{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:48:50Z","timestamp":1771703330899,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,1,22]],"date-time":"2016-01-22T00:00:00Z","timestamp":1453420800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pattern Anal Applic"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s10044-016-0533-3","type":"journal-article","created":{"date-parts":[[2016,1,21]],"date-time":"2016-01-21T23:59:26Z","timestamp":1453420766000},"page":"769-782","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["Decision tree induction based on minority entropy for the class imbalance problem"],"prefix":"10.1007","volume":"20","author":[{"given":"Kesinee","family":"Boonchuay","sequence":"first","affiliation":[]},{"given":"Krung","family":"Sinapiromsaran","sequence":"additional","affiliation":[]},{"given":"Chidchanok","family":"Lursinsap","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,22]]},"reference":[{"key":"533_CR1","unstructured":"KDnuggets (2011) Poll results: top algorithms for analytics\/data mining (Nov 2011) which methods\/algorithms did you use for data analysis in 2011? http:\/\/www.kdnuggets.com\/2011\/11\/algorithms-for-analytics-data-mining.html . Accessed 1 Feb 2013"},{"issue":"1","key":"533_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10115-007-0114-2","volume":"14","author":"X Wu","year":"2008","unstructured":"Wu X, Kumar V, Ross Quinlan J, Ghosh J, Yang Q, Motoda H, McLachlan G, Ng A, Liu B, Yu P, Zhou ZH, Steinbach M, Hand D, Steinberg D (2008) Top 10 algorithms in data mining. Knowl Inf Syst 14(1):1\u201337. doi: 10.1007\/s10115-007-0114-2","journal-title":"Knowl Inf Syst"},{"key":"533_CR3","unstructured":"Quinlan JR (1993) C4.5: programs for machine learning. Morgan Kaufmann Publishers Inc., San Francisco"},{"key":"533_CR4","volume-title":"Experiments in induction","author":"EB Hunt","year":"1966","unstructured":"Hunt EB, Marin J, Stone PJ (1966) Experiments in induction. Academic, New York"},{"key":"533_CR5","first-page":"81","volume":"1","author":"J Quinlan","year":"1986","unstructured":"Quinlan J (1986) Induction of decision trees. Mach Learn 1:81\u2013106","journal-title":"Mach Learn"},{"key":"533_CR6","volume-title":"Classification and regression trees","author":"L Breiman","year":"1984","unstructured":"Breiman L, Friedman J, Olshen R, Stone C (1984) Classification and regression trees. Wadsworth and Brooks, Monterey"},{"key":"533_CR7","unstructured":"Dietterich T, Kearns M, Mansour Y (1996) Applying the weak learning framework to understand and improve c4.5. In: ICML, Citeseer, pp 96\u2013104"},{"key":"533_CR8","unstructured":"Drummond C, Holte RC (2000) Exploiting the cost (in) sensitivity of decision tree splitting criteria. In: ICML, pp 239\u2013246"},{"key":"533_CR9","unstructured":"Flach PA (2003) The geometry of roc space: understanding machine learning metrics through roc isometrics. In: ICML, pp 194\u2013201"},{"key":"533_CR10","unstructured":"Marcellin S, Zighed DA, Ritschard G (2006) An asymmetric entropy measure for decision trees, pp 1292\u20131299. In: 11th conference on information processing and management of uncertainty in knowledge-based systems, IPMU 2006. http:\/\/archive-ouverte.unige.ch\/unige:4531 , iD: unige:4531"},{"key":"533_CR11","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/978-3-642-05183-8_2","volume-title":"Advances in intelligent information systems, studies in computational intelligence","author":"D Zighed","year":"2010","unstructured":"Zighed D, Ritschard G, Marcellin S (2010) Asymmetric and sample size sensitive entropy measures for supervised learning. In: Ras Z, Tsay LS (eds) Advances in intelligent information systems, studies in computational intelligence, vol 265. Springer, Berlin, pp 27\u201342"},{"key":"533_CR12","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/978-3-540-87479-9_34","volume-title":"Machine learning and knowledge discovery in databases","author":"D Cieslak","year":"2008","unstructured":"Cieslak D, Chawla N (2008) Learning decision trees for unbalanced data. In: Daelemans W, Goethals B, Morik K (eds) Machine learning and knowledge discovery in databases, vol 5211, Lecture notes in computer science. Springer, Berlin, pp 241\u2013256"},{"issue":"8","key":"533_CR13","doi-asserted-by":"crossref","first-page":"2725","DOI":"10.1016\/j.patcog.2010.02.025","volume":"43","author":"B Chandra","year":"2010","unstructured":"Chandra B, Kothari R, Paul P (2010) A new node splitting measure for decision tree construction. Pattern Recognit 43(8):2725\u20132731","journal-title":"Pattern Recognit"},{"issue":"5","key":"533_CR14","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/s10115-003-0132-7","volume":"6","author":"W Fan","year":"2004","unstructured":"Fan W, Miller M, Stolfo S, Lee W, Chan P (2004) Using artificial anomalies to detect unknown and known network intrusions. Knowl Inf Syst 6(5):507\u2013527","journal-title":"Knowl Inf Syst"},{"issue":"2\u20133","key":"533_CR15","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1023\/A:1007452223027","volume":"30","author":"M Kubat","year":"1998","unstructured":"Kubat M, Holte R, Matwin S (1998) Machine learning for the detection of oil spills in satellite radar images. Mach Learn 30(2\u20133):195\u2013215","journal-title":"Mach Learn"},{"key":"533_CR16","first-page":"766","volume":"10","author":"W Liu","year":"2010","unstructured":"Liu W, Chawla S, Cieslak DA, Chawla NV (2010) A robust decision tree algorithm for imbalanced data sets. SDM, SIAM 10:766\u2013777","journal-title":"SDM, SIAM"},{"key":"533_CR17","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"C