{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:53:36Z","timestamp":1777704816348,"version":"3.51.4"},"reference-count":41,"publisher":"SAGE Publications","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2021,1,4]]},"abstract":"<jats:p>In the field of security, the data labels are unknown or the labels are too expensive to label, so that clustering methods are used to detect the threat behavior contained in the big data. The most widely used probabilistic clustering model is Gaussian Mixture Models(GMM), which is flexible and powerful to apply prior knowledge for modelling the uncertainty of the data. Therefore, in this paper, we use GMM to build the threat behavior detection model. Commonly, Expectation Maximization (EM) and Variational Inference (VI) are used to estimate the optimal parameters of GMM. However, both EM and VI are quite sensitive to the initial values of the parameters. Therefore, we propose to use Singular Value Decomposition (SVD) to initialize the parameters. Firstly, SVD is used to factorize the data set matrix to get the singular value matrix and singular matrices. Then we calculate the number of the components of GMM by the first two singular values in the singular value matrix and the dimension of the data. Next, other parameters of GMM, such as the mixing coefficients, the mean and the covariance, are calculated based on the number of the components. After that, the initialization values of the parameters are input into EM and VI to estimate the optimal parameters of GMM. The experiment results indicate that our proposed method performs well on the parameters initialization of GMM clustering using EM and VI for estimating parameters.<\/jats:p>","DOI":"10.3233\/jifs-200066","type":"journal-article","created":{"date-parts":[[2020,6,12]],"date-time":"2020-06-12T12:42:25Z","timestamp":1591965745000},"page":"477-490","source":"Crossref","is-referenced-by-count":0,"title":["GMM with parameters initialization based on SVD for network threat detection"],"prefix":"10.1177","volume":"40","author":[{"given":"Yanping","family":"Xu","sequence":"first","affiliation":[{"name":"School of Cyberspace Security, Hangzhou Dianzi University, Xiasha Higher Education Zone, Hangzhou, Zhejiang Province, China"}]},{"given":"Tingcong","family":"Ye","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Hangzhou Dianzi University, Xiasha Higher Education Zone, Hangzhou, Zhejiang Province, China"}]},{"given":"Xin","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Business and Management, Shanghai International Studies University, Shanghai, China"}]},{"given":"Yuping","family":"Lai","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, North China University of Technology, Shijingshan District, Beijing, China"}]},{"given":"Jian","family":"Qiu","sequence":"additional","affiliation":[{"name":"Center for Undergraduate Education, Westlake University, Xihu District, Hangzhou, China"}]},{"given":"Lingjun","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Hangzhou Dianzi University, Xiasha Higher Education Zone, Hangzhou, Zhejiang, China"}]},{"given":"Xia","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Hangzhou Dianzi University, Xiasha Higher Education Zone, Hangzhou, Zhejiang Province, China"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-200066_ref1","volume-title":"International Conference on Rough Sets and Knowledge Technology","author":"Fan","year":"2013"},{"issue":"10","key":"10.3233\/JIFS-200066_ref2","doi-asserted-by":"crossref","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","article-title":"Intrusion detection by machine learning: A review","volume":"36","author":"Tsai","year":"2009","journal-title":"Expert Systems with Applications"},{"key":"10.3233\/JIFS-200066_ref4","doi-asserted-by":"crossref","first-page":"708","DOI":"10.1016\/j.procs.2015.08.220","article-title":"Survey on anomaly detection using data mining techniques","volume":"60","author":"Agrawal","year":"2015","journal-title":"Procedia Computer Science"},{"issue":"6","key":"10.3233\/JIFS-200066_ref5","doi-asserted-by":"crossref","first-page":"5947","DOI":"10.3233\/JIFS-169836","article-title":"Study of long short-term memory in flow-based network intrusion detection system","volume":"35","author":"Nicholas","year":"2018","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"issue":"1","key":"10.3233\/JIFS-200066_ref6","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s00180-018-0855-2","article-title":"Improved model-based clustering performance using Bayesian initialization averaging","volume":"34","author":"O\u2019Hagan","year":"2019","journal-title":"Computational Statistics"},{"issue":"1","key":"10.3233\/JIFS-200066_ref7","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/s10489-016-0814-y","article-title":"An effective synchronization clustering algorithm","volume":"46","author":"Chen","year":"2017","journal-title":"Applied Intelligence"},{"issue":"3","key":"10.3233\/JIFS-200066_ref8","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1007\/s10115-014-0808-1","article-title":"A survey on data stream clustering and classification","volume":"45","author":"Nguyen","year":"2015","journal-title":"Knowledge and Information