{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:25:35Z","timestamp":1750501535613,"version":"3.37.3"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T00:00:00Z","timestamp":1705449600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T00:00:00Z","timestamp":1705449600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-18066-y","type":"journal-article","created":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T06:01:56Z","timestamp":1705471316000},"page":"64767-64794","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An efficient security testing mechanism for Android Apps based on malware analysis and optimized XGBoost"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3582-0266","authenticated-orcid":false,"given":"Pawan","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Sukhdip","family":"Singh","sequence":"additional","affiliation":[]},{"family":"Suman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,17]]},"reference":[{"key":"18066_CR1","unstructured":"Mobile operating system market share worldwide | Statcounter Global Stats.\u00a0https:\/\/gs.statcounter.com\/os-market-share\/mobile\/worldwide. Accessed 01 Sep 2022"},{"key":"18066_CR2","unstructured":"Android apps on Google Play.\u00a0https:\/\/play.google.com\/store\/apps. Accessed 01 Sep 2022"},{"issue":"11","key":"18066_CR3","doi-asserted-by":"publisher","first-page":"1054","DOI":"10.1109\/TSE.2016.2547385","volume":"42","author":"T Wu","year":"2016","unstructured":"Wu T et al (2016) Light-weight, inter-procedural and callback-aware resource leak detection for android apps. IEEE Trans Softw Eng 42(11):1054\u20131076. https:\/\/doi.org\/10.1109\/TSE.2016.2547385","journal-title":"IEEE Trans Softw Eng"},{"issue":"2","key":"18066_CR4","doi-asserted-by":"publisher","first-page":"984","DOI":"10.1109\/TNSE.2020.2996379","volume":"8","author":"H Zhu","year":"2021","unstructured":"Zhu H, Li Y, Li R, Li J, You Z, Song H (2021) SEDMDroid: an enhanced stacking ensemble framework for android malware detection. IEEE Trans Netw Sci Eng 8(2):984\u2013994. https:\/\/doi.org\/10.1109\/TNSE.2020.2996379","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"5","key":"18066_CR5","doi-asserted-by":"publisher","first-page":"589","DOI":"10.26599\/TST.2019.9010067","volume":"25","author":"J Tang","year":"2020","unstructured":"Tang J, Li R, Wang K, Gu X, Xu Z (2020) A novel hybrid method to analyze security vulnerabilities in android applications. Tsinghua Sci Technol 25(5):589\u2013603. https:\/\/doi.org\/10.26599\/TST.2019.9010067","journal-title":"Tsinghua Sci Technol"},{"issue":"2","key":"18066_CR6","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1109\/TCYB.2017.2777960","volume":"49","author":"SY Yerima","year":"2018","unstructured":"Yerima SY, Sezer S (2018) DroidFusion: A novel multilevel classifier fusion approach for android malware detection. IEEE Trans Cybern 49(2):453\u2013466. https:\/\/doi.org\/10.1109\/TCYB.2017.2777960","journal-title":"IEEE Trans Cybern"},{"issue":"1","key":"18066_CR7","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1109\/TR.2017.2778147","volume":"67","author":"G Tao","year":"2018","unstructured":"Tao G, Zheng Z, Guo Z, Lyu MR (2018) MalPat: mining patterns of malicious and benign android apps via permission-related APIs. IEEE Trans Reliab 67(1):355\u2013369. https:\/\/doi.org\/10.1109\/TR.2017.2778147","journal-title":"IEEE Trans Reliab"},{"key":"18066_CR8","doi-asserted-by":"publisher","unstructured":"Avdiienko V et al. (2015) Mining apps for abnormal usage of sensitive data. In: 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering, 1, 426\u2013436. https:\/\/doi.org\/10.1109\/ICSE.2015.61","DOI":"10.1109\/ICSE.2015.61"},{"key":"18066_CR9","doi-asserted-by":"crossref","unstructured":"Aafer Y, Du W, Yin H (2013) DroidAPIMiner: Mining API-level features for robust malware detection in android. