skip to main content
10.1145/3318299.3318350acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmlcConference Proceedingsconference-collections
research-article

An Abnormal Phone Identification Model with Meta-learning Two-layer Framework Based on PCA Dimension Reduction

Authors Info & Claims
Published:22 February 2019Publication History

ABSTRACT

In the telecommunications industry, it is a critical and challenging problem that identify fraudulent calls in time. In the traditional abnormal phone identification method, there are generally cases where the initiative is weak and the recognition accuracy is low. In order to solve the problem of data sample imbalance and dirty data in the sample set, we use ensemble algorithms to improve the recognition accuracy of abnormal phones. Specially, we design a meta-learning two-layer framework (MTF) algorithm by integrating heterogeneous learners based on PCA dimension reduction. The experiment demonstrates that the MTF model has a great improvement in the abnormal phone identification compared with traditional classification method.

References

  1. Alexey Tsymbal, Seppo Puuronen. Principles of Data Mining and Knowledge Discovery{M}. Springer Berlin Heidelberg: 2002-07-18.Google ScholarGoogle Scholar
  2. Yang X, Zhuang M A, Yuan S. Multi-class Adaboost Algorithm Based on the Adjusted Weak Classifier{J}. Journal of Electronics & Information Technology, 2016.Google ScholarGoogle Scholar
  3. L. Stratmann, S. Nelles, T. Heinen-Kammerer, R. Rychlik. Kosten der patientenkontrollierten Analgesie (PCA) im Rahmen des postoperativen Schmerzmanagements in Deutschland{J}. Der Schmerz, 2007, 21(6).Google ScholarGoogle ScholarCross RefCross Ref
  4. Refaeilzadeh P, Tang L, Liu H. Cross-Validation{J}. Encyclopedia of Database Systems, 2016:532--538.Google ScholarGoogle Scholar
  5. J. R. Quinlan. Induction of decision trees{J}. Machine Learning, 1986, 1(1):81--106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Zhenyun Deng, Xiaoshu Zhu, Debo Cheng, et al. Efficient kNN classification algorithm for big data{J}. Neurocomputing, 2016, 195(C):143--148. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Hiroshi Kominami, Hisayuki Kumamoto, Yoshiya Kera, et al. Ionic Conduction and Ion Diffusion in Binary Room-Temperature Ionic Liquids Composed of {emim}{BF4} and LiBF4{J}. Journal of Physical Chemistry B, 2017, 108(50):19527--19532.Google ScholarGoogle Scholar
  8. Abhisek Ukil. Support Vector Machine {J}. Computer Science, 2002, 1(4):1--28.Google ScholarGoogle Scholar
  9. C. Pollard. Telecom fraud: The cost of doing nothing just went up{J}. Computers & Security, 2005, 24(6). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Kuan Lun Huang, Salil S. Kanhere, Wen Hu. On the need for a reputation system in mobile phone based sensing{J}. Ad Hoc Networks, 2014, 12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Xun-yi REN, Ru-chuan WANG, Hai-yan WANG. Design and Realization of Software for Guard Against DDoS Based on Self-Similar and Optimization Filter{J}. The Journal of China Universities of Posts and Telecommunications, 2006, 13(1).Google ScholarGoogle ScholarCross RefCross Ref
  12. Dietterich, T. G. Ensemble methods in machine learning. In Proceedings of the 1st International Workshop on Multiple Classifier Systems(MCS), 2000, 1--15, Cagliari, Ita Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An Abnormal Phone Identification Model with Meta-learning Two-layer Framework Based on PCA Dimension Reduction

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICMLC '19: Proceedings of the 2019 11th International Conference on Machine Learning and Computing
      February 2019
      563 pages
      ISBN:9781450366007
      DOI:10.1145/3318299

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 February 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader