This disclosure relates to data mining, and more particularly to text clustering and text classification.
Text classification is a supervised learning task of assigning natural language text documents to one or more predefined categories or classes according to their contents. While it is a classical problem in the field of information retrieval for a half century, it is currently attracting an increased amount of attention due to an ever-expanding amount of text documents available in digital data format. Text classification is used in numerous fields including, for example, auto-processing of emails, filtering of junk emails, cataloguing Web pages and news articles, etc.
Text classification algorithms that utilize supervised learning typically require sufficient training data so that an obtained classification model can be used for sufficient generalization. As the amount of training data for each class decreases, the classification accuracy of traditional text classification algorithms dramatically degrades. In practical applications, labeled documents are often very sparse because manually labeling data is tedious and costly, while there are often abundant unlabeled documents. As a result, there is much interest in exploiting unlabeled data in text classification. The general problem of exploiting unlabeled data in supervised learning leads to a semi-supervised learning or labeled-unlabeled problem in different context.
The problem, in the context of text classification, could be formalized as follows. Each sample text document is represented by a vector x∈d. We are given two datasets Dl and Du. Dataset Dl is a labeled dataset, consisting of data samples (xi, ti), where 1≦i≦n, and ti is the class label with 1≦ti≦c. Dataset Du is an unlabeled dataset, consisting of unlabeled sample data xi, n+1≦i≦n+m. The semi-supervised learning task is to construct a classifier with small generalization error on unseen data based on both Dl and Du. There have been a number of work reported in developing semi-supervised text classification recently.
While it has been reported that those methods obtain considerable improvement over other supervised methods when the size of training dataset is relatively small, these techniques are substantially limited when the labeled dataset is relatively small, for instance, when it contains less than ten (10) labeled examples in each class. This is not unexpected, since these conventional techniques (e.g. co-training, TSVM and EM) typically utilize a similar iterative approach to train an initial classifier. This iterative approach is heavily based on the distribution presented in the labeled data. When the labeled data includes a very small number of samples that are distant from corresponding class centers (e.g., due to high dimensionality), these techniques will often have a poor starting point. As a result, these techniques will generally accumulate more errors during respective iterations.
In view of the above, semi-supervised learning methods construct classifiers using both labeled and unlabeled training data samples. While unlabeled data samples can help to improve the accuracy of trained models to certain extent, existing methods still face difficulties when labeled data is not sufficient and biased against the underlying data distribution.
Systems and methods for clustering-based text classification are described. In one aspect text is clustered as a function of labeled data to generate cluster(s). The text includes the labeled data and unlabeled data. Expanded labeled data is then generated as a function of the cluster(s). The expanded label data includes the labeled data and at least a portion of unlabeled data. Discriminative classifier(s) are then trained based on the expanded labeled data and remaining ones of the unlabeled data.
In the Figures, the left-most digit of a component reference number identifies the particular Figure in which the component first appears.
Overview
The following systems and methods for clustering based text classification (CBC) utilize both labeled and unlabeled data in semi-supervised learning operations. The systems and methods first cluster training data, which includes labeled and unlabeled data, with guidance of the labeled data. At least a portion of the unlabeled data is then labeled based on the obtained clusters to generate an expanded labeled dataset. In one implementation, discriminative classifiers are then trained with the expanded labeled dataset. In this manner, the systems and methods provide for semi-supervised learning treated as clustering aided by labeled data. Such labeled data may provide important information for latent class variables, assisting in the determination of parameters associated with clustering operations to affect final clustering results. By latent class variables we mean that the variables used to generate the data samples.
For instance, if we use X to represent the latent variables and Y to represent the observed data sample, then we can describe the data dependency by the conditional probability P(Y|X). We often try as much as possible to model this probability distribution by some simplified distributions such as polynomial or Gaussian so as to simplify the parameter estimations. Additionally, in one implementation, label information is propagated to unlabeled data according to clustering results. Expanded labeled data can be used in subsequent discriminative classifiers to obtain a substantially low generalization error on unseen data. Because of these operations, CBC outperforms existing algorithms when the size of labeled dataset is very small.
CBC implements the semi-supervised learning by clustering aided by labeled data, while existing methods implement it by classification aided by unlabeled data.
Semi-Supervised Learning
As discussed above, the systems and methods for semi-supervised CBC uses both the labeled dataset Dl and the unlabeled dataset Du to construct a classification model. However, how the unlabeled data could help in classification is not a trivial problem. Different methods were proposed according to different view of unlabeled data.