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, vol. 127 LNICST, pp. 86\u2013103","DOI":"10.1007\/978-3-319-04283-1_6"},{"issue":"2","key":"18066_CR10","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/S11416-016-0277-Z\/TABLES\/28","volume":"13","author":"MV Varsha","year":"2017","unstructured":"Varsha MV, Vinod P, Dhanya KA (2017) Identification of malicious android app using manifest and opcode features. J Comput Virol Hacking Tech 13(2):125\u2013138. https:\/\/doi.org\/10.1007\/S11416-016-0277-Z\/TABLES\/28","journal-title":"J Comput Virol Hacking Tech"},{"key":"18066_CR11","doi-asserted-by":"publisher","first-page":"4321","DOI":"10.1109\/ACCESS.2018.2792941","volume":"6","author":"S Arshad","year":"2018","unstructured":"Arshad S, Shah MA, Wahid A, Mehmood A, Song H, Yu H (2018) SAMADroid: A novel 3-level hybrid malware detection model for android operating system. IEEE Access 6:4321\u20134339. https:\/\/doi.org\/10.1109\/ACCESS.2018.2792941","journal-title":"IEEE Access"},{"key":"18066_CR12","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.cose.2016.11.007","volume":"65","author":"A Feizollah","year":"2017","unstructured":"Feizollah A, Anuar NB, Salleh R, Suarez-Tangil G, Furnell S (2017) AndroDialysis: analysis of android intent effectiveness in malware detection. Comput Secur 65:121\u2013134. https:\/\/doi.org\/10.1016\/j.cose.2016.11.007","journal-title":"Comput Secur"},{"issue":"11","key":"18066_CR13","doi-asserted-by":"publisher","first-page":"1869","DOI":"10.1109\/TIFS.2014.2353996","volume":"9","author":"W Wang","year":"2014","unstructured":"Wang W, Wang X, Feng D, Liu J, Han Z, Zhang X (2014) Exploring permission-induced risk in android applications for malicious application detection. IEEE Trans Inf Forensics Secur 9(11):1869\u20131882. https:\/\/doi.org\/10.1109\/TIFS.2014.2353996","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"8","key":"18066_CR14","doi-asserted-by":"publisher","first-page":"1772","DOI":"10.1109\/TIFS.2017.2687880","volume":"12","author":"M Fan","year":"2017","unstructured":"Fan M, Liu J, Wang W, Li H, Tian Z, Liu T (2017) DAPASA: Detecting Android Piggybacked Apps through sensitive subgraph analysis. IEEE Trans Inf Forensics Secur 12(8):1772\u20131785. https:\/\/doi.org\/10.1109\/TIFS.2017.2687880","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"18066_CR15","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1109\/TDSC.2014.2355839","volume":"12","author":"L Cen","year":"2015","unstructured":"Cen L, Gates CS, Si L, Li N (2015) A probabilistic discriminative model for android malware detection with decompiled source code. IEEE Trans Dependable Secur Comput 12(4):400\u2013412. https:\/\/doi.org\/10.1109\/TDSC.2014.2355839","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"18066_CR16","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1016\/j.future.2017.01.019","volume":"78","author":"W Wang","year":"2018","unstructured":"Wang W, Li Y, Wang X, Liu J, Zhang X (2018) Detecting android malicious apps and categorizing benign apps with ensemble of classifiers. Futur Gener Comput Syst 78:987\u2013994. https:\/\/doi.org\/10.1016\/j.future.2017.01.019","journal-title":"Futur Gener Comput Syst"},{"issue":"1","key":"18066_CR17","doi-asserted-by":"publisher","first-page":"231","DOI":"10.48550\/arxiv.1612.01445","volume":"1","author":"B Kang","year":"2016","unstructured":"Kang B, Yerima SY, Sezer S, McLaughlin K (2016) N-gram opcode analysis for android malware detection. Int J Cyber Situational Aware 1(1):231\u2013255. https:\/\/doi.org\/10.48550\/arxiv.1612.01445","journal-title":"Int J Cyber Situational Aware"},{"key":"18066_CR18","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/J.INFSOF.2016.03.004","volume":"75","author":"S Wu","year":"2016","unstructured":"Wu S, Wang P, Li X, Zhang Y (2016) Effective detection of android malware based on the usage of data flow APIs and machine learning. Inf Softw Technol 75:17\u201325. https:\/\/doi.org\/10.1016\/J.INFSOF.2016.03.004","journal-title":"Inf Softw Technol"},{"issue":"2","key":"18066_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3503463","volume":"25","author":"N Daoudi","year":"2022","unstructured":"Daoudi N, Allix K, Bissyand\u00e9 TF, Klein J (2022) A deep dive inside DREBIN: An explorative analysis beyond android malware detection scores. ACM Trans Priv Secur 25(2):1\u201328. https:\/\/doi.org\/10.1145\/3503463","journal-title":"ACM Trans Priv Secur"},{"key":"18066_CR20","doi-asserted-by":"publisher","unstructured":"Elsersy WF, Anuar NB, Razak MFA (2022) ROOTECTOR: Robust android rooting detection framework using machine learning algorithms. Arab J Sci Eng:1\u201321. https:\/\/doi.org\/10.1007\/s13369-022-06949-5","DOI":"10.1007\/s13369-022-06949-5"},{"key":"18066_CR21","doi-asserted-by":"publisher","first-page":"117833","DOI":"10.1016\/j.eswa.2022.117833","volume":"206","author":"AT Kabakus","year":"2022","unstructured":"Kabakus AT (2022) DroidMalwareDetector: A novel Android malware detection framework based on convolutional neural network. Expert Syst Appl 206:117833. https:\/\/doi.org\/10.1016\/j.eswa.2022.117833","journal-title":"Expert Syst Appl"},{"key":"18066_CR22","doi-asserted-by":"publisher","unstructured":"Chen T, Guestrin C (2016) \u201cXGBoost,\u201d In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, vol. 13-17-Augu, pp. 785\u2013794, https:\/\/doi.org\/10.1145\/2939672.2939785","DOI":"10.1145\/2939672.2939785"},{"issue":"10","key":"18066_CR23","doi-asserted-by":"publisher","first-page":"7711","DOI":"10.1007\/s00521-021-06885-9","volume":"34","author":"K Meidani","year":"2022","unstructured":"Meidani K, Hemmasian A, Mirjalili S, Barati Farimani A (2022) Adaptive grey wolf optimizer. Neural Comput Appl 34(10):7711\u20137731. https:\/\/doi.org\/10.1007\/s00521-021-06885-9","journal-title":"Neural Comput Appl"},{"key":"18066_CR24","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46\u201361. https:\/\/doi.org\/10.1016\/j.advengsoft.2013.12.007","journal-title":"Adv Eng Softw"},{"key":"18066_CR25","doi-asserted-by":"publisher","first-page":"23311","DOI":"10.1109\/ACCESS.2021.3056588","volume":"9","author":"K Zhang","year":"2021","unstructured":"Zhang K et al (2021) A novel seepage behavior prediction and lag process identification method for concrete dams using HGWO-XGBoost model. IEEE Access 9:23311\u201323325. https:\/\/doi.org\/10.1109\/ACCESS.2021.3056588","journal-title":"IEEE Access"},{"key":"18066_CR26","doi-asserted-by":"publisher","first-page":"116971","DOI":"10.1016\/j.eswa.2022.116971","volume":"199","author":"AR Dhar","year":"2022","unstructured":"Dhar AR, Gupta D, Roy SS, Lohar AK, Mandal N (2022) Covariance matrix adapted grey wolf optimizer tuned eXtreme gradient boost for bi-directional modelling of direct metal deposition process. Expert Syst Appl 199:116971. https:\/\/doi.org\/10.1016\/j.eswa.2022.116971","journal-title":"Expert Syst Appl"},{"key":"18066_CR27","doi-asserted-by":"publisher","first-page":"5908","DOI":"10.1109\/ACCESS.2023.3235912","volume":"11","author":"P Jiang","year":"2023","unstructured":"Jiang P et al (2023) Prediction dynamics in cotton aphid using unmanned aerial vehicle multispectral images and vegetation indices. IEEE Access 11:5908\u20135918. https:\/\/doi.org\/10.1109\/ACCESS.2023.3235912","journal-title":"IEEE Access"},{"issue":"5","key":"18066_CR28","doi-asserted-by":"publisher","first-page":"4145","DOI":"10.1007\/S00366-021-01393-9\/METRICS","volume":"38","author":"Y Qiu","year":"2022","unstructured":"Qiu Y, Zhou J, Khandelwal M, Yang H, Yang P, Li C (2022) Performance evaluation of hybrid WOA-XGBoost, GWO-XGBoost and BO-XGBoost models to predict blast-induced ground vibration. Eng Comput 38(5):4145\u20134162. https:\/\/doi.org\/10.1007\/S00366-021-01393-9\/METRICS","journal-title":"Eng Comput"},{"key":"18066_CR29","doi-asserted-by":"publisher","first-page":"103351","DOI":"10.1016\/j.autcon.2020.103351","volume":"119","author":"F Lv","year":"2020","unstructured":"Lv F, Wang J, Cui B, Yu J, Sun J, Zhang J (2020) An improved extreme gradient boosting approach to vehicle speed prediction for construction simulation of earthwork. Autom Constr 119:103351. https:\/\/doi.org\/10.1016\/j.autcon.2020.103351","journal-title":"Autom