Systems"},{"issue":"3","key":"10.3233\/JIFS-200066_ref9","doi-asserted-by":"crossref","first-page":"1833","DOI":"10.3233\/JIFS-152647","article-title":"Large-scale fuzzy multiple-medoid clustering method","volume":"32","author":"Chen","year":"2017","journal-title":"Journal of Intelligent and Fuzzy Systems"},{"issue":"3-4","key":"10.3233\/JIFS-200066_ref10","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1016\/S0167-9473(02)00163-9","article-title":"and G Govaert, Choosing starting values for the EM algorithm for getting the highest likelihood in multivariate Gaussian mixture models","volume":"41","author":"Biernacki","year":"2003","journal-title":"Computational Statistics and Data Analysis"},{"issue":"5","key":"10.3233\/JIFS-200066_ref11","doi-asserted-by":"crossref","first-page":"1724","DOI":"10.1007\/s10489-018-1332-x","article-title":"Elite fuzzy clustering ensemble based on clustering diversity and quality measures","volume":"49","author":"Bagherinia","year":"2019","journal-title":"Applied Intelligence"},{"issue":"1","key":"10.3233\/JIFS-200066_ref12","doi-asserted-by":"crossref","first-page":"502","DOI":"10.1016\/j.csda.2007.02.009","article-title":"High-dimensional data clustering","volume":"52","author":"Bouveyron","year":"2007","journal-title":"Computational Statistics and Data Analysis"},{"issue":"6","key":"10.3233\/JIFS-200066_ref13","doi-asserted-by":"crossref","first-page":"1381","DOI":"10.1016\/j.csda.2011.11.002","article-title":"Initializing the EM algorithm in Gaussian mixture models with an unknown number of components","volume":"56","author":"Melnykov","year":"2012","journal-title":"Computational Statistics and Data Analysis"},{"key":"10.3233\/JIFS-200066_ref14","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1214\/09-SS053","article-title":"Finite mixture models and model-based clustering","volume":"4","author":"Melnykov","year":"2010","journal-title":"Statistics Surveys"},{"key":"10.3233\/JIFS-200066_ref15","unstructured":"Zong B. , Song Q. and Min M.R. , et al, Deep autoencoding gaussian mixture model for unsupervised anomaly detection, 2018."},{"issue":"11","key":"10.3233\/JIFS-200066_ref16","doi-asserted-by":"crossref","first-page":"2160","DOI":"10.1109\/TPAMI.2011.63","article-title":"Bayesian estimation of beta mixture models with variational inference","volume":"33","author":"Ma","year":"2011","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"9","key":"10.3233\/JIFS-200066_ref17","doi-asserted-by":"crossref","first-page":"3132","DOI":"10.1016\/j.patcog.2014.03.030","article-title":"Bounded generalized Gaussian mixture model","volume":"47","author":"Nguyen","year":"2014","journal-title":"Pattern Recognition"},{"key":"10.3233\/JIFS-200066_ref18","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1016\/j.neucom.2018.12.066","article-title":"A novel statistical approach for clustering positive data based on finite inverted Beta-Liouville mixture models","volume":"333","author":"Hu","year":"2019","journal-title":"Neurocomputing"},{"issue":"5","key":"10.3233\/JIFS-200066_ref19","doi-asserted-by":"crossref","first-page":"3681","DOI":"10.1109\/TIE.2018.2856200","article-title":"Scalable Semisupervised GMM for Big Data Quality Prediction in Multimode Processes","volume":"66","author":"Yao","year":"2018","journal-title":"IEEE Transactions on Industrial Electronics"},{"issue":"2","key":"10.3233\/JIFS-200066_ref20","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1109\/TNNLS.2018.2844399","article-title":"Variational Bayesian learning for Dirichlet process mixture of inverted Dirichlet distributions in non-Gaussian image feature modeling","volume":"30","author":"Ma","year":"2018","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"10.3233\/JIFS-200066_ref21","doi-asserted-by":"crossref","first-page":"38146","DOI":"10.1109\/ACCESS.2019.2906669","article-title":"Positive Data Modeling Using a Mixture of Mixtures of Inverted Beta Distributions","volume":"7","author":"Lai","year":"2019","journal-title":"IEEE Access"},{"issue":"2","key":"10.3233\/JIFS-200066_ref22","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1007\/s10489-017-0909-0","article-title":"Proportional data modeling via entropy-based variational bayes learning of mixture models","volume":"47","author":"Fan","year":"2017","journal-title":"Applied Intelligence"},{"issue":"11","key":"10.3233\/JIFS-200066_ref23","doi-asserted-by":"crossref","first-page":"3950","DOI":"10.1016\/j.patcog.2012.04.031","article-title":"A robust EM clustering algorithm for Gaussian mixture models","volume":"45","author":"Yang","year":"2012","journal-title":"Pattern Recognition"},{"issue":"4","key":"10.3233\/JIFS-200066_ref24","doi-asserted-by":"crossref","first-page":"319","DOI":"10.3233\/IDA-2007-11402","article-title":"In search of deterministic methods for initializing K-means and Gaussian mixture clustering","volume":"11","author":"Su","year":"2007","journal-title":"Intelligent Data Analysis"},{"issue":"4","key":"10.3233\/JIFS-200066_ref26","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1109\/TSMCB.2006.872273","article-title":"Variational learning for Gaussian mixture models","volume":"36","author":"Nasios","year":"2006","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)"},{"issue":"1","key":"10.3233\/JIFS-200066_ref27","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/TCBB.2007.70244","article-title":"Initializing