{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T05:46:40Z","timestamp":1774936000858,"version":"3.50.1"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,3,26]],"date-time":"2010-03-26T00:00:00Z","timestamp":1269561600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1007\/s10489-010-0225-4","type":"journal-article","created":{"date-parts":[[2010,3,25]],"date-time":"2010-03-25T13:19:09Z","timestamp":1269523149000},"page":"345-358","source":"Crossref","is-referenced-by-count":43,"title":["Identifying mislabeled training data with the aid of unlabeled data"],"prefix":"10.1007","volume":"35","author":[{"given":"Donghai","family":"Guan","sequence":"first","affiliation":[]},{"given":"Weiwei","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Young-Koo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Sungyoung","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,3,26]]},"reference":[{"issue":"2","key":"225_CR1","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1023\/A:1022604100933","volume":"4","author":"J Mingers","year":"1989","unstructured":"Mingers J (1989) An empirical comparison of pruning methods for decision tree induction. Mach Learn 4(2):227\u2013243","journal-title":"Mach Learn"},{"key":"225_CR2","volume-title":"C4.5: programs for machine learning","author":"JR Quinlan","year":"1993","unstructured":"Quinlan JR (1993) C4.5: programs for machine learning. Morgan Kaufmann, San Francisco"},{"issue":"2","key":"225_CR3","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1080\/088395100117124","volume":"14","author":"D Gamberger","year":"2000","unstructured":"Gamberger D, Lavrac N, Dzeroski S (2000) Noise detection and elimination in data proprocessing: Experiments in medical domains. Appl Artif Intell 14(2):205\u2013223","journal-title":"Appl Artif Intell"},{"issue":"1","key":"225_CR4","first-page":"81","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan JR (1986) Induction of decision trees. Mach Learn 1(1):81\u2013106","journal-title":"Mach Learn"},{"key":"225_CR5","first-page":"181","volume-title":"Advances in knowledge discovery and data mining","author":"I Guyon","year":"1996","unstructured":"Guyon I, Matic N, Vapnik V (1996) Discovering information patterns and data cleaning. In: Advances in knowledge discovery and data mining. AAAI\/MIT Press, Cambridge, pp 181\u2013203"},{"key":"225_CR6","unstructured":"Gamberger D, Lavrac N, Groselj C (1999) Experiments with noise filtering in a medical domain. In: Proceedings of 16th international conference on machine learning, pp 143\u2013151"},{"key":"225_CR7","unstructured":"Brodley CE, Friedl MA (1996) Identifying and eliminating mislabeled training instances. In: Proceedings of 13th national conference on artificial intelligence, pp 799\u2013805"},{"key":"225_CR8","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1613\/jair.606","volume":"11","author":"CE Brodley","year":"1999","unstructured":"Brodley CE, Friedl MA (1999) Identifying mislabeled training data. J Artif Intell Res 11:131\u2013167","journal-title":"J Artif Intell Res"},{"key":"225_CR9","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1109\/TSMC.1972.4309137","volume":"2","author":"D Wilson","year":"1972","unstructured":"Wilson D (1972) Asymptotic properties of nearest neighbor rules using edited data. IEEE Trans Syst Man Cybern 2:408\u2013421","journal-title":"IEEE Trans Syst Man Cybern"},{"issue":"1","key":"225_CR10","first-page":"37","volume":"6","author":"D Aha","year":"1991","unstructured":"Aha D, Kibler D, Albert M (1991) Instance-based learning algorithms. Mach Learn 6(1):37\u201366","journal-title":"Mach Learn"},{"key":"225_CR11","doi-asserted-by":"crossref","unstructured":"Riloff E, Wiebe J, Wilson T (2003) Learning subjective nouns using extraction pattern bootstrapping. In: Proceedings of the 7th conference on natural language learning, pp 25\u201332","DOI":"10.3115\/1119176.1119180"},{"key":"225_CR12","doi-asserted-by":"crossref","unstructured":"Blum A, Mitchell T (1998) Combining labeled and unlabeled data with co-training. In: Proceedings of 11th annual conference on computational learning theory, pp 92\u2013100","DOI":"10.1145\/279943.279962"},{"key":"225_CR13","unstructured":"UCI KDD archive. http:\/\/kdd.ics.uci.edu"},{"issue":"3","key":"225_CR14","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1162\/089976601300014493","volume":"13","author":"S Keerthi","year":"2001","unstructured":"Keerthi S, Shevade S, Bhattacharyya C, Murthy K (2001) Improvements to Platt\u2019s SMO algorithm for SVM classifier design. Neural Comput 13(3):637\u2013649","journal-title":"Neural Comput"},{"key":"225_CR15","unstructured":"John G, Leonard E (1995) An instance-based learner using an entropic distance measure. In: Proceedings of the 12th international conference on machine learning, pp 108\u2013114"},{"issue":"2","key":"225_CR16","first-page":"343","volume":"2","author":"D Angluin","year":"1988","unstructured":"Angluin D, Laird P (1988) Learning from noisy examples. Mach Learn 2(2):343\u2013370","journal-title":"Mach Learn"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-010-0225-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10489-010-0225-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-010-0225-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T18:25:44Z","timestamp":1559154344000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10489-010-0225-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3,26]]},"references-count":16,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["225"],"URL":"https:\/\/doi.org\/10.1007\/s10489-010-0225-4","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,3,26]]}}}