Computer Engineering and Applications ›› 2024, Vol. 60 ›› Issue (10): 140-147.DOI: 10.3778/j.issn.1002-8331.2301-0087
• Pattern Recognition and Artificial Intelligence • Previous Articles Next Articles
GAO Xiaoyu, ZHAO Xiaoyong, WANG Lei
Online:
2024-05-15
Published:
2024-05-15
高小玉,赵晓永,王磊
GAO Xiaoyu, ZHAO Xiaoyong, WANG Lei. Self-Supervised Tabular Data Anomaly Detection Method Based on Knowledge Enhancement[J]. Computer Engineering and Applications, 2024, 60(10): 140-147.
高小玉, 赵晓永, 王磊. 知识增强的自监督表格数据异常检测方法研究[J]. 计算机工程与应用, 2024, 60(10): 140-147.
[1] 赖英旭, 刘增辉, 蔡晓田, 等. 工业控制系统入侵检测研究综述[J]. 通信学报, 2017, 38(2): 143-156. LAI Y X, LIU Z H, CAI X T, et al. Research on instrusion detection of industrial control system[J]. Journal on Communications, 2017, 38(2): 143-156. [2] 刘斐. 面向网络欺诈行为发现的不确定数据离群点检测算法研究[D]. 长沙: 国防科学技术大学, 2016. LIU F. The research on uncertain outlier detection algorithm for internet fraud detection[D]. Changsha: National University of Defense Technology, 2016. [3] HYANG X, KHETAN A, CVIYKOVIC M, et al. TabTransformer: tabular data modeling using contextual embeddings[J]. arXiv:2012.06678, 2020. [4] 周志华. 基于分歧的半监督学习[J]. 自动化学报, 2013, 39(11): 1871-1878. ZHOU Z H. Disagreement-based semi-supervised learning[J]. Acta Automatica Sinica, 2013, 39 (11): 1871-1878. [5] 申栩林, 李超波, 李洪均. 人群密集度下GAN的视频异常行为检测进展[J]. 计算机工程与应用, 2022, 58(7): 21-30. SHEN X L, LI C B, LI H J. Overview on video abnormal behavior detection of GAN via human density[J]. Computer Engineering and Applications, 2022, 58(7): 21-30. [6] SYED T, MIRZA B. Self-supervision for tabular data by learning to predict additive Gaussian noise as pretext[J]. ACM Transactions on Knowledge Discovery from Data, 2021, 17(9): 122. [7] YOON J, ZHANG Y, JORDON J, et al. VIME: extending the success of self- and semi-supervised learning to tabular domain[C]//Advances in Neural Information Processing Systems 33, 2020: 11033-11043. [8] BERTHELOT D, CARLINI N, GOODFELLOW I, et al. MixMatch: a holistic approach to semi-supervised learning[C]//Advances in Neural Information Processing Systems 32, 2019: 5049-5059. [9] ZHANG H, CISSE M, DAUPHIN Y N, et al. mixup: beyond empirical risk minimization[J]. arXiv:1710.09412, 2017. [10] GRINSZTAJN L, OYALLON E, VAROQUAUX G. Why do tree-based models still outperform deep learning on tabular data?[J]. arXiv:2207.08815, 2022. [11] CHEN T, KORNBLITH S, NOROUZI M, et al. A simple framework for contrastive learning of visual representations[C]//Proceedings of the 37th International Conference on Machine Learning, 2020: 1597-1607. [12] VINCENT P, LAROCHELLE H, BENGIO Y, et al. Extracting and composing robust features with denoising autoencoders[C]//Proceedings of the 25th International Conference Machine Learning, Helsinki, Jun 5-9, 2008. [13] DONG H, CHENG Z, HE X, et al. Table pretraining: a survey on model architectures, pretraining objectives, and downstream tasks[J]. arXiv:2201.09745, 2022. [14] IIDA H, THAI D, MANJUNATHA V, et al. Tabbie: pretrained representations of tabular data[J]. arXiv:2105.02584, 2021. [15] WANG Z, SUN J. TransTab: learning transferable tabular transformers across tables[J]. arXiv:2205.09328, 2022. [16] YOU Z, CUI L, SHEN Y, et al. A unified model for multi-class anomaly detection[J]. arXiv:2206.03687, 2022. [17] LIU F T, TING K M, ZHOU Z H. Isolation-based anomaly detection[J]. ACM Transactions on Knowledge Discovery from Data, 2012, 6(1): 1-39. [18] CHEN T, GUESTRIN C. XGBoost: a scalable tree boosting system[C]//Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016: 785-794. [19] KE