Computer Forensic Using Lazy Local Bagging Predictors

被引:0
作者
邱卫东 [1 ]
鲍诚毅 [1 ]
朱兴全 [2 ]
机构
[1] School of Information Security Engineering,Shanghai Jiaotong University,Shanghai ,China
[2] Department of Computer Science & Engineering,Florida Atlantic University,Boca Raton,FL ,USA
关键词
computer forensic; data mining; classification; lazy learning; bagging; ensemble learning;
D O I
暂无
中图分类号
TP399-C2 [];
学科分类号
081203 ; 0835 ;
摘要
<正>In this paper,we study the problem of employ ensemble learning for computer forensic.We propose a Lazy Local Learning based bagging(L3B) approach,where base earners are trained from a small instance subset surrounding each test instance.More specifically,given a test instance x,L3B first discovers x's k nearest neighbours,and then applies progressive sampling to the selected neighbours to train a set of base classifiers,by using a given very weak(VW) learner.At the last stage,x is labeled as the most frequently voted class of all base classifiers.Finally,we apply the proposed L3B to computer forensic.
引用
收藏
页码:94 / 97
页数:4
相关论文
共 50 条
[41]   Prediction of Oil Prices Using Bagging and Random Subspace [J].
Gabralla, Lubna A. ;
Abraham, Ajith .
PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INNOVATIONS IN BIO-INSPIRED COMPUTING AND APPLICATIONS (IBICA 2014), 2014, 303 :343-354
[42]   Intrusion Detection System using Bagging Ensemble Selection [J].
Sreenath, M. ;
Udhayan, J. .
2015 IEEE INTERNATIONAL CONFERENCE ON ENGINEERING AND TECHNOLOGY (ICETECH), 2015, :4-7
[43]   A Computer Dynamic Forensic Technique Based on Outlier Detection [J].
Huang, Bin ;
Li, Wenfang ;
Chen, Deli ;
Chen, Junjie .
KNOWLEDGE ENGINEERING AND MANAGEMENT, 2011, 123 :349-356
[44]   Using Bagging and Boosting Techniques for Improving Coreference Resolution [J].
Vemulapalli, Smita ;
Luo, Xiaoqiang ;
Pitrelli, John F. ;
Zitouni, Imed .
INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2010, 34 (01) :111-118
[45]   Design and Implementation of a Cloud Based Computer Forensic Tool [J].
Mohite, Monali P. ;
Ardhapurkar, S. B. .
2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, :1005-1009
[46]   Current Status and Development Trend of Research of Computer Forensic [J].
Fu ZhongYong ;
Zhao ZhenZhou .
FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE IV, PTS 1-5, 2014, 496-500 :2208-2215
[47]   Proposed Computer Forensic Approach for Cloud Computing Environment [J].
Ahmed, Mubarak ;
Samy, Ganthan Narayana ;
Maarop, Nurazean ;
Shanmugam, Bharanidharan ;
Magalingam, Pritheega ;
Ahmad, Rabiah .
ADVANCED SCIENCE LETTERS, 2016, 22 (10) :3137-3141
[48]   Systematic Review: Anti-Forensic Computer Techniques [J].
Arias, Rafael Gonzalez ;
Higuera, Javier Bermejo ;
Granados, J. Javier Rainer ;
Higuera, Juan Ramon Bermejo ;
Montalvo, Juan Antonio Sicilia .
APPLIED SCIENCES-BASEL, 2024, 14 (12)
[49]   Integration of Bagging and Greedy Forward Selection on Image Pap Smear Classification using Naive Bayes [J].
Riana, Dwiza ;
Hidayanto, Achmad Nizar ;
Fitriyani .
2017 5TH INTERNATIONAL CONFERENCE ON CYBER AND IT SERVICE MANAGEMENT (CITSM 2017), 2017, :531-536
[50]   Improvement of Bagging performance for classification of imbalanced datasets using evolutionary multi-objective optimization [J].
Roshan, Seyed Ehsan ;
Asadi, Shahrokh .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2020, 87