Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Zhichao Yin.
2015 4th International Conference on Advanced Information Technology and Sensor Application (AITS) | 2015
Chunyong Yin; Jun Xiang; Hui Zhang; Jin Wang; Zhichao Yin; Jeong-Uk Kim
Short text is a popular text form, which is widely used in short commentary, micro-blog and many other fields. With the development of the social software and movie websites, the size of data is also becoming larger and larger. Most data is useless for us while other data is important for us. Therefore, it is very necessary for us to extract the useful short text from the big data. However, there are some problems such as fewer features, irregularity on the short text classification. To solve the problem we should pretreat the short text set and choose the significant features. This paper use semi-supervised learning and SVM to improve the traditional method and it can classify a large number of short texts to mining the useful massage from the short text. The experimental results also show a good improvement.
Cluster Computing | 2017
Chunyong Yin; Sun Zhang; Zhichao Yin; Jin Wang
Intrusion detection provides important protection for network security and anomaly detection as a type of intrusion detection, which can recognize the pattern of normal behaviors and label the behaviors which departure from normal pattern as anomaly behaviors. The updating of network equipment and broadband speed makes the data mining object change from static data sets to dynamic data streams. We think that the traditional methods based on data set do not satisfy the needs of dynamic network environment. The network data stream is temporal and cannot be treated as static data set. The concept and distribution of data objects is variety in different time stamps and the changing is unpredictable. Therefore, we propose an improved data stream clustering algorithm and design the anomaly detection model according to the improved algorithm. The established model can be modified with the changing of data stream and detect anomaly behaviors in time.
2015 4th International Conference on Advanced Information Technology and Sensor Application (AITS) | 2015
Chunyong Yin; Luyu Ma; Lu Feng; Jin Wang; Zhichao Yin; Jeong-Uk Kim
Feature selection algorithm in intrusion detection, data mining and pattern recognition plays a crucial role, it deletes unrelated and redundant features of the original data set to the optimal feature subset which are applied to some evaluation criteria. Due to the low accuracy, the high false positive rate and the long detection time of the existing feature selection algorithm, in the paper, we put forward a hybrid feature selection algorithm towards efficient intrusion detection, this algorithm chooses the optimal feature subset by combining the correlation algorithm and redundancy algorithm. Experimental results show that the algorithm shows almost and even better than the traditional feature selection algorithm on the different classifiers.
2015 3rd International Conference on Computer and Computing Science (COMCOMS) | 2015
Chunyong Yin; Ardalan Husin Awlla; Jin Wang; Zhichao Yin
Botnet have turned into the most serious security dangers on the present Internet framework. In this paper proposed an anomaly detection model based on genetic neural network system, which joined the significant global searching capability of genetic algorithm with the precise local searching element of back propagation, feed forward neural networks to improve the initial weights of neural network.
Archive | 2017
Zhichao Yin; Hui Zhang; Chunyong Yin; Jin Wang
Trust model is a very important model in social networking and recommendation technology. The trust relationship between the users can reflect the relation in the real life in a better performance than the similarity, but this kind of trust model lose sight of the importance of time effect, so this article pay attention to the research on time effect in trust model and proposed an improved trust model based on time effect. At last we choose appropriate data set to prove the superiority of the proposed improved trust model.
Archive | 2017
Zhichao Yin; Jun Xiang; Chunyong Yin; Jin Wang
Nowadays, mobile marketing is becoming increasingly important both strategically and economically because of the mobile devices. Short text is becoming a popular text form which can be seen in many fields such as network news, QQ messages, comments in BBS and so forth. Besides, our mobile devices also contain a lot of data of short text. To extract useful information from the short text more efficiently, this paper proposes SLAS (semi-supervised learning method and SVM classifier) and CART (classification and regression tree) to improve the traditional methods, which can classify massive short texts to mining the useful information from the short texts. The experiment also shows a better result than before, which has a more than 10% increase, including precision rate, recall rate and F1 value, besides, the running time is reduced by half than the KNN algorithm.
2015 4th International Conference on Advanced Information Technology and Sensor Application (AITS) | 2015
Chunyong Yin; Lu Feng; Luyu Ma; Jin Wang; Zhichao Yin; Jeong-Uk Kim
With the rapid development of the Internet, the application of data mining in the Internet is becoming more and more extensive. However, the complex data sources features are making the data mining process become very inefficient. In order to make data mining more efficient and simple, feature selection research is essential. In this paper, a new metric of mutual information based on mutual information is proposed (measure the correlation degree of the internal features of the collection), additionally Hoeffding inequality is also introduced to construct the HSF algorithm. The HSF is compared with the BIF (based on mutual information feature selection algorithm), the C4.5 classification algorithm is used as the testing algorithm for the experiments. Experiments show that HSF has better performance than BIF [1] in classification accuracy and error rate.
2015 4th International Conference on Advanced Information Technology and Sensor Application (AITS) | 2015
Chunyong Yin; Hui Zhang; Jun Xiang; Zhichao Yin; Jin Wang
With Recommendation technology has been widely used in advertising push, e-commerce and other fields and it has shown its powerful application prospect. But with the index increasing of mobile commerce data size, the size of the recommendation system is also increased and this leads to that the traditional collaborative filtering recommendation algorithm cannot adapt to such a big data processing. To solve the problem, we proposed an algorithm based on the statistical analysis of user data. First, this algorithm classified the data simply, and then we could gain the relatively accurate personalized recommendation results by the statistical analysis of different attributes on the data sets.
Archive | 2015
Chunyong Yin; Lu Feng; Luyu Ma; Zhichao Yin; Jin Wang
Archive | 2015
Chunyong Yin; Jun Xiang; Hui Zhang; Zhichao Yin; Jin Wang