65 results on '"Yi-Ren Yeh"'
Search Results
52. Connecting the dots without clues: Unsupervised domain adaptation for cross-domain visual classification
- Author
-
Tzu-Ming Harry Hsu, Yi-Ren Yeh, Cheng-An Hou, Yu-Chiang Frank Wang, and Wei-Yu Chen
- Subjects
Domain adaptation ,Similarity (geometry) ,Exploit ,Matching (graph theory) ,business.industry ,Pattern recognition ,Machine learning ,computer.software_genre ,Domain (software engineering) ,Task (computing) ,Artificial intelligence ,business ,Transfer of learning ,computer ,Test data ,Mathematics - Abstract
Many real-world visual classification tasks require one to recognize test data in a particular domain of interest, while the training data can only be collected from a different domain. This can be viewed as the problem of unsupervised domain adaptation, in which the domain difference and the lack of cross-domain label/correspondence information make the recognition task very difficult. In this paper, we propose to exploit the cross-domain data correspondence using both observed data similarity and labels transferred from the source domain. This allows us to perform distribution matching for cross-domain data with recognition guarantees. Our experiments on three different cross-domain visual classification tasks would confirm the effectiveness of our method, which is shown to perform favorably against state-of-the-art unsupervised domain adaptation approaches.
- Published
- 2015
53. Recognition at a long distance: Very low resolution face recognition and hallucination
- Author
-
Chia-Po Wei, Yi-Ren Yeh, Min-Chun Yang, and Yu-Chiang Frank Wang
- Subjects
Matching (statistics) ,Face hallucination ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Pattern recognition ,Sparse approximation ,Facial recognition system ,Face (geometry) ,Three-dimensional face recognition ,Computer vision ,Artificial intelligence ,Face detection ,business ,Image resolution - Abstract
In real-world video surveillance applications, one often needs to recognize face images from a very long distance. Such recognition tasks are very challenging, since such images are typically with very low resolution (VLR). However, if one simply downsamples high-resolution (HR) training images for recognizing the VLR test inputs, or if one directly upsamples the VLR inputs for matching the HR training data, the resulting recognition performance would not be satisfactory. In this paper, we propose a joint face hallucination and recognition approach based on sparse representation. Given a VLR input image, our method is able to synthesize its person-specific HR version with recognition guarantees. In our experiments, we consider two different face image datasets. Empirical results will support the use of our approach for both VLR face recognition. In addition, compared to state-of-the-art super-resolution (SR) methods, we will also show that our method results in improved quality for the recovered HR face images.
- Published
- 2015
54. Continuous Monitoring and Distributed Anomaly Detection for Ambient Factors
- Author
-
Yi-Ren Yeh, Alvin Chiang, Yang-Chi Shen, and Yuh-Jye Lee
- Subjects
Support vector machine ,Key distribution in wireless sensor networks ,Computer science ,Computation ,Anomaly (natural sciences) ,Real-time computing ,Continuous monitoring ,Anomaly detection ,Wireless sensor network ,Interpolation - Abstract
Considering the diverse application scenarios involving wireless sensor networks (WSNs), accurate continuous monitoring requires a solution to the essential task of estimating unmeasured locations in the monitored space. In this paper, we utilize Epsilon-Smooth Support Vector Regression (Epsilon-SSVR) to report monitoring information of environment, furthermore we combine spatial and temporal correlation to strengthen monitoring accuracy. However if our sensors are too sparsely deployed, the resulting coverage holes problem will adversely impact the monitoring result. Therefore, we utilize Uniform Design and different local interpolation methods to assist Epsilon-SSVR to mitigate the coverage holes problem. In our experiment, we compare our method with different methods applied to different sensors deployments. Epsilon-SSVR has better accuracy and computation speed than others. Besides continuous monitoring, we also propose a distributed anomaly detection mechanism to report anomaly information, in order to provide a reliable and real time anomaly monitoring system.
