{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T02:50:44Z","timestamp":1776221444171,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2021,8,6]],"date-time":"2021-08-06T00:00:00Z","timestamp":1628208000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,8,6]],"date-time":"2021-08-06T00:00:00Z","timestamp":1628208000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mach Learn"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s10994-021-06042-2","type":"journal-article","created":{"date-parts":[[2021,8,6]],"date-time":"2021-08-06T17:02:37Z","timestamp":1628269357000},"page":"3917-3928","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":149,"title":["Special issue on feature engineering editorial"],"prefix":"10.1007","volume":"113","author":[{"given":"Tim","family":"Verdonck","sequence":"first","affiliation":[]},{"given":"Bart","family":"Baesens","sequence":"additional","affiliation":[]},{"given":"Mar\u00eda","family":"\u00d3skarsd\u00f3ttir","sequence":"additional","affiliation":[]},{"given":"Seppe","family":"vanden Broucke","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,6]]},"reference":[{"key":"6042_CR1","doi-asserted-by":"crossref","unstructured":"Baesens, B., H\u00f6ppner, S., & Verdonck, T. (2021). Data engineering for fraud detection. Decision Support Systems, 113492.","DOI":"10.1016\/j.dss.2021.113492"},{"key":"6042_CR2","doi-asserted-by":"publisher","DOI":"10.1002\/9781119449560","volume-title":"Credit risk analytics: Measurement techniques, applications, and examples in SAS","author":"B Baesens","year":"2016","unstructured":"Baesens, B., Roesch, D., & Scheule, H. (2016). Credit risk analytics: Measurement techniques, applications, and examples in SAS. Hoboken: Wiley."},{"issue":"1","key":"6042_CR3","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/S0377-2217(01)00129-1","volume":"138","author":"B Baesens","year":"2002","unstructured":"Baesens, B., Viaene, S., Van den Poel, D., Vanthienen, J., & Dedene, G. (2002). Bayesian neural network learning for repeat purchase modelling in direct marketing. European Journal of Operational Research, 138(1), 191\u2013211.","journal-title":"European Journal of Operational Research"},{"key":"6042_CR4","volume-title":"Network science","author":"AL Barab\u00e1si","year":"2016","unstructured":"Barab\u00e1si, A. L. (2016). Network science. Cambridge: Cambridge University Press."},{"issue":"4","key":"6042_CR5","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s00799-015-0156-0","volume":"17","author":"J Beel","year":"2016","unstructured":"Beel, J., Gipp, B., Langer, S., & Breitinger, C. (2016). paper recommender systems: A literature survey. International Journal on Digital Libraries, 17(4), 305\u2013338.","journal-title":"International Journal on Digital Libraries"},{"key":"6042_CR6","doi-asserted-by":"crossref","unstructured":"Blattberg RC, Kim BD, & Neslin SA (2008). Why database marketing? In Database marketing (pp. 13\u201346). Berlin: Springer, New York","DOI":"10.1007\/978-0-387-72579-6_2"},{"key":"6042_CR7","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1162\/tacl_a_00051","volume":"5","author":"P Bojanowski","year":"2017","unstructured":"Bojanowski, P., Grave, E., Joulin, A., & Mikolov, T. (2017). Enriching word vectors with subword information. Transactions of the Association for Computational Linguistics, 5, 135\u2013146.","journal-title":"Transactions of the Association for Computational Linguistics"},{"key":"6042_CR8","doi-asserted-by":"crossref","unstructured":"Cerqueira, V., Moniz, N., & Soares, C. (2021) Vest: Automatic feature engineering for forecasting. Machine Learning, 1\u201323.","DOI":"10.1007\/s10994-021-05959-y"},{"key":"6042_CR9","unstructured":"Cullinan, G. J. (1977). Picking them by their batting averages\u2019 recency-frequency-monetary method of controlling circulation. Manual release 2103."