G, MENG Q, FINLEY T, et al. LightGBM: a highly efficient gradient boosting decision tree[C]//Advances in Neural Information Processing Systems 30, 2017: 3146-3154. [20] COLLIN A S, VLEESCHOUWER C D. Improved anomaly detection by training an autoencoder with skip connections on images corrupted with stain-shaped noise[J]. arXiv: 2008.12977, 2020. [21] KINGMA D P, WELLING M. Auto-encoding variational Bayes[C]//Proceedings of the 2nd International Conference on Learning Representations, 2014. [22] LIU W, LI R, ZHENG M, et al. Towards visually explaining variational autoencoders[C]//Proceedings of the 2020 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2020. [23] AKCAY S, ATAPOUR-ABARGHOUEI A, BRECKON T P. GANomaly: semi-supervised anomaly detection via adversarial training[C]//Proceedings of the 14th Asian Conference on Computer Vision, 2018: 622-637. [24] SHI Y, YANG J, QI Z Q. Unsupervised anomaly segmentation via deep feature reconstruction[J]. Neurocomputing, 2021, 424: 9-22. [25] XIA Y, ZHANG Y, LIU F, et al. Synthesize then compare: detecting failures and anomalies for semantic segmentation[C]//Proceedings of the 16th European Conference on Computer Vision. Cham: Springer, 2020. [26] GONG D, LIU L, LE V, et al. Memorizing normality to detect anomaly: memory-augmented deep autoencoder for unsupervised anomaly detection[C]//Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019. [27] PARK H, NOH J, HAM B. Learning memory-guided normality for anomaly detection[C]//Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020: 14372-14381. [28] DEHAENE D, FRIGO O, COMBREXELLE S, et al. Iterative energy-based projection on a normal data manifold for anomaly localization[J]. arXiv:2002.03734, 2020. [29] ARIK S O, PFISTER T. TabNet: attentive interpretable tabular learning[C]//Proceedings of the 35th AAAI Conference on Artificial Intelligence, 2021: 6679-6687. [30] BAHRI D, JIANG H, YI T, et al. SCARF: self-supervised contrastive learning using random feature corruption[J]. arXiv:2106.15147, 2021. [31] UCAR T, HAJIRAMEZANALI E, EDWARDS L. SubTab: subsetting features of tabular data for self-supervised representation learning[C]//Advances in Neural Information Processing Systems 34, 2021. [32] LIN X V, SOCHER R, XIONG C. Bridging textual and tabular data for cross-domain text-to-SQL semantic parsing[C]//Findings of the Association for Computational Linguistics: EMNLP 2020, 2020 : 4870-4888. [33] VASWANI A, SHAZEER N, PARMAR N, et al. Attention is all you need[C]//Proceeding of the 31st Conference on Neural Information Processing Systems,Long Beach, Dec 4- 9,2017. Cambridge:MIT Press, 2017: 5998-6008. [34] DENG X, SUN H, LEES A, et al. TURL: table understanding through representation learning[J]. SIGMOD Record, 2022, 51(1): 33-40. [35] WANG Z, DONG H, JIA R, et al. Tuta: tree-based transformers for generally structured table pre-training[C]//Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021: 1780-1790. [36] YIN P, NEU G, YIH W, et al. TaBERT: pretraining for joint understanding of textual and tabular data[J]. arXiv:2005. 08314, 2020. [37] HERZIG J, NOWAK P K, MVLLER T, et al. TaPas: weakly supervised table parsing via pre-training[J]. arXiv:2004. 02349, 2020. [38] GUO M, ZHANG Y, LIU T. Gaussian transformer: a lightweight approach for natural language inference[C]//Proceedings of the 33rd AAAI Conference on Artificial Intelligence, 2019: 6489-6496. [39] BENGIO Y, YAO L, ALAIN G, et al. Generalized denoising auto-encoders as generative models[C]//Advances in Neural Information Processing Systems 26, 2013. [40] GORISHNIY Y, RUBACHEV I, KHRULKOV V, et al. Revisiting deep learning models for tabular data[C]//Advances in Neural Information Processing Systems 34, 2021. [41] SOMEPALLI G, GOLDBLUN M, SCHWARZSCHILD A, et al. SAINT: improved neural networks for tabular data via row attention and contrastive pre-training[J]. arXiv:2106. 01342, 2021. |