- Published
- 2014
55. Time Series Classification with Temporal Bag-of-Words Model
- Author
-
Yi-Ren Yeh and Zi-Wen Gui
- Subjects
Time series classification ,Computer science ,business.industry ,Codebook ,Pattern recognition ,ENCODE ,computer.software_genre ,Feature Dimension ,Bag-of-words model ,Data mining ,Artificial intelligence ,Timestamp ,Time series ,Representation (mathematics) ,business ,computer - Abstract
Time series classification has attracted increasing attention in machine learning and data mining. In the analysis of time series data, how to represent data is a critical step for the performance. Generally, we can regard each time stamp as a feature dimension for time series data instance. However, this naive representation might be not suitable for data analysis due to the over-fitting of data. To address this problem, we proposed a temporal bag-of-words representation for time series classification. A codebook is generated by the representative subsequences from the time series data. Consequently, we encode a time series data instance by the codebook, which describes different local patterns of time series data. In our experiments, we demonstrate that our proposed method can achieve better results by comparing with competitive methods.
- Published
- 2014
56. Recognizing Actions across Cameras by Exploring the Correlated Subspace
- Author
-
Yu-Chiang Frank Wang, Chun-Hao Huang, and Yi-Ren Yeh
- Subjects
Computer Science::Machine Learning ,business.industry ,Pattern recognition ,Machine learning ,computer.software_genre ,Support vector machine ,Correlation ,ComputingMethodologies_PATTERNRECOGNITION ,Dimension (vector space) ,Visual Word ,Artificial intelligence ,Representation (mathematics) ,Transfer of learning ,business ,Canonical correlation ,computer ,Subspace topology ,Mathematics - Abstract
We present a novel transfer learning approach to cross-camera action recognition. Inspired by canonical correlation analysis (CCA), we first extract the spatio-temporal visual words from videos captured at different views, and derive a correlation subspace as a joint representation for different bag-of-words models at different views. Different from prior CCA-based approaches which simply train standard classifiers such as SVM in the resulting subspace, we explore the domain transfer ability of CCA in the correlation subspace, in which each dimension has a different capability in correlating source and target data. In our work, we propose a novel SVM with a correlation regularizer which incorporates such ability into the design of the SVM. Experiments on the IXMAS dataset verify the effectiveness of our method, which is shown to outperform state-of-the-art transfer learning approaches without taking such domain transfer ability into consideration.
- Published
- 2012
57. Locality-constrained group sparse representation for robust face recognition
- Author
-
Yu-Wen Chen, Yu-Wei Chao, Yu-Chiang Frank Wang, Yi-Ren Yeh, and Yuh-Jye Lee
- Subjects
Contextual image classification ,business.industry ,Computer science ,Group (mathematics) ,Locality ,Pattern recognition ,Sparse approximation ,Iterative reconstruction ,Facial recognition system ,Computer Science::Computer Vision and Pattern Recognition ,Face (geometry) ,Computer vision ,Artificial intelligence ,business ,Neural coding - Abstract
This paper presents a novel sparse representation for robust face recognition. We advance both group sparsity and data locality and formulate a unified optimization framework, which produces a locality and group sensitive sparse representation (LGSR) for improved recognition. Empirical results confirm that our LGSR not only outperforms state-of-the-art sparse coding based image classification methods, our approach is robust to variations such as lighting, pose, and facial details (glasses or not), which are typically seen in real-world face recognition problems.
- Published
- 2011
58. Introduction to Support Vector Machines and Their Applications in Bankruptcy Prognosis
- Author
-
Yuh-Jye Lee, Yi-Ren Yeh, and Hsing-Kuo Pao
- Subjects
Computer science ,Generalization ,business.industry ,Computational finance ,Scale (chemistry) ,Machine learning ,computer.software_genre ,Support vector machine ,Kernel method ,Bankruptcy ,Statistical learning theory ,Data mining ,Artificial intelligence ,business ,Regression problems ,computer - Abstract
We aim at providing a comprehensive introduction to Support Vector Machines and their applications in computational finance. Based on the advances of the statistical learning theory, one of the first SVM algorithms was proposed in mid 1990s. Since then, they have drawn a lot of research interests both in theoretical and application domains and have became the state-of-the-art techniques in solving classification and regression problems. The reason for the success is not only because of their sound theoretical foundation but also their good generalization performance in many real applications. In this chapter, we address the theoretical, algorithmic and computational issues and try our best to make the article self-contained. Moreover, in the end of this chapter, a case study on default prediction is also presented. We discuss the issues when SVM algorithms are applied to bankruptcy prognosis such as how to deal with the unbalanced dataset, how to tune the parameters to have a better performance and how to deal with large scale dataset.
