{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T19:06:45Z","timestamp":1773342405391,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030707125","type":"print"},{"value":"9783030707132","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-70713-2_1","type":"book-chapter","created":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T18:06:11Z","timestamp":1620237971000},"page":"3-9","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Comparative Study of SMOTE and Bootstrapping Performance Based on Predication Methods"],"prefix":"10.1007","author":[{"given":"Abdulaziz","family":"Aborujilah","sequence":"first","affiliation":[]},{"given":"Rasheed Mohammad","family":"Nassr","sequence":"additional","affiliation":[]},{"given":"Tawfik","family":"Al-Hadhrami","sequence":"additional","affiliation":[]},{"given":"Mohd Nizam","family":"Husen","sequence":"additional","affiliation":[]},{"given":"Nor Azlina","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Abdulaleem Al-","family":"Othmani","sequence":"additional","affiliation":[]},{"given":"Mustapha","family":"Hamdi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,6]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","first-page":"24649","DOI":"10.1109\/ACCESS.2019.2899578","volume":"7","author":"SH Ebenuwa","year":"2019","unstructured":"Ebenuwa, S.H., Sharif, M.S., Alazab, M., Al-Nemrat, A.: Variance ranking attributes selection techniques for binary classification problem in imbalance data. IEEE Access 7, 24649\u201324666 (2019)","journal-title":"IEEE Access"},{"key":"1_CR2","unstructured":"Longadge, R., Dongre, S.: Class imbalance problem in data mining review. arXiv Prepr. arXiv1305.1707 (2013)"},{"key":"1_CR3","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.ins.2013.07.007","volume":"250","author":"V L\u00f3pez","year":"2013","unstructured":"L\u00f3pez, V., Fern\u00e1ndez, A., Garc\u00eda, S., Palade, V., Herrera, F.: An insight into classification with imbalanced data: Empirical results and current trends on using data intrinsic characteristics. Inf. Sci. (Ny) 250, 113\u2013141 (2013)","journal-title":"Inf. Sci. (Ny)"},{"issue":"3","key":"1_CR4","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan, Y., et al.: N-BaIoT\u2014network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput. 17(3), 12\u201322 (2018)","journal-title":"IEEE Pervasive Comput."},{"key":"1_CR5","unstructured":"Nguyen, G.H., Bouzerdoum, A., Phung, S.L.: Learning pattern classification tasks with imbalanced data sets. In: Pattern recognition, IntechOpen (2009)"},{"issue":"1","key":"1_CR6","doi-asserted-by":"publisher","first-page":"15","DOI":"10.32604\/cmc.2019.03708","volume":"58","author":"M Luo","year":"2019","unstructured":"Luo, M., Wang, K., Cai, Z., Liu, A., Li, Y., Cheang, C.F.: Using imbalanced triangle synthetic data for machine learning anomaly detection. Comput. Mater. Contin. 58(1), 15\u201326 (2019)","journal-title":"Comput. Mater. Contin."},{"key":"1_CR7","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."},{"key":"1_CR8","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.comnet.2019.05.013","volume":"159","author":"G Caminero","year":"2019","unstructured":"Caminero, G., Lopez-Martin, M., Carro, B.: Adversarial environment reinforcement learning algorithm for intrusion detection. Comput. Netw. 159, 96\u2013109 (2019)","journal-title":"Comput. Netw."},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Seiffert, C., Khoshgoftaar, T.M., Van Hulse, J.: Improving software-quality predictions with data sampling and boosting. IEEE Trans. Syst. Man, Cybern. Syst. Humans 39(6), 1283\u20131294 (2009)","DOI":"10.1109\/TSMCA.2009.2027131"},{"key":"1_CR10","unstructured":"Drummond, C., Holte, R.C.: \u201cC4. 5, class imbalance, and cost sensitivity: why under-sampling beats over-sampling. In: Workshop on learning from imbalanced datasets II, vol. 11, pp. 1\u20138 (2003)"},{"key":"1_CR11","unstructured":"Liu, A., Ghosh, J., Martin, C.E.: Generative Oversampling for Mining Imbalanced Datasets. In: DMIN, pp. 66\u201372 (2007)"},{"key":"1_CR12","doi-asserted-by":"publisher","first-page":"9145","DOI":"10.1109\/ACCESS.2016.2647238","volume":"4","author":"S Huda","year":"2016","unstructured":"Huda, S., Yearwood, J., Jelinek, H.F., Hassan, M.M., Fortino, G., Buckland, M.: A hybrid feature selection with ensemble classification for imbalanced healthcare data: a case study for brain tumor diagnosis. IEEE Access 4, 9145\u20139154 (2016)","journal-title":"IEEE Access"},{"key":"1_CR13","unstructured":"Team, A.V.C.: Practical guide to deal with imbalanced classification problems in R. Analytics Vidhya (2016)"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Wang, Q., Luo, Z., Huang, J., Feng, Y., Liu, Z.: A novel ensemble method for imbalanced data learning: bagging of extrapolation-SMOTE SVM. Comput. Intell. Neurosci. 2017, (2017)","DOI":"10.1155\/2017\/1827016"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Liu, R., Hall, L.O., Bowyer, K.W., Goldgof, D.B., Gatenby, R., Ben Ahmed, K.: Synthetic minority image over-sampling technique: How to improve AUC for glioblastoma patient survival prediction. In: 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 1357\u20131362 (2017)","DOI":"10.1109\/SMC.2017.8122802"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Wijermans, N., Conrado, C., van Steen, M., Martella, C., Li, J.: A landscape of crowd-management support: an integrative approach. Saf. Sci. 86, 142-164 (2016)","DOI":"10.1016\/j.ssci.2016.02.027"},{"issue":"1","key":"1_CR17","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/1007730.1007735","volume":"6","author":"GE Batista","year":"2004","unstructured":"Batista, G.E., Prati, R.C., Monard, M.C.: A study of the behavior of several methods for balancing machine learning training data. ACM SIGKDD Explor. Newsl. 6(1), 20\u201329 (2004)","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Maciejewski, T., Stefanowski, J.: Local neighbourhood extension of SMOTE for mining imbalanced data. In: 2011 IEEE Symposium on Computational Intelligence and Data Mining (CIDM), pp. 104\u2013111 (2011)","DOI":"10.1109\/CIDM.2011.5949434"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Stefanowski, J., Wilk, S.: Selective pre-processing of imbalanced data for improving classification performance. In: International Conference on Data Warehousing and Knowledge Discovery, pp. 283\u2013292 (2008)","DOI":"10.1007\/978-3-540-85836-2_27"},{"issue":"3","key":"1_CR20","first-page":"18","volume":"2","author":"A Liaw","year":"2002","unstructured":"Liaw, A., Wiener, M.: Classification and regression by randomForest. R news 2(3), 18\u201322 (2002)","journal-title":"R news"},{"issue":"5","key":"1_CR21","first-page":"756","volume":"2","author":"D Lavanya","year":"2011","unstructured":"Lavanya, D., Rani, D.K.U.: Analysis of feature selection with classification: breast cancer datasets. Indian J. Comput. Sci. Eng. 2(5), 756\u2013763 (2011)","journal-title":"Indian J. Comput. Sci. Eng."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Innovative Systems for Intelligent Health Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-70713-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T18:07:29Z","timestamp":1620238049000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-70713-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030707125","9783030707132"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-70713-2_1","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"6 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IRICT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Reliable Information and Communication Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Langkawi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"irict2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/irict.co\/irict2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}