},{"key":"6042_CR10","doi-asserted-by":"crossref","unstructured":"Dasgupta, K., Singh, R., Viswanathan, B., Chakraborty, D., Mukherjea, S., Nanavati, A. A., & Joshi, A. (2008). Social ties and their relevance to churn in mobile telecom networks. In Proceedings of the 11th international conference on extending database technology: Advances in database technology (pp. 668\u2013677).","DOI":"10.1145\/1353343.1353424"},{"key":"6042_CR11","doi-asserted-by":"crossref","unstructured":"De\u00a0Brabandere, A., Op\u00a0De\u00a0Be\u00e9ck, T., Hendrickx, K., Meert, W., & Davis, J. (2021). Automating feature construction for multi-view time series data. Machine Learning, 1\u201340.","DOI":"10.1007\/s10994-021-06096-2"},{"key":"6042_CR12","unstructured":"Devlin, J., Chang, M. W., Lee. K., & Toutanova, K. (2018) Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:181004805."},{"key":"6042_CR13","doi-asserted-by":"crossref","unstructured":"Gao, G., Wang, H., & W\u00fcthrich, M. V. (2021). Boosting Poisson regression models with telematics car driving data. Machine Learning, 1\u201330.","DOI":"10.1007\/s10994-021-05957-0"},{"key":"6042_CR14","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/1-84628-284-5_7","volume-title":"Advanced methods for knowledge discovery from complex data","author":"L Getoor","year":"2005","unstructured":"Getoor, L. (2005). Link-based classification. In U. Maulik, L. B. Holder, & D. J. Cook (Eds.), Advanced methods for knowledge discovery from complex data (pp. 189\u2013207). Berlin: Springer."},{"key":"6042_CR15","doi-asserted-by":"crossref","unstructured":"Grover, A., & Leskovec, J. (2016). node2vec: Scalable feature learning for networks. In Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining (pp 855\u2013864).","DOI":"10.1145\/2939672.2939754"},{"key":"6042_CR16","unstructured":"Guo, C., & Berkhahn, F. (2016). Entity embeddings of categorical variables. CoRR, abs\/1604.06737, arxiv:1604.06737."},{"key":"6042_CR17","unstructured":"Hamilton, W. L., Ying, R., & Leskovec, J. (2017). Inductive representation learning on large graphs. In Proceedings of the 31st international conference on neural information processing systems (pp. 1025\u20131035)."},{"key":"6042_CR18","doi-asserted-by":"crossref","unstructured":"Hancer, E. (2021). An improved evolutionary wrapper-filter feature selection approach with a new initialisation scheme. Machine Learning, 1\u201324.","DOI":"10.1007\/s10994-021-05990-z"},{"key":"6042_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00305-w","volume":"7","author":"JT Hancock","year":"2020","unstructured":"Hancock, J. T., & Khoshgoftaar, T. M. (2020). Survey on categorical data for neural networks. Journal of Big Data, 7, 1\u201341.","journal-title":"Journal of Big Data"},{"key":"6042_CR20","volume-title":"Forecasting: Principles and practice","author":"RJ Hyndman","year":"2018","unstructured":"Hyndman, R. J., & Athanasopoulos, G. (2018). Forecasting: Principles and practice. London: OTexts."},{"key":"6042_CR21","volume-title":"Speech and language processing: An introduction to natural language processing, computational linguistics, and speech recognition","author":"D Jurafsky","year":"2000","unstructured":"Jurafsky, D., & Martin, J. H. (2000). Speech and language processing: An introduction to natural language processing, computational linguistics, and speech recognition. Hoboken: Prentice Hall."},{"key":"6042_CR22","doi-asserted-by":"crossref","unstructured":"Loginova, E., Tsang, W.K., van Heijningen, G., Kerkhove, L.P., & Benoit, D.F. (2021). Forecasting directional bitcoin price returns using aspect-based sentiment analysis on online communities data. Machine Learning pp 1\u201330.","DOI":"10.1007\/s10994-021-06095-3"},{"key":"6042_CR23","unstructured":"Mikolov, T., Chen, K., Corrado, G., & Dean, J. (2013). Efficient estimation of word representations in vector space. arXiv preprint arXiv:13013781."