Meta learning for imbalanced big data analysis by using generative adversarial networks

Sanghyun Seo, Yongjin Jeon, Juntae Kim

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Imbalanced big data means big data where the ratio of a certain class is relatively small compared to other classes. When the machine learning model is trained by using imbalanced big data, the problem with performance drops for the minority class occurs. For this reason, various oversampling methodologies have been proposed, but simple oversampling leads to problem of the overfitting. In this paper, we propose a meta learning methodology for efficient analysis of imbalanced big data. The proposed meta learning methodology uses the meta information of the data generated by the generative model based on Generative Adversarial Networks. It prevents the generative model from becoming too similar to the real data in minority class. Compared to the simple oversampling methodology for analyzing imbalanced big data, it is less likely to cause overfitting. Experimental results show that the proposed method can efficiently analyze imbalanced big data.

Original languageEnglish
Title of host publicationICBDC 2018 - Proceedings of 2018 International Conference on Big Data and Computing
PublisherAssociation for Computing Machinery
Pages5-9
Number of pages5
ISBN (Print)9781450364263
DOIs
StatePublished - 28 Apr 2018
Event2018 International Conference on Big Data and Computing, ICBDC 2018 - Shenzhen, China
Duration: 28 Apr 201830 Apr 2018

Publication series

NameACM International Conference Proceeding Series

Conference

Conference2018 International Conference on Big Data and Computing, ICBDC 2018
Country/TerritoryChina
CityShenzhen
Period28/04/1830/04/18

Keywords

  • Generative adversarial network
  • Imbalanced big data analysis
  • Meta learning
  • Oversampling

Fingerprint

Dive into the research topics of 'Meta learning for imbalanced big data analysis by using generative adversarial networks'. Together they form a unique fingerprint.

Cite this