V-Detector: A Negative Selection Algorithm Zhou Ji, advised by Prof. Dasgupta Computer Science Research Day The University of Memphis March 25, 2005.

Slides:



Advertisements
Similar presentations
Applicability Issues of the (Real-valued) Negative Selection Algorithms Zhou Ji, Dipankar Dasgupta The University of Memphis GECCO 2006: July 11, 2006.
Advertisements

Augmented Negative Selection Algorithm with Variable-Coverage Detectors Zhou Ji, Zhou Ji, St. Jude Childrens Research Hospital Dipankar Dasgupta, Dipankar.
Analysis of Dental Images using Artificial Immune Systems Zhou Ji 1, Dipankar Dasgupta 1, Zhiling Yang 2 & Hongmei Teng 1 1: The University of Memphis.
Estimating the detector coverage in a negative selection algorithm Zhou Ji St. Jude Childrens Research Hospital Dipankar Dasgupta The University of Memphis.
Negative Selection Algorithms at GECCO /22/2005.
Real-valued negative selection algorithms Zhou Ji
Applications of one-class classification
Visualization and analysis of large data collections: a case study applied to confocal microscopy data Wim de Leeuw, Swammerdam Institute for Life Sciences,
CIFD: Computational Immunology for Fraud Detection
The story beyond Artificial Immune Systems Zhou Ji, Ph.D. Center for Computational Biology and Bioinformatics Columbia University Wuhan, China 2009.
DIMENSIONALITY REDUCTION: FEATURE EXTRACTION & FEATURE SELECTION Principle Component Analysis.
By: Ryan Wendel.  It is an ongoing analysis in which videos are analyzed frame by frame  Most of the video recognition is pulled from 3-D graphic engines.
Artificial Immune Systems Razieh Khamseh-Ashari Department of Electrical and Computer Eng Isfahan University of Technology Supervisor: Dr. Abdolreza Mirzaei.
1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.
An Overview of Machine Learning
Watching Unlabeled Video Helps Learn New Human Actions from Very Few Labeled Snapshots Chao-Yeh Chen and Kristen Grauman University of Texas at Austin.
Anomaly Detection in Data Docent Xiao-Zhi Gao
Click to edit master text Click to edit Master text styles Second level Third level Fourth level Fifth level Artificial Immune Systems Dr Uwe Aickelin.
Artificial Immune Systems Andrew Watkins. Why the Immune System? Recognition –Anomaly detection –Noise tolerance Robustness Feature extraction Diversity.
Some Technical Considerations In negative selection algorithms 4/15/2005.
Multivariate Methods Pattern Recognition and Hypothesis Testing.
Digital strategies for 21 st century libraries Wolfram Horstmann.
Prénom Nom Document Analysis: Artificial Neural Networks Prof. Rolf Ingold, University of Fribourg Master course, spring semester 2008.
1 Learning to Detect Objects in Images via a Sparse, Part-Based Representation S. Agarwal, A. Awan and D. Roth IEEE Transactions on Pattern Analysis and.
Greg GrudicIntro AI1 Introduction to Artificial Intelligence CSCI 3202 Fall 2007 Introduction to Classification Greg Grudic.
Prénom Nom Document Analysis: Artificial Neural Networks Prof. Rolf Ingold, University of Fribourg Master course, spring semester 2008.
1 How to be a Bayesian without believing Yoav Freund Joint work with Rob Schapire and Yishay Mansour.
1 Negative selection algorithms: from the thymus to V-detector Dissertation defense Zhou Ji Major professor: Prof. Dasgupta Advisory committee: Dr. Lin,
Artificial Immune Systems Our body’s immune system is a perfect example of a learning system. It is able to distinguish between good cells and potentially.
Scientific Computing Department Faculty of Computer and Information Sciences Ain Shams University Supervised By: Mohammad F. Tolba Mohammad S. Abdel-Wahab.
By : Anas Assiri.  Introduction  fraud detection  Immune system  Artificial immune system (AIS)  AISFD  Clonal selection.
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
Distributed Network Intrusion Detection An Immunological Approach Steven Hofmeyr Stephanie Forrest Patrik D’haeseleer Dept. of Computer Science University.
1 Principles of a Computer Immune System Anil Somayaji, Steven Hofmeyr, & Stephanie Forrest Presented by: Jesus Morales.
Tennessee Technological University1 The Scientific Importance of Big Data Xia Li Tennessee Technological University.
Immune System Metaphors Applied to Intrusion Detection and Related Problems by Ian Nunn, SCS, Carleton University
EADS DS / SDC LTIS Page 1 7 th CNES/DLR Workshop on Information Extraction and Scene Understanding for Meter Resolution Image – 29/03/07 - Oberpfaffenhofen.
Artificial Neural Nets and AI Connectionism Sub symbolic reasoning.
Automatic Test-Data Generation: An Immunological Approach Kostas Liaskos Marc Roper {Konstantinos.Liaskos, TAIC PART 2007.
Carnegie Mellon Selected Topics in Automated Diversity Stephanie Forrest University of New Mexico Mike Reiter Dawn Song Carnegie Mellon University.
Rotation Invariant Neural-Network Based Face Detection
NEURAL NETWORKS FOR DATA MINING
Introduction to machine learning and data mining 1 iCSC2014, Juan López González, University of Oviedo Introduction to machine learning Juan López González.
LOGO Ensemble Learning Lecturer: Dr. Bo Yuan
A Regression Approach to Music Emotion Recognition Yi-Hsuan Yang, Yu-Ching Lin, Ya-Fan Su, and Homer H. Chen, Fellow, IEEE IEEE TRANSACTIONS ON AUDIO,
Machine Learning Using Support Vector Machines (Paper Review) Presented to: Prof. Dr. Mohamed Batouche Prepared By: Asma B. Al-Saleh Amani A. Al-Ajlan.
APPLICATION OF THE METHOD AND COMBINED ALGORITHM ON THE BASIS OF IMMUNE NETWORK AND NEGATIVE SELECTION FOR IDENTIFICATION OF TURBINE ENGINE SURGING Lytvynenko.
Speeding Up Relational Data Mining by Learning to Estimate Candidate Hypothesis Scores Frank DiMaio and Jude Shavlik UW-Madison Computer Sciences ICDM.
Kansas State University Department of Computing and Information Sciences CIS 730: Introduction to Artificial Intelligence Lecture 28 of 41 Friday, 22 October.
Today Ensemble Methods. Recap of the course. Classifier Fusion
BAGGING ALGORITHM, ONLINE BOOSTING AND VISION Se – Hoon Park.
Immune-inspired Network Intrusion Detection System (i-NIDS) 1 Next Generation Intelligent Networks Research Center National University of Computer & Emerging.
Mehdi Ghayoumi MSB rm 132 Ofc hr: Thur, a Machine Learning.
Changing the Rules of the Game Dr. Marco A. Janssen Department of Spatial Economics.
GENDER AND AGE RECOGNITION FOR VIDEO ANALYTICS SOLUTION PRESENTED BY: SUBHASH REDDY JOLAPURAM.
Team Members Ming-Chun Chang Lungisa Matshoba Steven Preston Supervisors Dr James Gain Dr Patrick Marais.
Dr.Abeer Mahmoud ARTIFICIAL INTELLIGENCE (CS 461D) Dr. Abeer Mahmoud Computer science Department Princess Nora University Faculty of Computer & Information.
Data Mining and Decision Support
EFFICIENT STRATEGIES FOR REPRESENTING AND EVALUATING THE EFFECT OF PROPAGATION IMPAIRMENTS ON THE PERFORMANCE OF WIRELESS COMMUNICATIONS SYSTEMS Presented.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 2005.ACM GECCO.8.Discriminating and visualizing anomalies.
Presentation By SANJOG BHATTA Student ID : July 1’ 2009.
Surface Defect Inspection: an Artificial Immune Approach Dr. Hong Zheng and Dr. Saeid Nahavandi School of Engineering and Technology.
Introduction to Machine Learning, its potential usage in network area,
Machine Learning for Computer Security
San Diego May 22, 2013 Giovanni Saponaro Giampiero Salvi
QianZhu, Liang Chen and Gagan Agrawal
Implementing Boosting and Convolutional Neural Networks For Particle Identification (PID) Khalid Teli .
Behrouz Minaei, William Punch
An Incremental Self-Improvement Hybrid Intrusion Detection System Mahbod Tavallaee, Wei Lu, and Ali A. Ghorbani Faculty of Computer Science, UNB Fredericton.
Immunocomputing and Artificial Immune Systems
Presentation transcript:

V-Detector: A Negative Selection Algorithm Zhou Ji, advised by Prof. Dasgupta Computer Science Research Day The University of Memphis March 25, 2005

Background Immune system is a group of cells and organs that work together to fight infections in our bodies.

Background AIS (Artificial Immune Systems) are not just intrusion detection and defense Immune systems computational capability Learning Memory Recognition Feature extraction Distributed process Adaptation Self/nonself discrimination Prediction ……

Background Different models of Artificial Immune Systems Negative selection algorithms Immune network model Clonal selection Gene library

Background Negative Selection Algorithms In natural immune system: T-cells develop in thymus Random generation + aimed elimination Represent target concept by negative space Training only with self samples – one class learning

Algorithm basic idea

Algorithm V-detector

Algorithm V-detectors features Simple generation strategy and detector scheme - extensibility Variable sized detectors Coverage estimate Boundary-aware

Implementation Multiple dimensional, Real-valued representation Control parameters Self threshold Target coverage Significant level (for hypothesis testing) Boundary-aware vs. point-wise

Implementation User interface

Experiments

Summary A new negative selection algorithm has been developed. Important unique features. Challenges: evaluate the detectors and categorize the anomaly.

Bibliography Ji & Dasgupta, Augmented Negative Selection Algorithm with Variable- Coverage Detectors, CEC 2004 Ji & Dasgupta, Real-valued Negative Selection Algorithm with Variable- Sized Detectors, GECCO 2004 Ji & Dasgupta, Estimating the Detector Coverage in a Negative Selection Algorithm, GECCO 2005