1 Support Cluster Machine Paper from ICML2007 Read by Haiqin Yang 2007-10-18 This paper, Support Cluster Machine, was written by Bin Li, Mingmin Chi, Jianping.

Slides:



Advertisements
Similar presentations
Applications of one-class classification
Advertisements

Curriculum Learning for Latent Structural SVM
Relevant characteristics extraction from semantically unstructured data PhD title : Data mining in unstructured data Daniel I. MORARIU, MSc PhD Supervisor:
SVM - Support Vector Machines A new classification method for both linear and nonlinear data It uses a nonlinear mapping to transform the original training.
Decision Tree Approach in Data Mining
K-NEAREST NEIGHBORS AND DECISION TREE Nonparametric Supervised Learning.
Particle swarm optimization for parameter determination and feature selection of support vector machines Shih-Wei Lin, Kuo-Ching Ying, Shih-Chieh Chen,
Semantic Analysis of Movie Reviews for Rating Prediction
Predictive Automatic Relevance Determination by Expectation Propagation Yuan (Alan) Qi Thomas P. Minka Rosalind W. Picard Zoubin Ghahramani.
Using Analytic QP and Sparseness to Speed Training of Support Vector Machines John C. Platt Presented by: Travis Desell.
Speaker Adaptation for Vowel Classification
Reduced Support Vector Machine
Basic Data Mining Techniques Chapter Decision Trees.
Object Class Recognition Using Discriminative Local Features Gyuri Dorko and Cordelia Schmid.
SVM (Support Vector Machines) Base on statistical learning theory choose the kernel before the learning process.
Pattern Recognition. Introduction. Definitions.. Recognition process. Recognition process relates input signal to the stored concepts about the object.
(C) 2001 SNU CSE Biointelligence Lab Incremental Classification Using Tree- Based Sampling for Large Data H. Yoon, K. Alsabti, and S. Ranka Instance Selection.
Greg GrudicIntro AI1 Support Vector Machine (SVM) Classification Greg Grudic.
Privacy-Preserving Data Mining Rakesh Agrawal Ramakrishnan Srikant IBM Almaden Research Center 650 Harry Road, San Jose, CA Published in: ACM SIGMOD.
DATA MINING : CLASSIFICATION. Classification : Definition  Classification is a supervised learning.  Uses training sets which has correct answers (class.
Feature Selection in Nonlinear Kernel Classification Olvi Mangasarian & Edward Wild University of Wisconsin Madison Workshop on Optimization-Based Data.
GA-Based Feature Selection and Parameter Optimization for Support Vector Machine Cheng-Lung Huang, Chieh-Jen Wang Expert Systems with Applications, Volume.
Tools for Privacy Preserving Distributed Data Mining
Lecture notes for Stat 231: Pattern Recognition and Machine Learning 1. Stat 231. A.L. Yuille. Fall 2004 Practical Issues with SVM. Handwritten Digits:
Machine Learning Using Support Vector Machines (Paper Review) Presented to: Prof. Dr. Mohamed Batouche Prepared By: Asma B. Al-Saleh Amani A. Al-Ajlan.
Kernel Methods A B M Shawkat Ali 1 2 Data Mining ¤ DM or KDD (Knowledge Discovery in Databases) Extracting previously unknown, valid, and actionable.
ICML2004, Banff, Alberta, Canada Learning Larger Margin Machine Locally and Globally Kaizhu Huang Haiqin Yang, Irwin King, Michael.
Automatic Image Annotation by Using Concept-Sensitive Salient Objects for Image Content Representation Jianping Fan, Yuli Gao, Hangzai Luo, Guangyou Xu.
Additive Data Perturbation: the Basic Problem and Techniques.
FREERIDE: System Support for High Performance Data Mining Ruoming Jin Leo Glimcher Xuan Zhang Ge Yang Gagan Agrawal Department of Computer and Information.
Privacy-Preserving Support Vector Machines via Random Kernels Olvi Mangasarian UW Madison & UCSD La Jolla Edward Wild UW Madison November 14, 2015 TexPoint.
Randomization in Privacy Preserving Data Mining Agrawal, R., and Srikant, R. Privacy-Preserving Data Mining, ACM SIGMOD’00 the following slides include.
