Computer Science ›› 2022, Vol. 49 ›› Issue (6A): 790-794.doi: 10.11896/jsjkx.210800032
• Interdiscipline & Application • Previous Articles Next Articles
QUE Hua-kun1, FENG Xiao-feng1, LIU Pan-long2, GUO Wen-chong1, LI Jian1, ZENG Wei-liang2, FAN Jing-min2
CLC Number:
[1] TIAN L,XIANG M.Abnormal Power Consumption Analysis Based on Density-based Spatial Clustering of Applications with Noise in Power Systems[J].Automation of Electric Power Systems,2017,41(5):64-70. [2] WANG G L,ZHOU G L,ZHAO H S,et al.Fast Clustering and Anomaly Detection Technique for Large-scale Power Data Stream[J].Automation of Electric Power Systems,2016,40(24):27-33. [3] FAHIM M,SILLITTI A.Analyzing Load Profiles of EnergyConsumption to Infer.Household Characteristics Using Smart Meters[J].Energies,2019,12:169-173. [4] LEANDRO A P J,CAIO C O R,RODRIGUES D,et al.Unsupervised non-technical losses identification through optimum-path forest[J].Electric Power Systems Research,2016,140:413-423. [5] ZANETTI,M,JAMHOUR E,PELLENZ M,et al.A tunable fraud detection system for advanced metering infrastructure using short-lived patterns[J].IEEE Transactions on Smart grid,2019,10(1):830-840. [6] MUNIZ C,FIGUEIREDO K,VELLASCO M,et al.Irregularity detection on low tension electric installations by neural network ensembles[C]//2009 International Joint Conference on Neural Networks.IEEE,2016:2176-2182. [7] COSTA B C,LA ALBERTO B,PORTELA A,et al.Fraud detection in electric power distribution networks using an ann-based knowledge-discovery process[J].International Journal of Artificial Intelligence & Applications,2019,4(6):17. [8] LIN J N,CHENG Z H,LIN B X.Study on identification method of stolen electricity based on MEA-BP[J].Electronic Design Engineering,2021,29(11):175-180. [9] SPIRI'C J V,STANKOVI'C S S,BDOˇCI'C M,et al.Using the rough set theoryto detect fraud committed by electricity custo-mers[J].International Journal of ElectricalPower & Energy Systems,2014,62(1):727-734. [10] YANG X L,TAO X F,XIONG X,et al.Detection Method for Electricity Theft Based on Deep Forest Algorithm[J].Smart Power,2019,47(10):85-92. [11] CAI J H,WANG K,DONG K,et.al.Power user stealing detection based on DenseNet and random forest[J].Journal of Computer Applications,2021,41(S1):75-80. [12] CIESLAK D A,CHAWLA N V,STRIEGEL A.Combating imbalance in network intrusion datasets[C]//IEEE International Conference on Granular Computing.2006:732-737. [13] ZHAO Z X,WANG G L,LI X D.An Improved SVM Based Under-Sampling Method for Classifying Imbalanced Data[J].Acta Scientiarum Naturalium Universitatis Sunyatseni,2012,51(6):10-16. [14] YANG J,YAN X F,ZHANG D P.Cost-sensitive Software Defect Prediction Method Based on Boosting[J].Computer Scien-ce,2017,44(8):176-180. [15] LIU X Y,WU J,ZHOU Z H.Exploratory under sampling for class-imbalance learning[J].IEEE Transactions on Systems,Man,and Cybernetics,Part B:Cybernetics,2009,39(2):539-550. [16] CHEN S Z,ZHU J P,YOU T G.Study on Unbalanced Custo-mer Loss Based on SMOTERF Algorithm[J].Journal of Mathematics in Practice and Theory,2019,1(9):204-210. [17] BARUA S,ISLAM M M,YAO X,et al.MWMOTE-majority weighted minority oversampling technique for imbalanced data set learning[J].IEEE Transactions on Knowledge and Data Engineering,2014,26(2):405-425. [18] LIU X Y,WANG S T,ZHANG M L.Transfer synthetic