[1] | ZHAO Jigui, QIAN Yurong, WANG Kui, HOU Shuxiang, CHEN Jiaying. Survey of Chinese Named Entity Recognition Research [J]. Computer Engineering and Applications, 2024, 60(1): 15-27. |
[2] | CHEN Jiangui, ZHANG Ruqing, GUO Jiafeng, FAN Yixing. Answer Selection Model for Multi-Stage Matching [J]. Computer Engineering and Applications, 2023, 59(3): 158-165. |
[3] | SHAO Yuying, CAO Lin, KANG Jun, SONG Peiran, DU Kangning, GUO Yanan. Face Sketch Recognition Method Based on Cross-Batch Memory Pre-Training [J]. Computer Engineering and Applications, 2023, 59(3): 175-183. |
[4] | WANG Yonggui, ZHAO Xiaoxuan. Self-Supervised Graph Neural Networks for Session-Based Recommendation [J]. Computer Engineering and Applications, 2023, 59(3): 244-252. |
[5] | CAI Tijian, LIU Wenxin, CHEN Fuchun, CHEN Jun, LUO Ciyong. Face Liveness Detection Algorithm Based on Metric Learning-Cross Batch Storage Mechanism [J]. Computer Engineering and Applications, 2023, 59(23): 183-190. |
[6] | GAO Bing, GU Zhaojun, ZHOU Jingxian, SUI He. Hybrid Sampling Method for Overlap Region of ICS Imbalanced Data [J]. Computer Engineering and Applications, 2023, 59(19): 305-315. |
[7] | WU Xu, BIAN Wenqiang, XIE Xiaqing, SUN Lijuan. Chinese Event Extraction by Machine Reading Comprehension [J]. Computer Engineering and Applications, 2023, 59(16): 93-100. |
[8] | FANG Yiqiu, PENG Yang, GE Junwei. Aspect-Level Sentiment Analysis Research Integrating Dependent Syntactic Prior Knowledge [J]. Computer Engineering and Applications, 2023, 59(12): 122-131. |
[9] | NIE Ting, XING Kai, LI Jingjuan. Text Classification Model Based on Statistical Causality and Optimal Transmission#br# [J]. Computer Engineering and Applications, 2023, 59(11): 119-130. |
[10] | SHEN Xulin, LI Chaobo, LI Hongjun. Overview on Video Abnormal Behavior Detection of GAN via Human Density [J]. Computer Engineering and Applications, 2022, 58(7): 21-30. |
[11] | ZHUANG Yuesheng, LIN Shanling, LIN Zhixian, ZHANG Yongai, GUO Tailiang. Study on Generative Adversarial Network for Data Anomaly Detection [J]. Computer Engineering and Applications, 2022, 58(4): 143-149. |
[12] | LIU Hualing, LIU Yaxin, XU Junyi, CHEN Shanghui, QIAO Liang. Research Progress in Application of Graph Anomaly Detection in Financial Anti-Fraud [J]. Computer Engineering and Applications, 2022, 58(22): 41-53. |
[13] | LUAN Xiaomei, LIU Enhai, WU Pengfei, ZHANG Jun. Weakly-Supervised Semantic Segmentation Method of Remote Sensing Images Based on Edge Enhancement [J]. Computer Engineering and Applications, 2022, 58(20): 188-196. |
[14] | ZHANG Yiyang, QIAN Yurong, TAO Wenbin, LENG Hongyong, LI Zichen, MA Mengnan. Survey of Attribute Graph Anomaly Detection Based on Deep Learning [J]. Computer Engineering and Applications, 2022, 58(19): 1-13. |
[15] | TANG Huanling, WANG Hui, WEI Hao, ZHAO Honglei, DOU Quansheng, LU Mingyu. BERT-LCRF Named Entity Recognition Method Oriented Clock Domain [J]. Computer Engineering and Applications, 2022, 58(18): 218-226. |
Viewed | ||||||||||||||||||||||||||||||||||||||||||||||
Full text 98
|
|
|||||||||||||||||||||||||||||||||||||||||||||
Abstract 86
|
|
|||||||||||||||||||||||||||||||||||||||||||||