Expectation-Maximization (EM) has a long history in semi-supervised learning. The motivation of EM is as follows. Essentially, any classification method is to learn a conditional probability model P(t|x,θ), from a certain model family to fit the real joint distribution P(x, t). With unlabeled data, a standard statistical approach to assessing the fitness of learned models P(t|x,θ) is
where the latent labels of unlabeled data are treated as missing variables. Given Eq. 1, a Maximum Likelihood Estimation (MLE) process can be conducted to find an optimal θ. Because the form of likelihood often makes it difficult to maximize by partial derivatives, Expectation-Maximization (EM) algorithm is generally used to find a local optimal θ. Theoretically if a θ close to the global optima could be found, the result will also be optimal under the given model family. However, the selection of a plausible model family is difficult, and the local optima problem is serious especially when given a poor starting point. For example, in one approach, EM is initialized by Naive Bayes classifiers on labeled data, which may be heavily biased when there is no sufficient labeled data.
Co-Training and Transductive Support Vector Machine (TSVM) methods show sometimes superior performance over EM. For instance, a Co-Training method splits the feature set by x=(x1, x2) and trains two classifiers θ1 and θ2 each of which is sufficient for classification, with the assumption of compatibility, i.e. P(t|x1,θ1)=P(t|x2,θ2). Co-Training uses unlabeled data to place an additional restriction on the model parameter distribution P(θ), thus improving the estimation of real θ. The algorithm initially constructs two classifiers based on labeled data, and mutually selects several confident examples to expand the training set. This is based on the assumptions that an initial “weak predictor” could be found and the two feature sets are conditional independent. However, when labeled dataset is small, it is often heavily biased against the real data distribution. The above assumptions will be seriously violated.
TSVM adopts a totally different way of exploiting unlabeled data. TSVM maximizes margin over both the labeled data and the unlabeled data. TSVM works by finding a labeling tN+1, tn+2, . . . , tn+m of the unlabeled data Du and a hyperplane <w, b> which separates both Dl and Du with maximum margin. TSVM expects to find a low-density area of data and constructs a linear separator in this area. Although empirical results indicate the success of the method, there is a concern that the large margin hyperplane over the unlabeled data is not necessary to be the real classification hyperplane. In text classification, because of the high dimensionality and data sparseness, there are often many low-density areas between positive and negative labeled examples.
For purposes of discussion, we briefly describe concepts of high dimensionality, data sparseness, and positive and negative labeled examples. If we represent each data example as a vector (in text domain, a vector is composed of TF*IDF values for each keywords), then it can be denoted by a point in a high-dimensional space (because there are typically several hundreds of thousands of vocabularies for text document, each of which is a component of the vector). In such a high dimensional space, one data example is often far from another example. This is called the data sparseness. SVM-like classifiers treat the multi-class problem as a combination of multiple binary classification problem (in which data examples can only be labeled as either positive or negative), so it seeks to find a hyperplane to separate the two examples.
Instead of using two conditional independent features in the co-training setting, two SVM classifiers can be co-trained using two feature spaces from different views. One is the original feature space and the other is derived from clustering the labeled and unlabeled data. Two hybrid algorithms have been proposed, co-EM and self-training, using two randomly split features in co-training setting. This technique has determined that co-training is better than non-co-training algorithms such as self-training.
As a summary, existing semi-supervised methods still work in the supervised fashion, that is, they pay more attention to the labeled dataset, and rely on the distribution presented in the labeled dataset heavily. With the help of the unlabeled data, extra information on data distribution can help to improve the generalization performance. However, if the number of samples contained in the labeled data is extremely small, such existing algorithms may not work well as the labeled data can hardly represent the distribution in unseen data from the beginning. This is often the case for text classification where the dimensionality is very high and a labeled dataset of small size just represents a few isolated points in a huge space.
Clustering Based Classification
The expanded labeled dataset 218 is used to construct the final classification model. CBC module 208 trains classifiers 220 with the label data 214, which now includes expanded labeled dataset 218 and the remaining unlabeled data 212 (i.e., the unlabeled data minus the unlabeled data that is not being treated as part of the expanded label dataset 218).
This approach combines merits of both clustering and classification methods. Clustering operations reduce the impact of any bias caused by initial sparse labeled data. With sufficient expanded labeled data, the CBC module 208 uses discriminative classifiers to achieve better generalization performance than pure clustering methods. More particularly, clustering methods are more robust to the bias caused by the initial sparse labeled data. Let us take k-means, the most popular clustering algorithm as an example. In essence, k-means is a simplified version of EM working on spherical Gaussian distribution models. They can be approximately described by MLE of k spherical Gaussian distributions, where the means μ1, . . . , μk and the identical covariances Σ are latent variables. Thus with the aid of labeled data, the objective is to find an optimal θ=<μ1, . . . , μk, Σ> to maximize the log-likelihood of Eq. 1 where the P(x|ti, θ) equals to
When the number of labeled examples is small, the bias of labeled example will not affect much the likelihood estimation and the finding of the optimal θ.