over-sampling for class-imbalance learning with limited minority class data[J].Frontiers of Computer Science,2019,13(5):406-415. [19] DEL RÍO S,LÓPEZ V,BENÍ-TEZ J M,et al.On the use ofMapReduce for imbalanced big data using Random Forest[J].Information Sciences,2014,12(1):235-239. [20] ZHANG M,HU X H,WU J X.Imbalanced Data Processing Algorithm Based on Mixed Sampling[J].Computer Engineering and Applications,2019,55(17):68-75. [21] MA J J,PAN Q,LIANG Y,et al.Object Detection Based on Improved Grassberger Entropy Random Forest Classifier[J].Chinese Journal of Lasers,2019,46(7):238-246. |
[1] | LI Qi-ye, XING Hong-jie. KPCA Based Novelty Detection Method Using Maximum Correntropy Criterion [J]. Computer Science, 2022, 49(8): 267-272. |
[2] | GAO Zhen-zhuo, WANG Zhi-hai, LIU Hai-yang. Random Shapelet Forest Algorithm Embedded with Canonical Time Series Features [J]. Computer Science, 2022, 49(7): 40-49. |
[3] | HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78. |
[4] | WANG Wen-qiang, JIA Xing-xing, LI Peng. Adaptive Ensemble Ordering Algorithm [J]. Computer Science, 2022, 49(6A): 242-246. |
[5] | ZHANG Xiao-qing, FANG Jian-sheng, XIAO Zun-jie, CHEN Bang, Risa HIGASHITA, CHEN Wan, YUAN Jin, LIU Jiang. Classification Algorithm of Nuclear Cataract Based on Anterior Segment Coherence Tomography Image [J]. Computer Science, 2022, 49(3): 204-210. |
[6] | LIU Zhen-yu, SONG Xiao-ying. Multivariate Regression Forest for Categorical Attribute Data [J]. Computer Science, 2022, 49(1): 108-114. |
[7] | YANG Xiao-qin, LIU Guo-jun, GUO Jian-hui, MA Wen-tao. Full Reference Color Image Quality Assessment Method Based on Spatial and Frequency Domain Joint Features with Random Forest [J]. Computer Science, 2021, 48(8): 99-105. |
[8] | ZHENG Jian-hua, LI Xiao-min, LIU Shuang-yin, LI Di. Improved Random Forest Imbalance Data Classification Algorithm Combining Cascaded Up-sampling and Down-sampling [J]. Computer Science, 2021, 48(7): 145-154. |
[9] | CAO Yang-chen, ZHU Guo-sheng, QI Xiao-yun, ZOU Jie. Research on Intrusion Detection Classification Based on Random Forest [J]. Computer Science, 2021, 48(6A): 459-463. |
[10] | LI Na-na, WANG Yong, ZHOU Lin, ZOU Chun-ming, TIAN Ying-jie, GUO Nai-wang. DDoS Attack Random Forest Detection Method Based on Secondary Screening of Feature Importance [J]. Computer Science, 2021, 48(6A): 464-467. |
[11] | XU Jia-qing, HU Xiao-yue, TANG Fu-qiao, WANG Qiang, HE Jie. Detecting Blocking Failure in High Performance Interconnection Networks Based on Random Forest [J]. Computer Science, 2021, 48(6): 246-252. |
[12] | ZHOU Yi-min, LIU Fang-zheng , WANG Yong. IPSec VPN Encrypted Traffic Identification Based on Hybrid Method [J]. Computer Science, 2021, 48(4): 295-302. |
[13] | ZHANG Tian-rui, WEI Ming-qi, GAO Xiu-xiu. Prediction Model of Bubble Dissolution Time in Selective Laser Sintering Based on IPSO-WRF [J]. Computer Science, 2021, 48(11A): 638-643. |
[14] | LIU Zhen-peng, SU Nan, QIN Yi-wen, LU Jia-huan, LI Xiao-fei. FS-CRF:Outlier Detection Model Based on Feature Segmentation and Cascaded Random Forest [J]. Computer Science, 2020, 47(8): 185-188. |
[15] | YANG Wei-chao, GUO Yuan-bo, LI Tao, ZHU Ben-quan. Method Based on Traffic Fingerprint for IoT Device Identification and IoT Security Model [J]. Computer Science, 2020, 47(7): 299-306. |
|