Shannon","year":"1948","unstructured":"Shannon C (1948) A mathematical theory of communication. Bell Syst Tech J 27:379","journal-title":"Bell Syst Tech J"},{"key":"533_CR18","unstructured":"Ma BLWHY (1998) Integrating classification and association rule mining. In: Proceedings of the fourth international conference on knowledge discovery and data mining"},{"key":"533_CR19","doi-asserted-by":"publisher","unstructured":"Upton GJ (1992) Fisher\u2019s exact test. J R Stat Soc Ser A Stat Soc 155(3):395\u2013402. dio: 10.2307\/2982890","DOI":"10.2307\/2982890"},{"key":"533_CR20","unstructured":"He H, Bai Y, Garcia EA, Li S (2008) ADASYN: Adaptive synthetic sampling approach for imbalanced learning. In: Neural networks, 2008. IJCNN 2008. (IEEE World Congress on Computational Intelligence). IEEE International Joint Conference, pp 1322\u20131328"},{"issue":"1","key":"533_CR21","first-page":"321","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) Smote: synthetic minority over-sampling technique. J Artif Int Res 16(1):321\u2013357","journal-title":"J Artif Int Res"},{"key":"533_CR22","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"878","DOI":"10.1007\/11538059_91","volume-title":"Advances in intelligent computing","author":"H Han","year":"2005","unstructured":"Han H, Wang WY, Mao BH (2005) Borderline-smote: A new over-sampling method in imbalanced data sets learning. In: Huang DS, Zhang XP, Huang GB (eds) Advances in intelligent computing, vol 3644, Lecture notes in computer science. Springer, Berlin, pp 878\u2013887"},{"issue":"3","key":"533_CR23","doi-asserted-by":"crossref","first-page":"664","DOI":"10.1007\/s10489-011-0287-y","volume":"36","author":"C Bunkhumpornpat","year":"2012","unstructured":"Bunkhumpornpat C, Sinapiromsaran K, Lursinsap C (2012) Dbsmote: density-based synthetic minority over-sampling technique. Appl Intell 36(3):664\u2013684","journal-title":"Appl Intell"},{"key":"533_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1007\/978-3-642-01307-2_43","volume-title":"Advances in knowledge discovery and data mining","author":"C Bunkhumpornpat","year":"2009","unstructured":"Bunkhumpornpat C, Sinapiromsaran K, Lursinsap C (2009) Safe-level-smote: Safe-level-synthetic minority over-sampling technique for handling the class imbalanced problem. In: Theeramunkong T, Kijsirikul B, Cercone N, Ho TB (eds) Advances in knowledge discovery and data mining, vol 5476, Lecture notes in computer science. Springer, Berlin, pp 475\u2013482"},{"key":"533_CR25","doi-asserted-by":"crossref","unstructured":"Bunkhumpornpat C, Sinapiromsaran K, Lursinsap C (2011) Mute: majority under-sampling technique. In: 2011 8th International Conference on information, communications and signal processing (ICICS), pp 1\u20134. doi:10.1109\/ICICS.2011.6173603","DOI":"10.1109\/ICICS.2011.6173603"},{"key":"533_CR26","unstructured":"Gini CW (1971) Variability and mutability, contribution to the study of statistical distributions and relations, Studi Economico-Giuridici della R. Universita de Cagliari (1912). Reviewed in: Light, RJ Margolin BH: An analysis of variance for categorical data. J Amer Stat Assoc 66"},{"issue":"2","key":"533_CR27","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1080\/10618600.2014.901225","volume":"24","author":"DV Lindberg","year":"2015","unstructured":"Lindberg DV, Lee HK (2015) Optimization under constraints by applying an asymmetric entropy measure. J Comput Gr Stat 24(2):379\u2013393. doi: 10.1080\/10618600.2014.901225","journal-title":"J Comput Gr Stat"},{"key":"533_CR28","unstructured":"Su J, Zhang H (2006) A fast decision tree learning algorithm. In: Proceedings of the national conference on artificial intelligence. MIT Press, Cambridge, 1999, vol\u00a021, p 500"},{"key":"533_CR29","unstructured":"Blake C, Merz CJ (1998) UCI repository of machine learning databases"},{"issue":"1","key":"533_CR30","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1002\/(SICI)1097-4571(199401)45:1<12::AID-ASI2>3.0.CO;2-L","volume":"45","author":"MK Buckland","year":"1994","unstructured":"Buckland MK, Gey FC (1994) The relationship between recall and precision. J Am Soc Info Sci 45(1):12\u201319","journal-title":"J Am Soc Info Sci"},{"issue":"9","key":"533_CR31","doi-asserted-by":"crossref","first-page":"1263","DOI":"10.1109\/TKDE.2008.239","volume":"21","author":"H He","year":"2009","unstructured":"He H, Garcia E (2009) Learning from imbalanced data. Knowl Data Eng IEEE Trans 21(9):1263\u20131284","journal-title":"Knowl Data Eng IEEE Trans"},{"key":"533_CR32","unstructured":"Dem\u0161ar J (2006) Statistical comparisons of classifiers over multiple data sets. J Mach Learn Res 7:1\u201330. http:\/\/dl.acm.org\/citation.cfm?id=1248547.1248548"}],"container-title":["Pattern Analysis and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10044-016-0533-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-016-0533-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-016-0533-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-016-0533-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T18:32:51Z","timestamp":1567535571000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10044-016-0533-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,22]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["533"],"URL":"https:\/\/doi.org\/10.1007\/s10044-016-0533-3","relation":{},"ISSN":["1433-7541","1433-755X"],"issn-type":[{"value":"1433-7541","type":"print"},{"value":"1433-755X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,22]]}}}