{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T22:33:18Z","timestamp":1769207598248,"version":"3.49.0"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2016,5,16]],"date-time":"2016-05-16T00:00:00Z","timestamp":1463356800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1007\/s10916-016-0516-3","type":"journal-article","created":{"date-parts":[[2016,5,16]],"date-time":"2016-05-16T05:54:50Z","timestamp":1463378090000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Distance Metric Based Oversampling Method for Bioinformatics and Performance Evaluation"],"prefix":"10.1007","volume":"40","author":[{"given":"Meng-Fong","family":"Tsai","sequence":"first","affiliation":[]},{"given":"Shyr-Shen","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,16]]},"reference":[{"key":"516_CR1","doi-asserted-by":"crossref","unstructured":"Dumais S, Platt J, Heckerman D, Sahami M (1998) Inductive learning algorithms and representations for text categorization. Proc. 7th Int. Conf. Inform. Knowl. Manag. :148\u2013155.","DOI":"10.1145\/288627.288651"},{"key":"516_CR2","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1145\/1007730.1007740","volume":"6","author":"M Castillo","year":"2004","unstructured":"Castillo, M., and Serrano, J., A multistrategy approach for digital text categorization from imbalanced documents. SIGKDD Explor. Newsl. 6:70\u201379, 2004.","journal-title":"SIGKDD Explor. Newsl."},{"key":"516_CR3","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.dss.2009.07.011","volume":"48","author":"A Sun","year":"2009","unstructured":"Sun, A., Lim, E. P., and Liu, Y., On strategies for imbalanced text classification using SVM: a comparative study. Decis. Support. Syst. 48:191\u2013201, 2009.","journal-title":"Decis. Support. Syst."},{"key":"516_CR4","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1016\/j.neunet.2007.12.031","volume":"21","author":"M Mazurowski","year":"2008","unstructured":"Mazurowski, M., Habas, P. A., Zurada, J. M., Lo, J. Y., Baker, J. A., and Tourassi, G. D., Training neural network classifiers for medical decision making: The effects of imbalanced datasets on classification performance. Neural Netw. 21:427\u2013436, 2008.","journal-title":"Neural Netw."},{"key":"516_CR5","doi-asserted-by":"crossref","first-page":"1385","DOI":"10.1007\/s00726-010-0595-2","volume":"39","author":"A Anand","year":"2010","unstructured":"Anand, A., Pugalenthi, G., Fogel, G., and Suganthan, P., An approach for classification of highly imbalanced data using weighting and undersampling. Amino Acids 39:1385\u20131391, 2010.","journal-title":"Amino Acids"},{"key":"516_CR6","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.aca.2013.10.050","volume":"806","author":"M Hao","year":"2014","unstructured":"Hao, M., Wang, Y., and Bryant, S. H., An efficient algorithm coupled with synthetic minority over-sampling technique to classify imbalanced PubChem BioAssay data. Anal. Chim. Acta. 806:117\u2013127, 2014.","journal-title":"Anal. Chim. Acta."},{"issue":"6","key":"516_CR7","doi-asserted-by":"crossref","first-page":"1047","DOI":"10.1080\/14697688.2011.618458","volume":"14","author":"MY Chen","year":"2014","unstructured":"Chen, M. Y., Using a hybrid evolution approach to forecast financial failures for Taiwan listed companies. Quant. Finan. 14(6):1047\u20131058, 2014.","journal-title":"Quant. Finan."},{"key":"516_CR8","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1016\/j.ins.2011.09.013","volume":"220","author":"MY Chen","year":"2013","unstructured":"Chen, M. Y., A hybrid ANFIS model for business failure prediction - utilization of particle swarm optimization and subtractive clustering. Inform. Sci. 220:180\u2013195, 2013.","journal-title":"Inform. Sci."},{"key":"516_CR9","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1007730.1007738","volume":"6","author":"C Phua","year":"2004","unstructured":"Phua, C., Alahakoon, D., and Lee, V., Minority report in fraud detection: Classification of skewed data. SIGKDD Explor. Newsl. 6:50\u201359, 2004.","journal-title":"SIGKDD Explor. Newsl."},{"key":"516_CR10","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1007\/s11280-012-0178-0","volume":"16","author":"W Wei","year":"2013","unstructured":"Wei, W., Li, J., Cao, L., Ou, Y., and Chen, J., Effective detection of sophisticated online banking fraud on extremely imbalanced data. World Wide Web 16:449\u2013475, 2013.","journal-title":"World Wide Web"},{"key":"516_CR11","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1007\/s10489-010-0263-y","volume":"36","author":"KC Khor","year":"2012","unstructured":"Khor, K. C., Ting, C. Y., and Phon-Amnuaisuk, S., A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection. Appl. Intell. 36:320\u2013329, 2012.","journal-title":"Appl. Intell."},{"key":"516_CR12","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N. V., Bowyer, K. W., Hall, L. O., and Kegelmeyer, W. P., SMOTE: Synthetic minority over-sampling technique. J. Artif. Intell. Res. 16:321\u2013357, 2002.","journal-title":"J. Artif. Intell. Res."},{"key":"516_CR13","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1109\/TIT.1968.1054155","volume":"18","author":"PE Hart","year":"1968","unstructured":"Hart, P. E., The condensed nearest neighbor rule. IEEE Trans. Inf. Theory 18:515\u2013516, 1968.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"516_CR14","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1109\/TSMC.1972.4309137","volume":"2","author":"DL Wilson","year":"1972","unstructured":"Wilson, D. L., Asymptotic properties of nearest neighbor rules using edited data. IEEE Trans. Syst. Man Cybern. 2:408\u2013420, 1972.","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"516_CR15","unstructured":"Kubat M, Matwin S (1997) Addressing the curse of imbalanced training sets: one-sided selection. Proc. 14th Int. Conf. Inform. Mach. Learn. :179\u2013186."