Learning Gaussian Bayesian Network from Censored Data Subject to Limit of Detection by the Structural EM Algorithm

Ping-Feng Xu, Shanyi Lin, Qian-Zhen Zheng, Man-Lai Tang

Research output: Contribution to journalArticlepeer-review

1 Downloads (Pure)

Abstract

A Bayesian network offers powerful knowledge representations for independence, conditional independence and causal relationships among variables in a given domain. Despite its wide application, the detection limits of modern measurement technologies make the use of the Bayesian networks theoretically unfounded, even when the assumption of a multivariate Gaussian distribution is satisfied. In this paper, we introduce the censored Gaussian Bayesian network (GBN), an extension of GBNs designed to handle left- and right-censored data caused by instrumental detection limits. We further propose the censored Structural Expectation-Maximization (cSEM) algorithm, an iterative score-and-search framework that integrates Monte Carlo sampling in the E-step for efficient expectation computation and employs the iterative Markov chain Monte Carlo (MCMC) algorithm in the M-step to refine the network structure and parameters. This approach addresses the non-decomposability challenge of censored-data likelihoods. Through simulation studies, we illustrate the superior performance of the cSEM algorithm compared to the existing competitors in terms of network recovery when censored data exist. Finally, the proposed cSEM algorithm is applied to single-cell data with censoring to uncover the relationships among variables. The implementation of the cSEM algorithm is available on GitHub.
Original languageEnglish
Article number1482
Pages (from-to)1-20
Number of pages20
JournalMathematics
Volume13
Issue number9
Early online date30 Apr 2025
DOIs
Publication statusPublished - May 2025

Keywords

  • censored data
  • Bayesian networks
  • 62H22
  • structure learning
  • structural EM algorithm

Fingerprint

Dive into the research topics of 'Learning Gaussian Bayesian Network from Censored Data Subject to Limit of Detection by the Structural EM Algorithm'. Together they form a unique fingerprint.

Cite this