skip to main content
research-article

A Novel Classification Technique based on Formal Methods

Published:28 June 2023Publication History
Skip Abstract Section

Abstract

In last years, we are witnessing a growing interest in the application of supervised machine learning techniques in the most disparate fields. One winning factor of machine learning is represented by its ability to easily create models, as it does not require prior knowledge about the application domain. Complementary to machine learning are formal methods, that intrinsically offer safeness check and mechanism for reasoning on failures. Considering the weaknesses of machine learning, a new challenge could be represented by the use of formal methods. However, formal methods require the expertise of the domain, knowledge about modeling language with its semantic and mathematical rigour to specify properties. In this article, we propose a novel learning technique based on the adoption of formal methods for classification thanks to the automatic generation both of the formula and of the model. In this way the proposed method does not require any human intervention and thus it can be applied also to complex/large datasets. This leads to less effort both in using formal methods and in a better explainability and reasoning about the obtained results. Through a set of case studies from different real-world domains (i.e., driver detection, scada attack identification, arrhythmia characterization, mobile malware detection, and radiomics for lung cancer analysis), we demonstrate the usefulness of the proposed method, by showing that we are able to overcome the performances obtained from widespread classification algorithms.

REFERENCES

  1. [1] Mitchell Tom M.. 1999. Machine learning and data mining. Communications of the ACM 42, 11 (1999), 3036.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Mitchell Tom Michael. 2006. The Discipline of Machine Learning. Carnegie Mellon University, School of Computer Science, Machine Learning ....Google ScholarGoogle Scholar
  3. [3] Parnas David Lorge. 2017. The real risks of artificial intelligence. Communications of the ACM 60, 10 (2017), 2731.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Parnas David Lorge. 1988. Why engineers should not use artificial intelligence. INFOR: Information Systems and Operational Research 26, 4 (1988), 234246. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Santone Antonella, Vaglini Gigliola, and Villani Maria Luisa. 2013. Incremental construction of systems: An efficient characterization of the lacking sub-system. Science of Computer Programming 78, 9 (2013), 13461367.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Santone A.. 2003. Heuristic search + local model checking in selective mu-calculus. IEEE Transactions on Software Engineering 29, 6 (2003), 510523.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Milner Robin. 1984. Lectures on a calculus for communicating systems. In Proceedings of the International Conference on Concurrency. Springer, 197220.Google ScholarGoogle Scholar
  8. [8] Emerson E. Allen. 1997. Model checking and the mu-calculus. DIMACS Series in Discrete Mathematics 31, 31 (1997), 185214.Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Gradara S., Santone A., and Villani M. L.. 2006. DELFIN+: An efficient deadlock detection tool for CCS processes. Journal of Computer and System Sciences 72, 8 (2006), 13971412.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. [10] Francesco Nicoletta De, Lettieri Giuseppe, Santone Antonella, and Vaglini Gigliola. 2016. Heuristic search for equivalence checking. Software and System Modeling 15, 2 (2016), 513530. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  11. [11] Stirling Colin. 1989. An introduction to modal and temporal logics for CCS. In Proceedings of the Concurrency: Theory, Language, and Architecture. 220.Google ScholarGoogle Scholar
  12. [12] Milner Robin. 1989. Communication and Concurrency. Prentice Hall.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [13] Cleaveland Rance and Sims Steve. 1996. The NCSU concurrency workbench. In Proceedings of the International Conference on Computer Aided Verification. Springer, 394397.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Dougherty James, Kohavi Ron, and Sahami Mehran. 1995. Supervised and unsupervised discretization of continuous features. In Proceedings of the Machine Learning Proceedings 1995. Elsevier, 194202.Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Bernardi Mario Luca, Cimitile Marta, Martinelli Fabio, and Mercaldo Francesco. 2018. Driver and path detection through time-series classification. Journal of Advanced Transportation 2018 23, 1758731 (2018), 1–21.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Carfora Maria Francesca, Martinelli Fabio, Mercaldo Francesco, Nardone Vittoria, Orlando Albina, Santone Antonella, and Vaglini Gigliola. 2018. A “pay-how-you-drive” car insurance approach through cluster analysis. Soft Computing 23, 13 (2018), 113.Google ScholarGoogle Scholar
