ABSTRACT
In the telecommunications industry, it is a critical and challenging problem that identify fraudulent calls in time. In the traditional abnormal phone identification method, there are generally cases where the initiative is weak and the recognition accuracy is low. In order to solve the problem of data sample imbalance and dirty data in the sample set, we use ensemble algorithms to improve the recognition accuracy of abnormal phones. Specially, we design a meta-learning two-layer framework (MTF) algorithm by integrating heterogeneous learners based on PCA dimension reduction. The experiment demonstrates that the MTF model has a great improvement in the abnormal phone identification compared with traditional classification method.
- Alexey Tsymbal, Seppo Puuronen. Principles of Data Mining and Knowledge Discovery{M}. Springer Berlin Heidelberg: 2002-07-18.Google Scholar
- Yang X, Zhuang M A, Yuan S. Multi-class Adaboost Algorithm Based on the Adjusted Weak Classifier{J}. Journal of Electronics & Information Technology, 2016.Google Scholar
- L. Stratmann, S. Nelles, T. Heinen-Kammerer, R. Rychlik. Kosten der patientenkontrollierten Analgesie (PCA) im Rahmen des postoperativen Schmerzmanagements in Deutschland{J}. Der Schmerz, 2007, 21(6).Google ScholarCross Ref
- Refaeilzadeh P, Tang L, Liu H. Cross-Validation{J}. Encyclopedia of Database Systems, 2016:532--538.Google Scholar
- J. R. Quinlan. Induction of decision trees{J}. Machine Learning, 1986, 1(1):81--106. Google ScholarDigital Library
- Zhenyun Deng, Xiaoshu Zhu, Debo Cheng, et al. Efficient kNN classification algorithm for big data{J}. Neurocomputing, 2016, 195(C):143--148. Google ScholarDigital Library
- Hiroshi Kominami, Hisayuki Kumamoto, Yoshiya Kera, et al. Ionic Conduction and Ion Diffusion in Binary Room-Temperature Ionic Liquids Composed of {emim}{BF4} and LiBF4{J}. Journal of Physical Chemistry B, 2017, 108(50):19527--19532.Google Scholar
- Abhisek Ukil. Support Vector Machine {J}. Computer Science, 2002, 1(4):1--28.Google Scholar
- C. Pollard. Telecom fraud: The cost of doing nothing just went up{J}. Computers & Security, 2005, 24(6). Google ScholarDigital Library
- Kuan Lun Huang, Salil S. Kanhere, Wen Hu. On the need for a reputation system in mobile phone based sensing{J}. Ad Hoc Networks, 2014, 12. Google ScholarDigital Library
- Xun-yi REN, Ru-chuan WANG, Hai-yan WANG. Design and Realization of Software for Guard Against DDoS Based on Self-Similar and Optimization Filter{J}. The Journal of China Universities of Posts and Telecommunications, 2006, 13(1).Google ScholarCross Ref
- Dietterich, T. G. Ensemble methods in machine learning. In Proceedings of the 1st International Workshop on Multiple Classifier Systems(MCS), 2000, 1--15, Cagliari, Ita Google ScholarDigital Library
Index Terms
- An Abnormal Phone Identification Model with Meta-learning Two-layer Framework Based on PCA Dimension Reduction
Recommendations
A probabilistic classifier ensemble weighting scheme based on cross-validated accuracy estimates
AbstractOur hypothesis is that building ensembles of small sets of strong classifiers constructed with different learning algorithms is, on average, the best approach to classification for real-world problems. We propose a simple mechanism for building ...
Abnormal telephone identification via an ensemble-based classification framework
ACM TURC '19: Proceedings of the ACM Turing Celebration Conference - ChinaAbnormal telephone that often appeared in our daily life has nearly crazed all people. Most of existing solutions to the problem cannot identify them in time with low efficiency and poor prediction. By cooperating with a telecom company, we have ...
Optimal construction of one-against-one classifier based on meta-learning
A commonly used strategy for solving a multi-class classification problem is to decompose the original problem into several binary subproblems. The recently proposed method, diversified one-against-one (DOAO), constructs a one-against-one classifier by ...
Comments