- Published
- 2011
59. Group lasso regularized multiple kernel learning for heterogeneous feature selection
- Author
-
Yu-Chiang Frank Wang, Ting-Chu Lin, Yung-Yu Chung, and Yi-Ren Yeh
- Subjects
Graph kernel ,Multiple kernel learning ,business.industry ,Dimensionality reduction ,Feature vector ,Feature extraction ,Pattern recognition ,Feature selection ,Machine learning ,computer.software_genre ,Statistics::Machine Learning ,ComputingMethodologies_PATTERNRECOGNITION ,Kernel method ,Feature (computer vision) ,Artificial intelligence ,business ,computer ,Mathematics - Abstract
We propose a novel multiple kernel learning (MKL) algorithm with a group lasso regularizer, called group lasso regularized MKL (GL-MKL), for heterogeneous feature selection. We extend the existing MKL algorithm and impose a mixed l 1 and l 2 norm constraint (known as group lasso) as the regularizer. Our GL-MKL determines the optimal base kernels, including the associated weights and kernel parameters, and results in a compact set of features for comparable or improved recognition performance. The use of our GL-MKL avoids the problem of choosing the proper technique to normalize the feature attributes collected from heterogeneous domains (and thus with different properties and distribution ranges). Our approach does not need to exhaustively search for the entire feature space when performing feature selection like prior sequential-based feature selection methods did, and we do not require any prior knowledge on the optimal size of the feature subset either. Comparisons with existing MKL or sequential-based feature selection methods on a variety of datasets confirm the effectiveness of our method in selecting a compact feature subset for comparable or improved classification performance.
- Published
- 2011
60. Least-squares LDA via rank-one updates with concept drift
- Author
-
Yi-Ren Yeh and Yu-Chiang Frank Wang
- Subjects
Rank (linear algebra) ,Concept drift ,Computer science ,Group method of data handling ,business.industry ,Pattern recognition ,Linear discriminant analysis ,Least squares ,Data modeling ,ComputingMethodologies_PATTERNRECOGNITION ,Scalability ,Artificial intelligence ,Adaptive learning ,business - Abstract
Standard linear discriminant analysis (LDA) is known to be computationally expensive due to the need to perform eigen-analysis. Based on the recent success of least-squares LDA (LSLDA), we propose a novel rank-one update method for LSLDA, which not only alleviates the computation and memory requirements, and is also able to solve the adaptive learning task of concept drift. In other words, our proposed LSLDA can efficiently capture the information from recently received data with gradual or abrupt changes in distribution. Moreover, our LSLDA can be extended to recognize data with newly-added class labels during the learning process, and thus exhibits excellent scalability. Experimental results on both synthetic and real datasets confirm the effectiveness of our propose method.
- Published
- 2011
61. Anomaly Detection via Over-Sampling Principal Component Analysis
- Author
-
Zheng Yi Lee, Yuh-Jye Lee, and Yi-Ren Yeh
- Subjects
business.industry ,Computer science ,Computation ,Anomaly (natural sciences) ,Outlier ,Principal (computer security) ,Principal component analysis ,Cosine similarity ,Pattern recognition ,Anomaly detection ,Intrusion detection system ,Artificial intelligence ,business - Abstract
Outlier detection is an important issue in datamining and has been studied in different research areas. It can be used for detecting the small amount of deviated data. In this article, we use “Leave One Out” procedure to check each individual point the “with or without” effect on the variation of principal directions. Based on this idea, an over-sampling principal component analysis outlier detection method is proposed for emphasizing the influence of an abnormal instance (or an outlier). Except for identifying the suspicious outliers, we also design an on-line anomaly detection to detect the new arriving anomaly. In addition, we also study the quick updating of the principal directions for the effective computation and satisfying the on-line detecting demand. Numerical experiments show that our proposed method is effective in computation time and anomaly detection.