  17. [17] Taormina Riccardo, Stefano Galelli M. ASCE, Tippenhauer Nils Ole, Salomons Elad, Avi Ostfeld F.ASCE, Eliades Demetrios G., Mohsen Aghashahi S.M.ASCE, Sundararajan Raanju, Pourahmadi Mohsen, M. Katherine Banks F.ASCE, Brentan B. M., Campbell Enrique, Lima G., Manzi D., Ayala-Cabrera D., Herrera M., Montalvo I., Izquierdo J., Luvizotto Jr. E., Chandy Sarin E., Rasekh Amin, M.ASCE, Barker Zachary A., Campbell Bruce, Shafiee M. Ehsan, Giacomoni Marcio, Gatsis Nikolaos, Taha Ahmad, Abokifa Ahmed A., S.M.ASCE, Haddad Kelsey, Lo Cynthia S., Biswas Pratim, Pasha M. Fayzul K., Kc Bijay, Somasundaram Saravanakumar Lakshmanan, Housh Mashor, and Ohar Ziv. 2018. Battle of the attack detection algorithms: Disclosing cyber attacks on water distribution networks. Journal of Water Resources Planning and Management 144, 8 (2018), 04018048.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Kachuee Mohammad, Fazeli Shayan, and Sarrafzadeh Majid. 2018. ECG heartbeat classification: A deep transferable representation. IEEE International Conference on Healthcare Informatics (ICHI’18), IEEE, 443–444.Google ScholarGoogle Scholar
  19. [19] Arp Daniel, Spreitzenbarth Michael, Hubner Malte, Gascon Hugo, Rieck Konrad, and Siemens CERT. 2014. Drebin: Effective and explainable detection of android malware in your pocket. In Proceedings of the Ndss. 2326.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Michael Spreitzenbarth, Florian Echtler, Thomas Schreck, Felix C. Freiling, and Hoffmann Johannes. 2013. Mobilesandbox: Looking deeper into android applications. In Proceedings of the 28th International ACM Symposium on Applied Computing.Google ScholarGoogle Scholar
  21. [21] Cimino Mario G. C. A., Francesco Nicoletta De, Mercaldo Francesco, Santone Antonella, and Vaglini Gigliola. 2020. Model checking for malicious family detection and phylogenetic analysis in mobile environment. Computers and Security 90, 90 (2020), 101691.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Reginelli Alfonso, Grassi Roberta, Feragalli Beatrice, Belfiore Maria Paola, Montanelli Alessandro, Patelli Gianluigi, Porta Michelearcangelo La, Urraro Fabrizio, Fusco Roberta, Granata Vincenza, Petrillo Antonella, Giacobbe Giuliana, Russo Gaetano Maria, Sacco Palmino, Grassi Roberto, and Cappabianca Salvatore. 2021. Coronavirus disease 2019 (COVID-19) in Italy: Double reading of chest CT examination. Biology 10, 2 (2021), 110. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Reginelli Alfonso, Nardone Valerio, Giacobbe Giuliana, Belfiore Maria Paola, Grassi Roberta, Schettino Ferdinando, Canto Mariateresa Del, Grassi Roberto, and Cappabianca Salvatore. 2021. Radiomics as a new frontier of imaging for cancer prognosis: A narrative review. Diagnostics 11, 10 (2021), 1–22. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Brunese Luca, Mercaldo Francesco, Reginelli Alfonso, and Santone Antonella. 2019. Neural networks for lung cancer detection through radiomic features. In Proceedings of the 2019 International Joint Conference on Neural Networks (IJCNN’19). IEEE, 110.Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Salzberg Steven L.. 1994. C4. 5: Programs for Machine Learning by J. Ross Quinlan. Morgan Kaufmann Publishers.Google ScholarGoogle Scholar
  26. [26] Hulten Geoff, Spencer Laurie, and Domingos Pedro. 2001. Mining time-changing data streams. In Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 97106.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Bouckaert Remco R.. 2008. Bayesian network classifiers in weka for version 3-5-7. Artificial Intelligence Tools 11, 3 (2008), 369387.Google ScholarGoogle Scholar
  28. [28] Cohen William W.. 1995. Fast effective rule induction. In Proceedings of the Machine Learning Proceedings 1995. Elsevier, 115123.Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] Chang Chih-Chung. 2001. LIBSVM: A library for support vector machines, 2001. Retrieved from http://www.csie.ntu.edu.tw/cjlin/libsvm.Google ScholarGoogle Scholar