},{"key":"516_CR16","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/3-540-48229-6_9","volume":"2101","author":"J Laurikkala","year":"2001","unstructured":"Laurikkala, J., Improving identification of difficult small classes by balancing class distribution. Artif. Intell. Med. 2101:63\u201366, 2001.","journal-title":"Artif. Intell. Med."},{"key":"516_CR17","unstructured":"Mani I, Zhang I (2003) kNN approach to unbalanced data distributions: a case study involving information extraction. Int. Conf. Mach. Learn., Workshop on Learning from Imbalanced Datasets 42\u201348."},{"issue":"1","key":"516_CR18","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/1007730.1007736","volume":"6","author":"H Guo","year":"2004","unstructured":"Guo, H., and Viktor, H. L., Learning from imbalanced data sets with boosting and data generation: The data boosting approach. SIGKDD Explor. 6(1):30\u201339, 2004.","journal-title":"SIGKDD Explor."},{"issue":"I","key":"516_CR19","first-page":"878","volume":"2005","author":"H Han","year":"2005","unstructured":"Han, H., Wang, W. Y., and Mao, B. H., Borderline-SMOTE: A new over-sampling method in imbalanced data sets learning. Proc. Int. Conf. Intell. Comput. 2005(I):878\u2013887, 2005.","journal-title":"Proc. Int. Conf. Intell. Comput."},{"key":"516_CR20","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.artmed.2005.03.002","volume":"37","author":"G Cohen","year":"2006","unstructured":"Cohen, G., Hilario, M., Sax, H., Hogonnet, S., and Geissbuhler, A., Learning from imbalanced data in surveillance of nosocomial infection. Artif. Intell. Med. 37:7\u201318, 2006.","journal-title":"Artif. Intell. Med."},{"key":"516_CR21","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1016\/j.ins.2014.08.051","volume":"291","author":"JA S\u00e1ez","year":"2015","unstructured":"S\u00e1ez, J. A., Luengo, J., Stefanowski, J., and Herrera, F., SMOTE\u2013IPF: Addressing the noisy and borderline examples problem in imbalanced classification by a re-sampling method with filtering. Inform. Sci. 291:184\u2013203, 2015.","journal-title":"Inform. Sci."},{"key":"516_CR22","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1007\/978-3-642-01307-2_43","volume-title":"Proceedings of the 13th Pacific-Asia conference on advances in knowledge discovery and data mining, PAKDD\u201909","author":"C Bunkhumpornpat","year":"2009","unstructured":"Bunkhumpornpat, C., Sinapiromsaran, K., and Lursinsap, C., Safe-level-SMOTE: Safe-level-synthetic minority over-sampling technique for handling the class imbalanced problem. In: Proceedings of the 13th Pacific-Asia conference on advances in knowledge discovery and data mining, PAKDD\u201909. Springer, Berlin, pp. 475\u2013482, 2009."},{"key":"516_CR23","first-page":"104","volume-title":"Proceedings of IEEE symposium on computational intelligence and data mining","author":"T Maciejewski","year":"2011","unstructured":"Maciejewski, T., and Stefanowski, J., Local neighbourhood extension of SMOTE for mining imbalanced data. In: Proceedings of IEEE symposium on computational intelligence and data mining. IEEE Press, SSCI IEEE, pp. 104\u2013111, 2011."},{"key":"516_CR24","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/1007730.1007735","volume":"6","author":"G Batista","year":"2004","unstructured":"Batista, G., Prati, R., and Monard, M., A study of the behavior of several methods for balancing machine learning training data. ACM SIGKDD Explor. Newsl. 6:20\u201329, 2004.","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"516_CR25","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1109\/TSMC.1976.4309452","volume":"6","author":"I Tomek","year":"1976","unstructured":"Tomek, I., Two modifications of CNN. IEEE Trans. Syst. Man Commun. 6:769\u2013772, 1976.","journal-title":"IEEE Trans. Syst. Man Commun."},{"issue":"15","key":"516_CR26","doi-asserted-by":"crossref","first-page":"3060","DOI":"10.1016\/j.ins.2007.02.034","volume":"177","author":"V Katos","year":"2007","unstructured":"Katos, V., Network intrusion detection: Evaluating cluster, discriminant, and logit analysis. Inform. Sci. 177(15):3060\u20133073, 2007.","journal-title":"Inform. Sci."},{"issue":"12","key":"516_CR27","doi-asserted-by":"crossref","first-page":"4514","DOI":"10.1016\/j.camwa.2011.10.030","volume":"62","author":"MY Chen","year":"2011","unstructured":"Chen, M. Y., Bankruptcy prediction in firms with statistical and intelligent techniques and a comparison of evolutionary computation approaches. Comput. Math. Appl. 62(12):4514\u20134524, 2011.","journal-title":"Comput. Math. Appl."},{"key":"516_CR28","volume-title":"Programs for machine learning","author":"JR Quinlan","year":"1993","unstructured":"Quinlan, J. R., Programs for machine learning. Morgan Kaufmann, San Fransisco, 1993."},{"key":"516_CR29","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1023\/A:1009752403260","volume":"1","author":"SL Salzberg","year":"1997","unstructured":"Salzberg, S. L., On comparing classifiers: Pitfalls to avoid and a recommended approach. Data Min. Knowl. Disc. 1:317\u2013327, 1997.","journal-title":"Data Min. Knowl. Disc."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0516-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0516-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0516-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T14:01:39Z","timestamp":1567864899000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0516-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,16]]},"references-count":29,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2016,7]]}},"alternative-id":["516"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0516-3","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,16]]},"article-number":"159"}}