- Published
- 2009
62. The Default Risk of Firms Examined with Smooth Support Vector Machines
- Author
-
Yuh-Jye Lee, Wolfgang Härdle, Yi-Ren Yeh, and Dorothea Schaefer
- Subjects
Relation (database) ,business.industry ,Computer science ,jel:G30 ,jel:C45 ,Financial ratio ,Sample (statistics) ,Basel II ,Machine learning ,computer.software_genre ,jel:C14 ,jel:G33 ,Support vector machine ,Insolvency Prognosis, SVMs, Statistical Learning Theory, Non-parametric Classification models, local time-homogeneity ,Bankruptcy ,Statistical learning theory ,Insolvency Prognosis, SVMs, Statistical Learning Theory, Non-parametric Classification ,Artificial intelligence ,business ,computer ,Type I and type II errors - Abstract
In the era of Basel II a powerful tool for bankruptcy prognosis is vital for banks. The tool must be precise but also easily adaptable to the bank's objections regarding the relation of false acceptances (Type I error) and false rejections (Type II error). We explore the suitability of Smooth Support Vector Machines (SSVM), and investigate how important factors such as selection of appropriate accounting ratios (predictors), length of training period and structure of the training sample influence the precision of prediction. Furthermore we show that oversampling can be employed to gear the tradeoff between error types. Finally, we illustrate graphically how different variants of SSVM can be used jointly to support the decision task of loan officers.
- Published
- 2007
63. Bag-of-words-based anomaly-detection principal component analysis and stochastic optimization for debris flow detection and evacuation planning.
- Author
-
Chia-Chun Kuo, Yi-Ren Yeh, Kuan-wen Chou, Chien-Lin Huang, and Ming-Che Hu
- Subjects
DEBRIS avalanches ,HAZARDOUS geographic environments ,EMERGENCY management - Abstract
Debris flows are natural disasters, with soil mass, rocks, and water traveling down a mountainside slope. Debris flows are extremely dangerous; their occurrence incurs huge losses to life and property. The purpose of this research is to develop debris flow detection and emergency evacuation systems. A bag-of-words model is established for analyzing the features of debris flow events, and an anomaly-detection principal component analysis (PCA) model is proposed to detect debris flow. Using real-time debris flow prediction and monitoring, a stochastic optimization model for evacuation planning is formulated. Case studies of debris flow detection in Shenmu village and Fengchiu, central Taiwan, are conducted. Shenmu village and Fengchiu are areas of high potential debris flow, and each has a population of around 800 people. The results show that combining bag-of-words and anomaly-detection PCA methods could predict 6 out of 8 occurrences of actual events, providing a prediction rate of 75 %. In addition, the models make 13 predictions, and 6 of them are correct, providing a prediction accuracy of 46 %. Optimal parameters (including window size, bag length, filter ratio of training data, and anomaly threshold) of the models are also examined to increase the accuracy of debris flow prediction. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
64. Robust Kernel Principal Component Analysis.
- Author
-
Su-Yun Huang, Yi-Ren Yeh, and Shinto Eguchi
- Subjects
- *
KERNEL functions , *EIGENVALUES , *PRINCIPAL components analysis , *ANALYSIS of covariance , *OUTLIERS (Statistics) , *ROBUST control - Abstract
This letter discusses the robustness issue of kernel principal component analysis. A class of new robust procedures is proposed based on eigenvalue decomposition of weighted covariance. The proposed procedures will place less weight on deviant patterns and thus be more resistant to data contamination and model deviation. Theoretical influence functions are derived, and numerical examples are presented as well. Both theoretical and numerical results indicate that the proposed robust method outperforms the conventional approach in the sense of being less sensitive to outliers. Our robust method and results also apply to functional principal component analysis. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
65. A Hierarchical Framework Using Approximated Local Outlier Factor for Efficient Anomaly Detection
- Author
-
Yi-Ren Yeh, Yuh-Jye Lee, Lin Xu, and Jing Li
- Subjects
Local outlier factor ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Anomaly detection ,computer.software_genre ,Hamming distance ,Rare events ,General Earth and Planetary Sciences ,Data mining ,computer ,Wireless sensor network ,Energy (signal processing) ,Local sensitive hashing ,General Environmental Science - Abstract
Anomaly detection aims to identify rare events that deviate remarkably from existing data. To satisfy real-world appli- cations, various anomaly detection technologies have been proposed. Due to the resource constraints, such as limited energy, computation ability and memory storage, most of them cannot be directly used in wireless sensor networks (WSNs). In this work, we proposed a hierarchical anomaly detection framework to overcome the challenges of anomaly detection in WSNs. We aim to detect anomalies by the accurate model and the approximated model learned at the re- mote server and sink nodes, respectively. Besides the framework, we also proposed an approximated local outlier factor algorithm, which can be learned at the sink nodes. The proposed algorithm is more efficient in computation and storage by comparing with the standard one. Experimental results verify the feasibility of our proposed method in terms of both accuracy and efficiency.
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.