Second, methodology of CBC module 208 represents a generative classifier, i.e., it constructs a classifier derived from the generative model of its data P(x|t,θ). The generative classifier and discriminative classifier (such as logistic regression, which is a general form of SVM) has been theoretically and empirically analyzed with respect to asymptotic performance. This analysis shows that generative classifiers reach their asymptotic performance faster than discriminative classifiers. For at least these reasons, CBC module 208 clustering operations are more effective with small training data, and make it easier to achieve high performance when labeled data is sparse. To address the problem that generative classifiers usually lead to higher asymptotic error than discriminative classifiers, discriminative classification method such as TSVM can be used in the second step of our approach, i.e., after clustering unlabeled data and expanding the labeled data set.
CBC module 208 clustering is guided by labeled data. Generally, clustering methods address the issue of finding a partition of available data which maximizes a certain criterion, e.g. intra-cluster similarity and inter-cluster dissimilarity. The labeled data is used to modify the criterion. There are also some parameters associated with each clustering algorithm, e.g. the number k in k-means, or split strategy of dendrogram in hierarchical clustering. The labeled data can also be used to guide the selection of these parameters. In this implementation, CBC module 208 uses a soft-constraint version of k-means algorithm for clustering, where k is equal to the number of classes in the given labeled data set. The labeled data points are used to obtain the initial labeled centroids, which are used in the clustering process to constraint the cluster result.
Combining Clustering with Classification
Two-step clustering based classification, i.e., clustering followed by classification, can be viewed as a conceptual approach. Another strategy of combining clustering and classification is through iterative reinforcement. That is, we first train a clustering model L1 based on all available data, obtaining an approximately correct classifier. Afterwards, we select from unlabeled data examples that are confidently classified by L1 (i.e. examples with high likelihood) and combine them with original labeled data to train a new model L2. Because more labeled data are used, the obtained L2 is expected to be more accurate and can provide more confident training examples for L1. We use the new labeled dataset to train L1 again. This process is iterated until all examples are labeled.
We now describe how the labeled dataset 214 is expanded. In principle, we can just assign the label to the most confident p % of examples from each of the resulting clusters. If we choose p=100% after first clustering process, we actually have a two-step approach. First, we determine the value of p. The selection of p is a tradeoff between the number of labeled samples and possible noise introduced by the labeling error. Obviously, with higher p, a large labeled dataset will be obtained. In general, a classifier with higher accuracy can be obtained with more training samples. On the other hand, when we expand more samples, we might introduce incorrectly labeled samples into the labeled dataset, which become noise and will degrade the performance of a classification algorithm. Furthermore, small p means more iteration in the reinforcement process.
We choose “confident examples” of unlabeled data 212 for expanding the labeled dataset 214. Note that any learned model is an estimation of the real data model P(x,t). We can find examples that are confidently classified by a given model if a slightly change of θ has no impact on them. When more examples are given, the model estimation will become more accurate, and the number of confident examples will grow. As illustrated in
We assume that class labels t are uniformly distributed. Since the Gaussian is spherical, the log-likelihood of a given data point and the estimated label is
log(P(x*,t*|θ))=log(P(x*|t*,θ)P(t*|θ)=−c1∥x−μ*∥2 +c2 (3)
where c1 and c2 are positive constants. The most probable points in a single Gaussian distribution are the points that are nearest to the distribution mean.
To get the most confident examples from the result of TSVM, we draw a probabilistic view of the TSVM. Let us take logistic regression as an example, which is a general form of discriminative methods. The objective is to maximize
where f(xi,θ) is some linear function depending on the parameter θ. θ is typically a linear combination of training examples. Under the margin maximization classifier such as SVM, the likelihood of a given point x* and its label t*=+ can be derived from the above equation:
which considers points with largest margin the most probable.