Powerpoint Templates Page 1 Powerpoint Templates Scalable Text Classification with Sparse Generative Modeling Antti PuurulaWaikato University.
RSVM: Reduced Support Vector Machines Y.-J. Lee & O. L. Mangasarian First SIAM International Conference on Data Mining Chicago, April 6, 2001 University.
Some Aspects of Bayesian Approach to Model Selection Vetrov Dmitry Dorodnicyn Computing Centre of RAS, Moscow.
Multi-Speaker Modeling with Shared Prior Distributions and Model Structures for Bayesian Speech Synthesis Kei Hashimoto, Yoshihiko Nankaku, and Keiichi.
Biointelligence Laboratory, Seoul National University
1/18 New Feature Presentation of Transition Probability Matrix for Image Tampering Detection Luyi Chen 1 Shilin Wang 2 Shenghong Li 1 Jianhua Li 1 1 Department.
CS558 Project Local SVM Classification based on triangulation (on the plane) Glenn Fung.
GENDER AND AGE RECOGNITION FOR VIDEO ANALYTICS SOLUTION PRESENTED BY: SUBHASH REDDY JOLAPURAM.
NIMIA Crema, Italy1 Identification and Neural Networks I S R G G. Horváth Department of Measurement and Information Systems.
Fast Query-Optimized Kernel Machine Classification Via Incremental Approximate Nearest Support Vectors by Dennis DeCoste and Dominic Mazzoni International.
Improving Support Vector Machine through Parameter Optimized Rujiang Bai, Junhua Liao Shandong University of Technology Library Zibo , China { brj,
1 Privacy Preserving Data Mining Introduction August 2 nd, 2013 Shaibal Chakrabarty.
Locally Linear Support Vector Machines Ľubor Ladický Philip H.S. Torr.
Notes on HW 1 grading I gave full credit as long as you gave a description, confusion matrix, and working code Many people’s descriptions were quite short.
Convolutional Restricted Boltzmann Machines for Feature Learning Mohammad Norouzi Advisor: Dr. Greg Mori Simon Fraser University 27 Nov
Data Mining By Farzana Forhad CS 157B. Agenda Decision Tree and ID3 Rough Set Theory Clustering.
Final Report (30% final score) Bin Liu, PhD, Associate Professor.
Hybrid Classifiers for Object Classification with a Rich Background M. Osadchy, D. Keren, and B. Fadida-Specktor, ECCV 2012 Computer Vision and Video Analysis.
Greg GrudicIntro AI1 Support Vector Machine (SVM) Classification Greg Grudic.
Proximal Plane Classification KDD 2001 San Francisco August 26-29, 2001 Glenn Fung & Olvi Mangasarian Second Annual Review June 1, 2001 Data Mining Institute.
A Parallel Mixture of SVMs for Very Large Scale Problems Ronan Collobert Samy Bengio Yoshua Bengio Prepared : S.Y.C. Neural Information Processing Systems,
Privacy-Preserving Support Vector Machines via Random Kernels Olvi Mangasarian UW Madison & UCSD La Jolla Edward Wild UW Madison March 3, 2016 TexPoint.
Nawanol Theera-Ampornpunt, Seong Gon Kim, Asish Ghoshal, Saurabh Bagchi, Ananth Grama, and Somali Chaterji Fast Training on Large Genomics Data using Distributed.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology Advisor : Dr. Hsu Graduate : Yu Cheng Chen Author: Lynette.
Dr. Chen, Data Mining  A/W & Dr. Chen, Data Mining Chapter 3 Basic Data Mining Techniques Jason C. H. Chen, Ph.D. Professor of MIS School of Business.
Privacy Preserving Outlier Detection using Locality Sensitive Hashing
A distributed PSO – SVM hybrid system with feature selection and parameter optimization Cheng-Lung Huang & Jian-Fan Dun Soft Computing 2008.
Multi-Class Sentiment Analysis with Clustering and Score Representation Yan Zhu.
Privacy-Preserving Data Mining
k-Nearest neighbors and decision tree
Semantic Video Classification
Boosting Nearest-Neighbor Classifier for Character Recognition
Open-Category Classification by Adversarial Sample Generation
Implementing AdaBoost
Shih-Wei Lin, Kuo-Ching Ying, Shih-Chieh Chen, Zne-Jung Lee
Concave Minimization for Support Vector Machine Classifiers
University of Wisconsin - Madison
Presentation transcript:

1 Support Cluster Machine Paper from ICML2007 Read by Haiqin Yang This paper, Support Cluster Machine, was written by Bin Li, Mingmin Chi, Jianping Fan, Xiangyang Xue, which was published in 2007.

2 Outline Background and Motivation Support Cluster Machine - SCM Kernel in SCM Experiments An Interesting Application: Privacy-preserving Data Mining Discussions

3 Background and Motivation Large scale classification problem Decomposition methods  Osuna et al., 1997;  Joachims, 1999;  Platt, 1999;  Collobert & Bengio, 2001;  Keerthi et al., 2001; Incremental algorithms  Cauwenberghs & Poggio, 2000;  Fung & Mangasarian, 2002;  Laskov et al., 2006; Parallel techniques  Collobert et al., 2001;  Graf et al., 2004; Approximate formula  Fung & Mangasarian, 2001;  Lee & Mangasarian, 2001; Choose representatives  Active learning - Schohn & Cohn, 2003;  Cluster Based-SVM - Yu et al., 2003;  Core Vector Machine (CVM) - Tsang et al., 2005;  Clustering SVM - Boley, D. & Cao, 2004;

4 Support Cluster Machine - SCM Given training samples: Procedure

5 SCM Solution Dual representation Decision function

6 Kernel Probability product kernel By Gaussian assumption, i.e., Hence

7 Kernel Property I That is Decision function Property II

8 Experiments  Datasets Toydata MNIST – Handwritten digits ( ‘0’-’9’ ) classification Adult – Privacy-preserving Dataset  Clustering algorithms Threshold Order Dependent (TOD) EM algorithm  Classification methods libSVM SVMTorch SVM light CVM (Core Vector Machine) SCM  Model selection  CPU: 3.0GHz

9 Toydata  Samples: 2500 samples/class generated from a mixture of Gaussian distribution  Clustering algorithm: TOD  Clustering results: 25 positive, 25 negative

10 MNIST  Data description 10 classes: Handwritten digits ‘0’-’9’ Training samples: 60,000, about 6000 for each class Testing samples: 10,000  Construct 45 binary classifiers  Results 25 Clusters for EM algorithm

11 MNIST  Test results for TOD algorithm

12 Privacy-preserving Data Mining  Inter-Enterprise data mining Problem: Two parties owning confidential databases wish to build a decision-tree classifier on the union of their databases, without revealing any unnecessary information.  Horizontally partitioned Records (users) split across companies Example: Credit card fraud detection model  Vertically partitioned Attributes split across companies Example: Associations across websites

13 Privacy-preserving Data Mining Randomization approach 50 | 40K |...30 | 70K | Randomizer Reconstruct distribution of Age Reconstruct distribution of Salary Data Mining Algorithms Model 65 | 20K |...25 | 60K |......

14 Classification Example

15 Privacy-preserving Dataset: Adult Data description Training samples: Testing samples: Percentage of positive samples: 24.78% Procedure Horizontally partition data into three subsets (parties) Cluster by TOD algorithm Obtain three positive and three negative GMMs Combine positive and negative GMMs into one positive and one negative GMMs with modified priors Classify them by SCM

16 Privacy-preserving Dataset: Adult Partition results Experimental results

17 Discussions Solved problems Large scale problems: downsample by clustering + classifier Privacy-preserving problems: hide individual information Differences to other methods Training units are generative model, testing units are vectors Training units contain complete statistical information Only one parameter for model selection Easy implementation Generalization ability is not clear, while the RBF kernel in SVM has the property of larger width leads to lower VC dimension.

18 Discussions  Advantages of using priors and covariances

19 Thank you!