},{"key":"6042_CR24","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198805090.001.0001","volume-title":"Networks","author":"M Newman","year":"2018","unstructured":"Newman, M. (2018). Networks. Oxford: Oxford University Press."},{"key":"6042_CR25","doi-asserted-by":"publisher","unstructured":"\u00d3skarsd\u00f3ttir, M., Ahmed, W., Antonio, K., Baesens, B., Dendievel, R., Donas, T., & Reynkens, T. (2021). Social network analytics for supervised fraud detection in insurance. Risk Analysis https:\/\/doi.org\/10.1111\/risa.13693.","DOI":"10.1111\/risa.13693"},{"key":"6042_CR26","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.asoc.2018.10.004","volume":"74","author":"M \u00d3skarsd\u00f3ttir","year":"2019","unstructured":"\u00d3skarsd\u00f3ttir, M., Bravo, C., Sarraute, C., Vanthienen, J., & Baesens, B. (2019). The value of big data for credit scoring: Enhancing financial inclusion using mobile phone data and social network analytics. Applied Soft Computing, 74, 26\u201339.","journal-title":"Applied Soft Computing"},{"key":"6042_CR27","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.eswa.2017.05.028","volume":"85","author":"M \u00d3skarsd\u00f3ttir","year":"2017","unstructured":"\u00d3skarsd\u00f3ttir, M., Bravo, C., Verbeke, W., Sarraute, C., Baesens, B., & Vanthienen, J. (2017). Social network analytics for churn prediction in telco: Model building, evaluation and network architecture. Expert Systems with Applications, 85, 204\u2013220.","journal-title":"Expert Systems with Applications"},{"key":"6042_CR28","unstructured":"Page, L., Brin, S., Motwani, R., & Winograd, T. (1999). The pagerank citation ranking: Bringing order to the web. Tech. rep., Stanford InfoLab."},{"key":"6042_CR29","doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R., & Manning, C. D. (2014). Glove: Global vectors for word representation. In Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP) (pp. 1532\u20131543).","DOI":"10.3115\/v1\/D14-1162"},{"key":"6042_CR30","doi-asserted-by":"crossref","unstructured":"Perozzi, B., Al-Rfou, R., & Skiena, S. (2014). Deepwalk: Online learning of social representations. In Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining (pp. 701\u2013710).","DOI":"10.1145\/2623330.2623732"},{"key":"6042_CR31","doi-asserted-by":"crossref","unstructured":"Peters, M. E., Neumann, M., Iyyer, M., Gardner, M., Clark, C., Lee, K., & Zettlemoyer, L. (2018). Deep contextualized word representations. arXiv preprint arXiv:180205365.","DOI":"10.18653\/v1\/N18-1202"},{"key":"6042_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1017\/CBO9781139058452.002","volume-title":"Data mining","author":"A Rajaraman","year":"2011","unstructured":"Rajaraman, A., & Ullman, J. D. (2011). Data mining (pp. 1\u201317). Cambridge: Cambridge University Press. https:\/\/doi.org\/10.1017\/CBO9781139058452.002."},{"key":"6042_CR33","doi-asserted-by":"crossref","unstructured":"Ramon, Y., Martens, D., Evgeniou, T., & Praet, S. (2021). Can metafeatures help improve explanations of prediction models when using behavioral and textual data? Machine Learning, 1\u201340.","DOI":"10.1007\/s10994-021-05981-0"},{"key":"6042_CR34","doi-asserted-by":"crossref","unstructured":"Raymaekers, J., & Rousseeuw, P. J. (2021). Transforming variables to central normality. Machine Learning, 1\u201323.","DOI":"10.1007\/s10994-021-05960-5"},{"key":"6042_CR35","doi-asserted-by":"crossref","unstructured":"Rublee, E., Rabaud, V., Konolige, K., & Bradski, G. (2011). Orb: An efficient alternative to sift or surf. In 2011 International conference on computer vision, IEEE (pp 2564\u20132571).","DOI":"10.1109\/ICCV.2011.6126544"},{"key":"6042_CR36","doi-asserted-by":"crossref","unstructured":"Shi, W., & Wu, G. (2021). New