An Exemplary Procedure
At block 602, CBC module 208 tokenizes all documents of data set 210 into terms and constructs one component for each distinct term. Such tokenized information and resulting vectors are shown by respective portions of “other data” 222 of
At block 604, CBC module 208 clusters the tokenized terms with the help of labeled data 214 to generate cluster(s) 216. In this implementation, CBC module 208 implements an iterative reinforcement strategy. During each iteration, a soft-constrained version of k-means is used for clustering. We compute the centroids of the labeled data for each class (which is called “labeled centroids”) and use them as the initial centroids for k-means. (Such computed centroids are shown as a respective portion of “other data” 222). The k value is set to the number of classes in the labeled data 214. CBC module 208 runs k-means on both labeled 214 and unlabeled data 212. The iterative loop is terminated when clustering result doesn't change anymore, or just before a labeled centroid being assigned to a wrong cluster. This sets “soft constraints” on clustering because the constraints are not based on exact examples but on their centroid. The constraints will reduce bias in the labeled examples. Finally, at least a portion of unlabeled data 212 are assigned labels as labeled centroid in the same cluster.
Exemplary operations of block 604 are described in greater detail, wherein input includes: labeled data set Dl, unlabeled data set Du, the full labeled set Dl′=Dl+(Du, Tu*). The current labeled and unlabeled data sets are initialized as Dl′=Dl, Du′=Du. These clustering operations are repeated until Du′=Ø (cluster result doesn't change any more).
i=1 . . . c, xj∈Dl, and set current centroids oi*=oi. The label(s) of the centroids t(oi)=t(oi*) are equal to labels of the corresponding examples.
i=1 . . . c, xj∈Dl+Du.
In this implementation, a cosine function is used as a similarity measure for two documents:
This measure is also used in the clustering algorithm to calculate the distance from an example to a centroid (which is also normalized). This simple representation is efficient for supervised learning, e.g. in most tasks they are linear separatable.
At block 606, CBC module 208 selects substantially most confident examples (i.e. examples nearest to cluster centroids) to form a new labeled set 214, which includes expanded label dataset 218, together with remaining unlabeled data 212, to train a TSVM classifier 220.
At block 608, CBC module 208 trains discriminative classifier(s) 220 based on Dl′ and Du′. In this implementation, CBC module 208 uses a TSVM classifier with a linear kernel. At block 610, it is determined whether all examples have class labels. If so, then the classifier(s) 220 are ready to be used to classify text. At block 612, text is classified using the classifier(s) 220. For purposes of illustration, text to be classified and classified text is shown as a respective portion of “other data” 122 of
An Exemplary Operating Environment
Although not required, the systems and methods for clustering based text classification are described in the general context of computer-executable instructions (program modules) being executed by a personal computer. Program modules generally include routines, programs, objects, components, data structures, etc., that perform particular tasks or implement particular abstract data types. While the systems and methods are described in the foregoing context, acts and operations described hereinafter may also be implemented in hardware.
The methods and systems described herein are operational with numerous other general purpose or special purpose computing system, environments or configurations. Examples of well-known computing systems, environments, and/or configurations that may be suitable for use include, but are not limited to, personal computers, server computers, multiprocessor systems, microprocessor-based systems, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and so on. Compact or subset versions of the framework may also be implemented in clients of limited resources, such as handheld computers, or other computing devices. The invention is practiced in a distributed computing environment where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
With reference to
A computer 710 typically includes a variety of computer-readable media. Computer-readable media can be any available media that can be accessed by computer 710 and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer-readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by computer 710.
Communication media typically embodies computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism, and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example and not limitation, communication media includes wired media such as a wired network or a direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above should also be included within the scope of computer-readable media.
System memory 730 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 731 and random access memory (RAM) 732. A basic input/output system 733 (BIOS), containing the basic routines that help to transfer information between elements within computer 710, such as during start-up, is typically stored in ROM 731. RAM 732 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 720. By way of example and not limitation,
The computer 710 may also include other removable/non-removable, volatile/nonvolatile computer storage media. By way of example only,
The drives and their associated computer storage media discussed above and illustrated in
A user may enter commands and information into the computer 710 through input devices such as a keyboard 762 and pointing device 761, commonly referred to as a mouse, trackball or touch pad. Other input devices (not shown) may include a microphone, joystick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit 720 through a user input interface 760 that is coupled to the system bus 721, but may be connected by other interface and bus structures, such as a parallel port, game port or a universal serial bus (USB).
A monitor 791 or other type of display device is also connected to the system bus 721 via an interface, such as a video interface 790. In addition to the monitor, computers may also include other peripheral output devices such as speakers 798 and printer 796, which may be connected through an output peripheral interface 795.