partition-optimization algorithms","volume":"6","author":"Maitra","year":"2009","journal-title":"IEEE\/ACM Transactions on Computational Biology and Bioinformatics"},{"issue":"458","key":"10.3233\/JIFS-200066_ref28","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1198\/016214502760047131","article-title":"Model-based clustering, discriminant analysis, and density estimation","volume":"97","author":"Fraley","year":"2002","journal-title":"Journal of the American Statistical Association"},{"key":"10.3233\/JIFS-200066_ref29","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.datak.2018.07.003","article-title":"ICGT: A novel incremental clustering approach based on GMM tree","volume":"117","author":"Wan","year":"2018","journal-title":"Data & Knowledge Engineering"},{"issue":"2","key":"10.3233\/JIFS-200066_ref30","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1198\/jcgs.2009.08054","article-title":"Simulating data to study performance of finite mixture modeling and clustering algorithms","volume":"19","author":"Maitra","year":"2010","journal-title":"Journal of Computational and Graphical Statistics"},{"issue":"3-4","key":"10.3233\/JIFS-200066_ref31","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1016\/S0167-9473(02)00177-9","article-title":"Choosing initial values for the EM algorithm for finite mixtures","volume":"41","author":"Karlis","year":"2003","journal-title":"Computational Statistics and Data Analysis"},{"issue":"4","key":"10.3233\/JIFS-200066_ref32","doi-asserted-by":"crossref","first-page":"1350","DOI":"10.1016\/j.patcog.2007.09.010","article-title":"SVD based initialization: A head start for nonnegative matrix factorization","volume":"41","author":"Boutsidis","year":"2008","journal-title":"Pattern Recognition"},{"key":"10.3233\/JIFS-200066_ref38","unstructured":"Bishop C.M. , Pattern recognition and machine learning, Springer, Berlin, 2006."},{"issue":"1","key":"10.3233\/JIFS-200066_ref40","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1214\/06-BA104","article-title":"Variational inference for Dirichlet process mixtures","volume":"1","author":"Blei","year":"2006","journal-title":"Bayesian Analysis"},{"issue":"3","key":"10.3233\/JIFS-200066_ref42","doi-asserted-by":"crossref","first-page":"979","DOI":"10.1007\/s00500-014-1557-5","article-title":"Variational learning of hierarchical infinite generalized Dirichlet mixture models and applications","volume":"20","author":"Fan","year":"2016","journal-title":"Soft Computing"},{"key":"10.3233\/JIFS-200066_ref43","first-page":"15","article-title":"Variational Bayesian approach to movie rating prediction","volume":"7","author":"Lim","year":"2007","journal-title":"Proceedings of KDD cup and workshop"},{"issue":"6","key":"10.3233\/JIFS-200066_ref44","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/MSP.2008.929620","article-title":"The variational approximation for Bayesian inference","volume":"25","author":"Tzikas","year":"2008","journal-title":"IEEE Signal Processing Magazine"},{"issue":"1","key":"10.3233\/JIFS-200066_ref45","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1162\/089976603321043766","article-title":"Variational mixture of Bayesian independent component analyzers","volume":"15","author":"Choudrey","year":"2003","journal-title":"Neural Computation"},{"key":"10.3233\/JIFS-200066_ref46","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.laa.2018.09.014","article-title":"SVD update methods for large matrices and applications","volume":"561","author":"Pe\u00f1a","year":"2019","journal-title":"Linear Algebra and its Applications"},{"key":"10.3233\/JIFS-200066_ref47","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.patrec.2015.05.019","article-title":"New SVD based initialization strategy for non-negative matrix factorization","volume":"63","author":"Qiao","year":"2015","journal-title":"Pattern Recognition Letters"},{"key":"10.3233\/JIFS-200066_ref48","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.ymssp.2015.08.033","article-title":"Singular value decomposition packet and its application to extraction of weak fault feature","volume":"70","author":"Zhao","year":"2016","journal-title":"Mechanical Systems and Signal Processing"},{"issue":"1","key":"10.3233\/JIFS-200066_ref49","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/s10489-015-0691-9","article-title":"Sparse inverse covariance learning of conditional Gaussian mixtures for multiple output regression","volume":"44","author":"Kim","year":"2016","journal-title":"Applied Intelligence"},{"issue":"9","key":"10.3233\/JIFS-200066_ref51","first-page":"1e0162259","article-title":"What to do when k-means clustering fails: A simple yet principled alternative algorithm","volume":"1","author":"Raykov","year":"2016","journal-title":"PloS One"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-200066","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:42:05Z","timestamp":1777455725000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-200066"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,4]]},"references-count":41,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.3233\/jifs-200066","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,4]]}}}