{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T21:40:07Z","timestamp":1743975607078,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642322808"},{"type":"electronic","value":"9783642322815"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32281-5_38","type":"book-chapter","created":{"date-parts":[[2012,8,13]],"date-time":"2012-08-13T12:59:36Z","timestamp":1344862776000},"page":"387-398","source":"Crossref","is-referenced-by-count":1,"title":["An Under-Sampling Approach to Imbalanced Automatic Keyphrase Extraction"],"prefix":"10.1007","author":[{"given":"Weijian","family":"Ni","sequence":"first","affiliation":[]},{"given":"Tong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qingtian","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","doi-asserted-by":"crossref","unstructured":"Song, M., Song, I.Y., Allen, R.B., Obradovic, Z.: Keyphrase extraction-based query expansion in digital libraries. In: Proceedings of the 6th ACM\/IEEE-CS JCDL, pp. 202\u2013209 (2006)","DOI":"10.1145\/1141753.1141800"},{"key":"38_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-642-03761-0_7","volume-title":"Advances in Focused Retrieval","author":"M. Lehtonen","year":"2009","unstructured":"Lehtonen, M., Doucet, A.: Enhancing Keyword Search with a Keyphrase Index. In: Geva, S., Kamps, J., Trotman, A. (eds.) INEX 2008. LNCS, vol.\u00a05631, pp. 65\u201370. Springer, Heidelberg (2009)"},{"key":"38_CR3","doi-asserted-by":"crossref","unstructured":"Wu, X., Bolivar, A.: Keyword extraction for contextual advertisement. In: Proceedings of the 17th WWW, pp. 1195\u20131196 (2008)","DOI":"10.1145\/1367497.1367723"},{"key":"38_CR4","unstructured":"Witten, I.H., Paynter, G.W., Frank, E., Gutwin, C., Nevill-Manning, C.G.: KEA: Practical Automatic Keyphrase Extraction. In: Proceedings of the 4th ACDL, pp. 254\u2013255 (1999)"},{"key":"38_CR5","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1023\/A:1009976227802","volume":"2","author":"P.D. Turney","year":"2000","unstructured":"Turney, P.D.: Learning Algorithms for Keyphrase Extraction. Information Retrieval\u00a02, 303\u2013336 (2000)","journal-title":"Information Retrieval"},{"key":"38_CR6","unstructured":"Weiss, G.M., Provost, F.: The Effect of Class Distribution on Classifier Learning: An Empirical Study. Technical Report, Department of Computer Science, Rutgers University (2001)"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Blum, A., Mitchell, T.: Combining labeled and unlabeled data with co-training. In: Proceedings of the 11th COLT, pp. 92\u2013100 (1998)","DOI":"10.1145\/279943.279962"},{"key":"38_CR8","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1023\/A:1009976227802","volume":"2","author":"P.D. Turney","year":"2000","unstructured":"Turney, P.D.: Learning Algorithms for Keyphrase Extraction. Information Retrieval\u00a02, 303\u2013336 (2000)","journal-title":"Information Retrieval"},{"key":"38_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-540-77094-7_41","volume-title":"Asian Digital Libraries. Looking Back 10 Years and Forging New Frontiers","author":"T.D. Nguyen","year":"2007","unstructured":"Nguyen, T.D., Kan, M.-Y.: Keyphrase Extraction in Scientific Publications. In: Goh, D.H.-L., Cao, T.H., S\u00f8lvberg, I.T., Rasmussen, E. (eds.) ICADL 2007. LNCS, vol.\u00a04822, pp. 317\u2013326. Springer, Heidelberg (2007)"},{"key":"38_CR10","doi-asserted-by":"crossref","unstructured":"Li, Z., Zhou, D., Juan, Y., Han, J.: Keyword Extraction for Social Snippets. In: Proceedings of the 19th WWW, pp. 1143\u20131144 (2010)","DOI":"10.1145\/1772690.1772845"},{"key":"38_CR11","doi-asserted-by":"crossref","unstructured":"Yih, W., Goodman, J., Carvalho, V.R.: Finding Advertising Keywords on Web Pages. In: Proceedings of the 15th WWW, pp. 213\u2013222 (2006)","DOI":"10.1145\/1135777.1135813"},{"key":"38_CR12","unstructured":"Mihalcea, R., Tarau, P.: TextRank: Bringing Order into Texts. In: Proceedings of the 1st EMNLP, pp. 404\u2013411 (2004)"},{"key":"38_CR13","doi-asserted-by":"crossref","unstructured":"Litvak, M., Last, M.: Graph-Based Keyword Extraction for Single-Document Summarization. In: Proceedings of the Workshop on Multi-source Multilingual Information Extraction and Summarization, pp. 17\u201324 (2008)","DOI":"10.3115\/1613172.1613178"},{"key":"38_CR14","doi-asserted-by":"crossref","unstructured":"Wan, X., Xiao, J.: CollabRank: Towards a Collaborative Approach to Single-Document Keyphrase Extraction. In: Proceedings of the 22nd COLING, pp. 969\u2013976 (2008)","DOI":"10.3115\/1599081.1599203"},{"key":"38_CR15","unstructured":"Liu, Z., Huang, W., Zheng, Y., Sun, M.: Automatic Keyphrase Extraction via Topic Decomposition. In: Proceedings of the 7th EMNLP, pp. 366\u2013376 (2010)"},{"key":"38_CR16","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1109\/TSMCB.2008.2007853","volume":"39","author":"X. Liu","year":"2009","unstructured":"Liu, X., Wu, J., Zhou, Z.: Exploratory Under-Sampling for Class-Imbalance Learning. IEEE Transactions on Systems, Man, and Cybernetics, Part B\u00a039, 539\u2013550 (2009)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B"},{"key":"38_CR17","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.953","volume":"6","author":"N.V. Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: Synthetic Minority Over-Sampling Technique. Journal of Artificial Intelligence Research\u00a06, 321\u2013357 (2002)","journal-title":"Journal of Artificial Intelligence Research"},{"key":"38_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"878","DOI":"10.1007\/11538059_91","volume-title":"Advances in Intelligent Computing","author":"H. Han","year":"2005","unstructured":"Han, H., Wang, W.-Y., Mao, B.-H.: Borderline-SMOTE: A New Over-Sampling Method in Imbalanced Data Sets Learning. In: Huang, D.-S., Zhang, X.-P., Huang, G.-B. (eds.) ICIC 2005, Part I. LNCS, vol.\u00a03644, pp. 878\u2013887. Springer, Heidelberg (2005)"},{"key":"38_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-642-20847-8_26","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"X. Fan","year":"2011","unstructured":"Fan, X., Tang, K., Weise, T.: Margin-Based Over-Sampling Method for Learning from Imbalanced Datasets. In: Huang, J.Z., Cao, L., Srivastava, J. (eds.) PAKDD 2011, Part II. LNCS, vol.\u00a06635, pp. 309\u2013320. Springer, Heidelberg (2011)"},{"key":"38_CR20","doi-asserted-by":"publisher","first-page":"3358","DOI":"10.1016\/j.patcog.2007.04.009","volume":"40","author":"Y. Sun","year":"2007","unstructured":"Sun, Y., Kamel, M.S., Wong, A.K.C., Wang, Y.: Cost-sensitive boosting for classification of imbalanced data. Pattern Recognition\u00a040, 3358\u20133378 (2007)","journal-title":"Pattern Recognition"},{"key":"38_CR21","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/TKDE.2006.17","volume":"18","author":"Z. Zhou","year":"2006","unstructured":"Zhou, Z., Liu, X.: Training Cost-Sensitive Neural Networks with Methods Addressing the Class Imbalance Problem. IEEE Transactions on Knowledge and Data Engineering\u00a018, 63\u201377 (2006)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"38_CR22","doi-asserted-by":"crossref","unstructured":"Nguyen, T., Zeno, G., Lars, S.: Cost-Sensitive Learning Methods for Imbalanced Data. In: Proceedings of the 2010 IJCNN, pp. 1\u20138 (2010)","DOI":"10.1109\/IJCNN.2010.5596486"},{"key":"38_CR23","unstructured":"Li, Y., Zaragoza, H., Herbrich, R., Shawe-Taylor, J., Kandola, J.: The perceptron algorithm with uneven margins. In: Proceedings of the 19th ICML, pp. 379\u2013386 (2002)"},{"key":"38_CR24","doi-asserted-by":"crossref","unstructured":"Platt, J.: Probabilistic outputs for support vector machines and comparison to regularized likelihood methods. In: Advances in Large Margin Classifiers, pp. 61\u201374 (2000)","DOI":"10.7551\/mitpress\/1113.003.0008"},{"key":"38_CR25","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1023\/A:1025832930864","volume":"22","author":"F. Muhlenbach","year":"2004","unstructured":"Muhlenbach, F., Lallich, S., Zighed, D.A.: Identifying and Handling Mislabelled Instances. Journal of Intelligent Information Systems\u00a022, 89\u2013109 (2004)","journal-title":"Journal of Intelligent Information Systems"},{"key":"38_CR26","doi-asserted-by":"crossref","unstructured":"Ni, W., Huang, Y.: Extracting and Organizing Acronyms based on Ranking. In: Proceedings of the 7th WCICA, pp. 4542\u20134547 (2008)","DOI":"10.1109\/WCICA.2008.4594528"}],"container-title":["Lecture Notes in Computer Science","Web-Age Information Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32281-5_38.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T21:02:38Z","timestamp":1743973358000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32281-5_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642322808","9783642322815"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32281-5_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}