The computer 710 operates in a networked environment using logical connections to one or more remote computers, such as a remote computer 780. The remote computer 780 may be a personal computer, a server, a router, a network PC, a peer device or other common network node, and as a function of its particular implementation, may include many or all of the elements described above relative to the computer 710, although only a memory storage device 781 has been illustrated in
When used in a LAN networking environment, the computer 710 is connected to the LAN 781 through a network interface or adapter 780. When used in a WAN networking environment, the computer 710 typically includes a modem 782 or other means for establishing communications over the WAN 783, such as the Internet. The modem 782, which may be internal or external, may be connected to the system bus 721 via the user input interface 760, or other appropriate mechanism. In a networked environment, program modules depicted relative to the computer 710, or portions thereof, may be stored in the remote memory storage device. By way of example and not limitation,
Although the systems and methods for clustering based text classification have been described in language specific to structural features and/or methodological operations or actions, it is understood that the implementations defined in the appended claims are not necessarily limited to the specific features or actions described. For instance, in one implementation, other clustering methods can be used and/or adjustments of the similarity measure with the aid of labeled examples. In yet another implementation, validity of two general classifiers is evaluated in the described CBC framework of system 200, confidence assessment, and noise control is also considered for additional performance improvements. Accordingly, the specific features and actions are disclosed as exemplary forms of implementing the claimed subject matter.
This patent application claims priority to U.S. provisional patent application Ser. No. 60/562,911, titled “Clustering Based Text Classification”, filed on Apr. 15, 2004, which is hereby incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
5297042 | Morita | Mar 1994 | A |
5361628 | Marko et al. | Nov 1994 | A |
5418948 | Turtle | May 1995 | A |
5442778 | Pedersen et al. | Aug 1995 | A |
5488725 | Turtle et al. | Jan 1996 | A |
5694592 | Driscoll | Dec 1997 | A |
5812134 | Pooser et al. | Sep 1998 | A |
5819258 | Vaithyanathan et al. | Oct 1998 | A |
5845278 | Kirsch et al. | Dec 1998 | A |
5987460 | Niwa et al. | Nov 1999 | A |
6003027 | Prager | Dec 1999 | A |
6006225 | Bowman et al. | Dec 1999 | A |
6112202 | Kleinberg | Aug 2000 | A |
6167398 | Wyard et al. | Dec 2000 | A |
6169986 | Bowman et al. | Jan 2001 | B1 |
6188776 | Covell et al. | Feb 2001 | B1 |
6226408 | Sirosh | May 2001 | B1 |
6298351 | Castelli et al. | Oct 2001 | B1 |
6400828 | Covell et al. | Jun 2002 | B2 |
6470307 | Turney | Oct 2002 | B1 |
6556983 | Altschuler et al. | Apr 2003 | B1 |
6560600 | Broder | May 2003 | B1 |
6615209 | Gomes et al. | Sep 2003 | B1 |
6628821 | Covell et al. | Sep 2003 | B1 |
6697998 | Damerau et al. | Feb 2004 | B1 |
6711585 | Copperman et al. | Mar 2004 | B1 |
6742003 | Heckerman et al. | May 2004 | B2 |
6760714 | Caid et al. | Jul 2004 | B1 |
6772120 | Moreno et al. | Aug 2004 | B1 |
6892193 | Bolle et al. | May 2005 | B2 |
6944602 | Cristianini | Sep 2005 | B2 |
7136876 | Adar et al. | Nov 2006 | B1 |
20020015366 | Sawano | Feb 2002 | A1 |
20020178153 | Nishioka et al. | Nov 2002 | A1 |
20030046389 | Thieme | Mar 2003 | A1 |
20030065632 | Hubey | Apr 2003 | A1 |
20030110181 | Schuetze et al. | Jun 2003 | A1 |
20030200198 | Chandrasekar et al. | Oct 2003 | A1 |
20030208482 | Kim et al. | Nov 2003 | A1 |
20030226100 | Farahat et al. | Dec 2003 | A1 |
20030233370 | Barabas et al. | Dec 2003 | A1 |
20040010331 | Terada et al. | Jan 2004 | A1 |
20040117189 | Bennett | Jun 2004 | A1 |
20040249808 | Azzarn et al. | Dec 2004 | A1 |
20050015366 | Carrasco et al. | Jan 2005 | A1 |
20050055321 | Fratkina et al. | Mar 2005 | A1 |
20050097188 | Fish | May 2005 | A1 |
20050216443 | Morton et al. | Sep 2005 | A1 |
Number | Date | Country |
---|---|---|
10029644 | Jan 2002 | DE |
0809197 | Nov 1997 | EP |
1320042 | Jun 2003 | EP |
WO9749048 | Dec 1997 | WO |
WO9948028 | Sep 1999 | WO |
Number | Date | Country | |
---|---|---|---|
20050234955 A1 | Oct 2005 | US |
Number | Date | Country | |
---|---|---|---|
60562911 | Apr 2004 | US |