Solving Multitask Optimization Problems With Adaptive Knowledge Transfer via Anomaly Detection

被引:86
作者
Wang, Chao [1 ]
Liu, Jing [1 ]
Wu, Kai [2 ]
Wu, Zhaoyang [1 ]
机构
[1] Xidian Univ, Guangzhou Inst Technol, Guangzhou 710071, Peoples R China
[2] Xidian Univ, Sch Artificial Intelligence, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
Task analysis; Optimization; Statistics; Sociology; Knowledge transfer; Anomaly detection; Evolutionary computation; Adaptive strategy; anomaly detection; evolutionary multitask optimization (EMTO); knowledge transfer; many-task optimization (MaTO); EVOLUTIONARY MULTITASKING; ALGORITHM;
D O I
10.1109/TEVC.2021.3068157
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Evolutionary multitask optimization (EMTO) has recently attracted widespread attention in the evolutionary computation community, which solves two or more tasks simultaneously to improve the convergence characteristics of tasks when individually optimized. Effective knowledge between tasks is transferred by taking advantage of the parallelism of population-based search. Without any prior knowledge about tasks, it is a challenging problem of how to adaptively transfer effective knowledge between tasks and reduce the impact of negative transfer in EMTO. However, these two issues are rarely studied simultaneously in the existing literature. Besides, in complex many-task environments, the potential relationships among individuals from highly diverse populations associated with tasks directly determine the effectiveness of cross-task knowledge transfer. Keeping those in mind, we propose a multitask evolutionary algorithm based on anomaly detection (MTEA-AD). Specifically, each task is assigned a population and an anomaly detection model. Each anomaly detection model is used to learn the relationship among individuals between the current task and the other tasks online. Individuals that may carry negative knowledge are identified as outliers, and candidate transferred individuals identified by the anomaly detection model are selected to assist the current task, which may carry common knowledge across the current task and other tasks. Furthermore, to realize the adaptive control of the degree of knowledge transfer, the successfully transferred individuals that survive to the next generation through the elitism are used to update the anomaly detection parameter. The fair competition between offspring and candidate transferred individuals can effectively reduce the risk of negative transfer. Finally, the empirical studies on a series of synthetic benchmarks and a practical study are conducted to verify the effectiveness of MTEA-AD. The experimental results demonstrate that our proposal can adaptively adjust the degree of knowledge transfer through the anomaly detection model to achieve highly competitive performance compared to several state-of-the-art EMTO methods.
引用
收藏
页码:304 / 318
页数:15
相关论文
共 48 条
[1]  
Aggarwal CC, 2014, CH CRC DATA MIN KNOW, P1
[2]   CARDWATCH: A neural network based database mining system for credit card fraud detection [J].
Aleskerov, E ;
Freisleben, B ;
Rao, B .
PROCEEDINGS OF THE IEEE/IAFE 1997 COMPUTATIONAL INTELLIGENCE FOR FINANCIAL ENGINEERING (CIFER), 1997, :220-226
[3]   Cognizant Multitasking in Multiobjective Multifactorial Evolution: MO-MFEA-II [J].
Bali, Kavitesh Kumar ;
Gupta, Abhishek ;
Ong, Yew-Soon ;
Tan, Puay Siew .
IEEE TRANSACTIONS ON CYBERNETICS, 2021, 51 (04) :1784-1796
[4]   Multifactorial Evolutionary Algorithm With Online Transfer Parameter Estimation: MFEA-II [J].
Bali, Kavitesh Kumar ;
Ong, Yew Soon ;
Gupta, Abhishek ;
Tan, Puay Siew .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2020, 24 (01) :69-83
[5]   An Evolutionary Multitasking Algorithm for Cloud Computing Service Composition [J].
Bao, Liang ;
Qi, Yutao ;
Shen, Mengqing ;
Bu, Xiaoxuan ;
Yu, Jusheng ;
Li, Qian ;
Chen, Ping .
SERVICES - SERVICES 2018, 2018, 10975 :130-144
[6]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[7]   An Adaptive Archive-Based Evolutionary Framework for Many-Task Optimization [J].
Chen, Yongliang ;
Zhong, Jinghui ;
Feng, Liang ;
Zhang, Jun .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2020, 4 (03) :369-384
[8]   Robots that can adapt like animals [J].
Cully, Antoine ;
Clune, Jeff ;
Tarapore, Danesh ;
Mouret, Jean-Baptiste .
NATURE, 2015, 521 (7553) :503-U476
[9]  
Da B., 2017, Technical Report
[10]   A fast and elitist multiobjective genetic algorithm: NSGA-II [J].
Deb, K ;
Pratap, A ;
Agarwal, S ;
Meyarivan, T .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2002, 6 (02) :182-197