  30. [30] Kong Zhaodan, Jones Austin, and Belta Calin. 2017. Temporal logics for learning and detection of anomalous behavior. IIEEE Transactions on Automatic Control 62, 3 (2017), 12101222.Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] Vazquez-Chanlatte Marcell, Deshmukh Jyotirmoy V., Jin Xiaoqing, and Seshia Sanjit A.. 2017. Logical clustering and learning for time-series data. In Proceedings of the International Conference on Computer Aided Verification. Springer, 305325.Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] Ketchen David J. and Shook Christopher L.. 1996. The application of cluster analysis in strategic management research: An analysis and critique. Strategic Management Journal 17, 6 (1996), 441458.Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] Bufo Sara, Bartocci Ezio, Sanguinetti Guido, Borelli Massimo, Lucangelo Umberto, and Bortolussi Luca. 2014. Temporal logic based monitoring of assisted ventilation in intensive care patients. In Proceedings of the International Symposium On Leveraging Applications of Formal Methods, Verification and Validation. Springer, 391403.Google ScholarGoogle ScholarCross RefCross Ref
  34. [34] Calzone Laurence, Chabrier-Rivier Nathalie, Fages François, and Soliman Sylvain. 2006. Machine learning biochemical networks from temporal logic properties. In Proceedings of the Transactions on Computational Systems Biology VI. Springer, 6894.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. [35] Liu Bing, Ma Yiming, and Wong Ching-Kian. 2001. Classification using association rules: Weaknesses and enhancements. In Proceedings of the Data Mining for Scientific and Engineering Applications. Springer, 591605.Google ScholarGoogle ScholarCross RefCross Ref
  36. [36] Grosu Radu, Smolka Scott A., Corradini Flavio, Wasilewska Anita, Entcheva Emilia, and Bartocci Ezio. 2009. Learning and detecting emergent behavior in networks of cardiac myocytes. Communications of the ACM 52, 3 (2009), 97105.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. [37] Yang Hengyi, Hoxha Bardh, and Fainekos Georgios. 2012. Querying parametric temporal logic properties on embedded systems. In Proceedings of the IFIP International Conference on Testing Software and Systems. Springer, 136151.Google ScholarGoogle ScholarCross RefCross Ref
  38. [38] Asarin Eugene, Donzé Alexandre, Maler Oded, and Nickovic Dejan. 2011. Parametric identification of temporal properties. In Proceedings of the International Conference on Runtime Verification. Springer, 147160.Google ScholarGoogle Scholar
  39. [39] Zhang Shichao and Li Jiaye. 2021. Knn classification with one-step computation. IEEE Transactions on Knowledge and Data Engineering, IEEE.Google ScholarGoogle Scholar
  40. [40] Zhang Shichao, Li Jiaye, and Li Yangding. 2022. Reachable distance function for KNN classification. IEEE Transactions on Knowledge and Data Engineering 1, 1 (2022), 1–15.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. [41] Zhang Shichao, Li Xuelong, Zong Ming, Zhu Xiaofeng, and Wang Ruili. 2017. Efficient kNN classification with different numbers of nearest neighbors. IEEE Transactions on Neural Networks and Learning Systems 29, 5 (2017), 17741785.Google ScholarGoogle ScholarCross RefCross Ref
  42. [42] Miikkulainen Risto, Liang Jason, Meyerson Elliot, Rawal Aditya, Fink Daniel, Francon Olivier, Raju Bala, Shahrzad Hormoz, Navruzyan Arshak, Duffy Nigel, and Babak Hodjat. 2019. Evolving deep neural networks. In Proceedings of the Artificial Intelligence in the Age of Neural Networks and Brain Computing. Elsevier, 293312.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A Novel Classification Technique based on Formal Methods

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Knowledge Discovery from Data
      ACM Transactions on Knowledge Discovery from Data  Volume 17, Issue 8
      September 2023
      348 pages
      ISSN:1556-4681
      EISSN:1556-472X
      DOI:10.1145/3596449
      Issue’s Table of Contents

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 June 2023
      • Online AM: 14 April 2023
      • Accepted: 10 April 2023
      • Revised: 6 April 2023
      • Received: 12 July 2022
      Published in tkdd Volume 17, Issue 8

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
    • Article Metrics

      • Downloads (Last 12 months)253
      • Downloads (Last 6 weeks)17

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    View Full Text