共 50 条
TIEOD: Three-way concept-based information entropy for outlier detection
被引:1
|作者:
Hu, Qian
[1
]
Zhang, Jun
[2
]
Mi, Jusheng
[3
]
Yuan, Zhong
[4
]
Li, Meizheng
[1
]
机构:
[1] Hebei Normal Univ, Coll Comp & Cyber Secur, Shijiazhuang 050024, Peoples R China
[2] Shijiazhuang Tiedao Univ, Dept Math & Phys, Shijiazhuang 050043, Peoples R China
[3] Hebei Normal Univ, Sch Math Sci, Shijiazhuang 050024, Peoples R China
[4] Sichuan Univ, Coll Comp Sci, Chengdu 610065, Peoples R China
基金:
中国国家自然科学基金;
关键词:
Outlier detection;
Granular computing;
Formal concept analysis;
Three-way decision;
Information entropy;
ROUGH SETS;
GRANULATION;
ALGORITHM;
D O I:
10.1016/j.asoc.2024.112642
中图分类号:
TP18 [人工智能理论];
学科分类号:
081104 ;
0812 ;
0835 ;
1405 ;
摘要:
Outlier detection is an attractive research area in data mining, which is intended to find out the few objects that are abnormal to the normal data set. Formal concept analysis is an efficacious mathematical tool to perform data analysis and processing. Three-way concepts contain both information of co-having co-not-having, and reflect the correlation among objects (attributes). Information entropy reflects the degree uncertainty of the system. Information entropy-based outlier detection methods have been widely studied have shown excellent performance, but most current information entropy-based methods contain parameters, which leads to detection results are sensitive to parameters settings and taking longer detection times. Aiming at this deficiency, this paper constructs a three-way concept-based information entropy outlier detection method. Firstly, the information entropy of the formal context is defined by utilizing three-way granular concepts, and then the relative entropy of each object is defined. According to it, the relative cardinality-based outlier degree of each object is given, and then the outlier factor of the object is defined by combining the relative entropy. Then the three-way concept information entropy-based outlier factor is presented and associated algorithm is proposed. Finally, the effectiveness and efficiency of the proposed algorithm is verified on a public dataset.
引用
收藏
页数:9
相关论文