期刊文献+

A Variance Reducing Stochastic Proximal Method with Acceleration Techniques

原文传递
导出
摘要 We consider a fundamental problem in the field of machine learning—structural risk minimization,which can be represented as the average of a large number of smooth component functions plus a simple and convex(but possibly non-smooth)function.In this paper,we propose a novel proximal variance reducing stochastic method building on the introduced Point-SAGA.Our method achieves two proximal operator calculations by combining the fast Douglas–Rachford splitting and refers to the scheme of the FISTA algorithm in the choice of momentum factors.We show that the objective function value converges to the iteration point at the rate of O(1/k)when each loss function is convex and smooth.In addition,we prove that our method achieves a linear convergence rate for strongly convex and smooth loss functions.Experiments demonstrate the effectiveness of the proposed algorithm,especially when the loss function is ill-conditioned with good acceleration.
出处 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2023年第6期999-1008,共10页 清华大学学报(自然科学版(英文版)
作者简介 Jialin Lei received the BEng degree from Henan Institute of Science and Technology,China in 2020.He is currently a master student at Zhejiang Normal University,China.His research interests include machine learning and optimization algorithm.E-mail:jialinlei@zjnu.edu.cn;To whom correspondence should be addressed:Ying Zhang received the PhD degree in operations research and cybernetics from Shanghai University,China in 2009.She is currently an associate professor at Zhejiang Normal University,China.Her research interests include optimal control,global optimization,and machine learning.She has published some papers in international journals,such as Applied Mathematical Modelling,Journal of Computational and Applied Mathematics,and Communications in Nonlinear Science and Numerical Simulation.znuzy@zjnu.cn;Zhao Zhang received the PhD degree in applied mathematics from Xinjiang University,China in 2003.She is currently a distinguished professor at Zhejiang Normal University,China.Her research interests include approximation algorithm,combinatorial optimization,and machine learning.She has published more than 180 academic papers.zhaozhang@zjnu.cn.
  • 相关文献

参考文献2

二级参考文献34

  • 1Gartner, Gartner says Android has surpassed a billion shipments of devices, http://www.gartner.com/ newsroongid/2954317, 2015.
  • 2T. Vidas, D. Votipka, and N. Christin, All your droid are belong to us: A survey of current Android attacks, inProceedings of the 5th USENIX Workshop on Offensive Technologies (WOOT), 2011, pp. 81-90.
  • 3A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, A survey of mobile malware in the wild, in Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2011, pp. 3-14.
  • 4McAfee, McAfee labs threats report, http://www. mcafee.con-dus/resources/reports/rp-quarterly-threat-q4- 2013.pdf, 2015.
  • 5A. Mylonas, A. Kastania, and D. Gritzalis, Delegate the smartphone user? Security awareness in smartphone platforms, Computers & Security, vol. 34, pp. 47-66, 2013.
  • 6Z. Fang, W. Han, and Y. Li, Permission based Android security: Issues and countermeasures, Computers & Security, vol. 43, pp. 205-218, 2014.
  • 7J. Xu, Y.-T. Yu, Z. Chert, B. Cao, W. Dong, Y. Guo, and J. Cao, Mobsafe: Cloud computing based forensic analysis for massive mobile applications using data mining, Tsinghua Science and Technology, vol. 18, no. 4, pp. 418--427, 2013.
  • 8R. Pandita, X. Xiao, W. Yang, W. Enck, and T. Xie, Whyper: Towards automating risk assessment of mobile applications, in Proceedings of the 22nd USENIX Security Symposium (USENIX Security), 2013, pp. 527-542.
  • 9Z. Qu, V. Rastogi, X. Zhang, Y. Chen, T. Zhu, and Z. Chen, Autocog: Measuring the description-to-permission fidelity in Android applications, in Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS), 2014, pp. 1354-1365.
  • 10D. Geneiatakis, I. N. Fovino, I. Kounelis, and P. Stirparo, A permission verification approach for Android mobile applications, Computers & Security, vol. 49, pp. 192-205, 2015.

共引文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部