algorithms for trace-ratio problem with application to high-dimension and large-sample data dimensionality reduction. Machine Learning, 1\u201328.","DOI":"10.1007\/s10994-020-05937-w"},{"key":"6042_CR37","doi-asserted-by":"crossref","unstructured":"S\u00fcrer, O., Apley, D.W., & Malthouse, E. C. (2021). Coefficient tree regression: Fast, accurate and interpretable predictive modeling. Machine Learning, 1\u201338.","DOI":"10.1007\/s10994-021-06091-7"},{"issue":"11","key":"6042_CR38","first-page":"2579","volume":"9","author":"L Van der Maaten","year":"2008","unstructured":"Van der Maaten, L., & Hinton, G. (2008). Visualizing data using t-SNE. Journal of Machine Learning Research, 9(11), 2579\u20132605.","journal-title":"Journal of Machine Learning Research"},{"issue":"66\u201371","key":"6042_CR39","first-page":"13","volume":"10","author":"L Van Der Maaten","year":"2009","unstructured":"Van Der Maaten, L., Postma, E., & Van den Herik, J. (2009). Dimensionality reduction: A comparative. Journal of Machine Learning Research, 10(66\u201371), 13.","journal-title":"Journal of Machine Learning Research"},{"key":"6042_CR40","volume-title":"Predictive analytics: Techniques and applications in credit risk modelling","author":"T Van Gestel","year":"2022","unstructured":"Van Gestel, T., Martens, D., & Baesens, B. (2022). Predictive analytics: Techniques and applications in credit risk modelling. Oxford: Oxford University Press."},{"key":"6042_CR41","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.dss.2015.04.013","volume":"75","author":"V Van Vlasselaer","year":"2015","unstructured":"Van Vlasselaer, V., Bravo, C., Caelen, O., Eliassi-Rad, T., Akoglu, L., Snoeck, M., & Baesens, B. (2015). Apate: A novel approach for automated credit card transaction fraud detection using network-based extensions. Decision Support Systems, 75, 38\u201348.","journal-title":"Decision Support Systems"},{"issue":"9","key":"6042_CR42","doi-asserted-by":"publisher","first-page":"3090","DOI":"10.1287\/mnsc.2016.2489","volume":"63","author":"V Van Vlasselaer","year":"2017","unstructured":"Van Vlasselaer, V., Eliassi-Rad, T., Akoglu, L., Snoeck, M., & Baesens, B. (2017). Gotcha! Network-based fraud detection for social security fraud. Management Science, 63(9), 3090\u20133110.","journal-title":"Management Science"},{"key":"6042_CR43","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.asoc.2013.09.017","volume":"14","author":"W Verbeke","year":"2014","unstructured":"Verbeke, W., Martens, D., & Baesens, B. (2014). Social network analysis for customer churn prediction. Applied Soft Computing, 14, 431\u2013446.","journal-title":"Applied Soft Computing"},{"key":"6042_CR44","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.aiopen.2021.01.001","volume":"1","author":"J Zhou","year":"2020","unstructured":"Zhou, J., Cui, G., Hu, S., Zhang, Z., Yang, C., Liu, Z., et al. (2020). Graph neural networks: A review of methods and applications. AI Open, 1, 57\u201381.","journal-title":"AI Open"}],"container-title":["Machine Learning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-021-06042-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10994-021-06042-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-021-06042-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T18:40:56Z","timestamp":1717180856000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10994-021-06042-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,6]]},"references-count":44,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["6042"],"URL":"https:\/\/doi.org\/10.1007\/s10994-021-06042-2","relation":{},"ISSN":["0885-6125","1573-0565"],"issn-type":[{"value":"0885-6125","type":"print"},{"value":"1573-0565","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,6]]},"assertion":[{"value":"6 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}