{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:45:03Z","timestamp":1743025503267,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030845285"},{"type":"electronic","value":"9783030845292"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-84529-2_28","type":"book-chapter","created":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T15:01:42Z","timestamp":1628521302000},"page":"329-339","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Financial Distress Detection and Interpretation with Semi-supervised System"],"prefix":"10.1007","author":[{"given":"Xiaoqing","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Fangfang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhihua","family":"Niu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,9]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Tatiana, D., Federico, H., Mauricio, L., Sergio, L.: Financing firms in hibernation during the COVID-19 pandemic. J. Finan. Stabil. 53 (2021)","DOI":"10.1016\/j.jfs.2020.100837"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Geng, R., Bose, I., Chen, X.: Prediction of financial distress: an empirical study of listed Chinese companies using data mining. In: European Journal of Operational Research, pp. 236\u2013247. Elsevier, Netherlands (2015)","DOI":"10.1016\/j.ejor.2014.08.016"},{"key":"28_CR3","unstructured":"Kou, Y., Lu, C.T., Sirwongwattana, S., Huang, Y.P.: Survey of fraud detection techniques. In: IEEE International Conference on Networking, Sensing and Control, 2004, vol. 2, pp. 749\u2013754. IEEE (2004)"},{"key":"28_CR4","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-1-4615-0953-0_4","volume-title":"Applications of Data Mining in Computer Security","author":"E Eskin","year":"2002","unstructured":"Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.: A geometric framework for unsupervised anomaly detection. In: Barbar\u00e1, D., Jajodia, S. (eds.) Applications of Data Mining in Computer Security. Advances in Information Security, vol. 6, pp. 77\u2013101. Springer, Boston, MA (2002). https:\/\/doi.org\/10.1007\/978-1-4615-0953-0_4"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: Proceeding of the 8th IEEE International Conference on Data Mining, ICDM, pp. 413\u2013422. Institute of Electrical and Electronics Engineers Inc., Pisa, Italy (2008)","DOI":"10.1109\/ICDM.2008.17"},{"key":"28_CR6","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/335191.335388","volume":"29","author":"MB Markus","year":"2000","unstructured":"Markus, M.B., Kriegel, H.P., Raymond, T.N., Sander, J.: LOF: identifying density-based local outliers. ACM. Sigmod. Record. 29, 93\u2013104 (2000)","journal-title":"ACM. Sigmod. Record."},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Juszczak, P., Duin, R.P.: Uncertainty sampling methods for one-class classifiers. In: Proceedings of ICML 2003, Workshop on Learning with Imbalanced Data Sets II, pp. 81\u201388. AAAI, Washington (2003)","DOI":"10.1007\/3-540-44989-2_18"},{"issue":"2","key":"28_CR8","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1109\/TSMCB.2008.2007853","volume":"39","author":"X Liu","year":"2009","unstructured":"Liu, X., Wu, J., Zhou, Z.H.: Exploratory undersampling for class-imbalance learning. IEEE. Trans. Syst. Man. Cybern. Part B 39(2), 539\u2013550 (2009)","journal-title":"IEEE. Trans. Syst. Man. Cybern. Part B"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Elkan, C., Noto, K.: Learning classifiers from only positive and unlabeled data. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 213\u2013220. Association for Computing Machinery, Nevada USA (2008)","DOI":"10.1145\/1401890.1401920"},{"key":"28_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47578-3_1","author":"C Aggarwal","year":"2017","unstructured":"Aggarwal, C.: An Introduction to Outlier Analysis. Presented at the (2017). https:\/\/doi.org\/10.1007\/978-3-319-47578-3_1"},{"key":"28_CR11","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.engappai.2017.09.021","volume":"67","author":"L Puggini","year":"2018","unstructured":"Puggini, L., McLoone, S.: An enhanced variable selection and Isolation Forest based methodology for anomaly detection with OES data. Eng. App. Artif. Intell. 67, 126\u2013135 (2018)","journal-title":"Eng. App. Artif. Intell."},{"key":"28_CR12","unstructured":"Lundberg, S., Lee, S.I.: A unified approach to interpreting model predictions. In: 31st Annual Conference on Neural Information Processing Systems, NIPS 2017, pp. 4766\u20134775. Neural information processing systems foundation, CA, USA (2017)"},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, Y.L., Li, L., Zhou, J., Li, X., Zhou, Z.H.: Anomaly detection with partially observed anomalies. In: 27th International World Wide Web, pp. 639\u2013646. Association for Computing Machinery, Lyon (2018)","DOI":"10.1145\/3184558.3186580"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Mordelet, F., Vert, J. P.: A bagging SVM to learn from positive and unlabeled examples. Pattern Recognition Letters, pp.201\u2013209. Elsevier, Netherlands (2014)","DOI":"10.1016\/j.patrec.2013.06.010"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Lin, T.Y., Goyal, P., Girshick, R., He, K., Doll\u00e1r, P.: Focal loss for dense object detection. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 2980\u20132988. Elsevier, England (2017)","DOI":"10.1109\/ICCV.2017.324"},{"key":"28_CR16","unstructured":"Liu, B., Lee, W. S., Yu, P.S., Li, X.: Partially supervised classification of text documents. In: ICML, pp. 387\u2013394. Morgan Kaufmann, Sydney (2002)"},{"key":"28_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47578-3_5","author":"C Aggarwal","year":"2017","unstructured":"Aggarwal, C.: High-Dimensional Outlier Detection: The Subspace Method. Presented at the (2017). https:\/\/doi.org\/10.1007\/978-3-319-47578-3_5"},{"key":"28_CR18","unstructured":"Financial distress detection dataset. https:\/\/www.kaggle.com\/shebrahimi\/financial-distress. Accessed 26 Apr 2021"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Fawcett, T.: An introduction to ROC analysis. In: Pattern Recognition Letter, pp. 861\u2013874. Elsevier, Netherlands (2006)","DOI":"10.1016\/j.patrec.2005.10.010"}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Theories and Application"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-84529-2_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:38:01Z","timestamp":1725593881000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-84529-2_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030845285","9783030845292"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-84529-2_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"9 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzhen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2021a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/2021\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}