a Regularization Technique[J]. Journal of Computer Research and Development, 2011, 48(6): 1029-1037.

A Feature Selection Method for TWSVM via a Regularization Technique

More Information
  • Published Date: June 14, 2011
  • Twin support vector machine (TWSVM for short), as a variant of GEPSVM, is based on the idea of generalized support vector machine (GEPSVM), which determines two nonparallel planes by solving two related SVMtype problems, such that its computing cost in the training phase is 1/4 of standard SVM. In addition to keeping the superior characteristics of GEPSVM, classification performance of TWSVM significantly outperforms that of GEPSVM. However, the standalone method requires the solution of two smaller quadratic programming problems (QPPs) and there are few modifications of it that have been proposed to automatically select the input features. In this paper, through introducing a regularization term to the objective functions of TWSVM pair, the authors first propose a modification of TWSVM, called RTWSVM. Entirely different formulation from TWSVM, RTWSVM guarantees two QPPs are strong convex, implying that it can obtain the global but unique solution. Then, a feature selection method for RTWSVM is proposed, which is based on RTWSVM, and generates two planes directly from solving two sets of linear equations and requires no special optimization solvers. This method can obtain comparable classification performance to TWSVM, and have faster computational time, better suppression of input features and better ability to reduce the number of kernel functions.
  • Related Articles

    [1]Wu Jian, Fu Yinjin, Fang Yanmei, Liu Yao, Fu Wei, Cao Xiaochun, Xiao Nong. A Review on Encrypted Data Deduplication Attacks and Countermeasures in Cloud Storage[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440379
    [2]Li Haobo, Li Mohan, Chen Peng, Sun Yanbin, Tian Zhihong. A Corruption-resistant Data Identification Technology Based on Dataset Honeypoint[J]. Journal of Computer Research and Development, 2024, 61(10): 2417-2432. DOI: 10.7544/issn1000-1239.202440496
    [3]Kuang Boyu, Li Yuze, Gu Fangming, Su Mang, Fu Anmin. Review of Internet of Vehicle Security Research: Threats, Countermeasures, and Future Prospects[J]. Journal of Computer Research and Development, 2023, 60(10): 2304-2321. DOI: 10.7544/issn1000-1239.202330464
    [4]Wang Chong, Wei Shuai, Zhang Fan, Song Ke. A Survey of Cache-Based Side Channel Countermeasure[J]. Journal of Computer Research and Development, 2021, 58(4): 794-810. DOI: 10.7544/issn1000-1239.2021.20200500
    [5]Ji Zhong, Nie Linhong. Texture Image Classification with Noise-Tolerant Local Binary Pattern[J]. Journal of Computer Research and Development, 2016, 53(5): 1128-1135. DOI: 10.7544/issn1000-1239.2016.20148320
    [6]Wang Yonggang, Yan Hanbing, Xu Junfeng, Hu Jianbin, Chen Zhong. Research on Countermeasures Against Tag Spam[J]. Journal of Computer Research and Development, 2013, 50(10): 2029-2043.
    [7]Yue Daheng, Qi Shubo, Li Shaoqing, and Zhang Minxuan. A DPA Resistant Technology Based on Register Switching Time Randomization[J]. Journal of Computer Research and Development, 2012, 49(3): 491-498.
    [8]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. Quantitative Evaluation of the Cryptographic Block’s Resistibility to Power Analysis Attack at Different Design Level[J]. Journal of Computer Research and Development, 2009, 46(6): 940-947.
    [9]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. A DPA and HO-DPA Resistant Implementation of AES[J]. Journal of Computer Research and Development, 2009, 46(3): 377-383.
    [10]Zhao Jia, Zeng Xiaoyang, Han Jun, Wang Jing, and Chen Jun. VLSI Implementation of an AES Algorithm Resistant to Differential Power Analysis Attack[J]. Journal of Computer Research and Development, 2007, 44(3).

Catalog

    Article views (798) PDF downloads (878) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return