Constr"},{"key":"18066_CR30","doi-asserted-by":"publisher","first-page":"131261","DOI":"10.1016\/j.conbuildmat.2023.131261","volume":"381","author":"B Xi","year":"2023","unstructured":"Xi B, Huang Z, Al-Obaidi S, Ferrara L (2023) Predicting ultra high-performance concrete self-healing performance using hybrid models based on metaheuristic optimization techniques. Constr Build Mater 381:131261. https:\/\/doi.org\/10.1016\/j.conbuildmat.2023.131261","journal-title":"Constr Build Mater"},{"issue":"7","key":"18066_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S40430-021-03070-W\/METRICS","volume":"43","author":"Y Chen","year":"2021","unstructured":"Chen Y, Cheng A, Zhang C, Chen S, Ren Z (2021) Rapid mechanical evaluation of the engine hood based on machine learning. J Braz Soc Mech Sci Eng 43(7):1\u201317. https:\/\/doi.org\/10.1007\/S40430-021-03070-W\/METRICS","journal-title":"J Braz Soc Mech Sci Eng"},{"key":"18066_CR32","doi-asserted-by":"publisher","first-page":"102794","DOI":"10.1016\/j.jisa.2021.102794","volume":"59","author":"V Syrris","year":"2021","unstructured":"Syrris V, Geneiatakis D (2021) On machine learning effectiveness for malware detection in Android OS using static analysis data. J Inf Secur Appl 59:102794. https:\/\/doi.org\/10.1016\/j.jisa.2021.102794","journal-title":"J Inf Secur Appl"},{"key":"18066_CR33","unstructured":"GitHub - BaratiLab\/Adaptive-Grey-Wolf-Optimization-Algorithm-AGWO.\u00a0https:\/\/github.com\/BaratiLab\/Adaptive-Grey-Wolf-Optimization-Algorithm-AGWO. Accessed 29 Apr 2023"},{"key":"18066_CR34","doi-asserted-by":"publisher","unstructured":"Zhou Y, Jiang X (2012) Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy. pp. 95\u2013109, https:\/\/doi.org\/10.1109\/SP.2012.16","DOI":"10.1109\/SP.2012.16"},{"key":"18066_CR35","unstructured":"Android malware genome project. http:\/\/www.malgenomeproject.org\/. Accessed 06 Sep 2022"},{"key":"18066_CR36","unstructured":"The drebin dataset. https:\/\/www.sec.tu-bs.de\/~danarp\/drebin\/. Accessed 09 Sep 2022"},{"key":"18066_CR37","doi-asserted-by":"publisher","unstructured":"Arp D, Spreitzenbarth M, H\u00fcbner M, Gascon H, Rieck K (2014) Drebin: effective and explainable detection of android malware in your pocket. https:\/\/doi.org\/10.14722\/ndss.2014.23247","DOI":"10.14722\/ndss.2014.23247"},{"issue":"3","key":"18066_CR38","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1080\/15536548.2015.1073510","volume":"11","author":"M Damshenas","year":"2015","unstructured":"Damshenas M, Dehghantanha A, Choo K-KR, Mahmud R (2015) M0Droid: An android behavioral-based malware detection model. J Inf Priv Secur 11(3):141\u2013157. https:\/\/doi.org\/10.1080\/15536548.2015.1073510","journal-title":"J Inf Priv Secur"},{"key":"18066_CR39","unstructured":"The M0DROID Dataset. https:\/\/www.impactcybertrust.org\/dataset_view?idDataset=1266. Accessed 09 Sep 2022"},{"key":"18066_CR40","doi-asserted-by":"publisher","unstructured":"Lashkari AH, Kadir AFA, Taheri L, Ghorbani AA (2018) Toward developing a systematic approach to generate benchmark android malware datasets and classification,\u201d in 2018 International Carnahan Conference on Security Technology (ICCST), vol. 2018-Octob, pp. 1\u20137, https:\/\/doi.org\/10.1109\/CCST.2018.8585560","DOI":"10.1109\/CCST.2018.8585560"},{"key":"18066_CR41","unstructured":"\u201cAndroid Malware 2017 | Datasets | Research | Canadian Institute for Cybersecurity | UNB.\u201d https:\/\/www.unb.ca\/cic\/datasets\/andmal2017.html (Accessed Sep. 06, 2022)."},{"key":"18066_CR42","unstructured":"Download APK fast, free and safe on android. https:\/\/m.apkpure.com\/. Accessed 07 Sep 2022"},{"issue":"5","key":"18066_CR43","doi-asserted-by":"publisher","first-page":"1774","DOI":"10.1109\/TNNLS.2017.2673241","volume":"29","author":"S Zhang","year":"2018","unstructured":"Zhang S, Li X, Zong M, Zhu X, Wang R (2018) Efficient kNN classification with different numbers of nearest neighbors. IEEE Trans Neural Networks Learn Syst 29(5):1774\u20131785. https:\/\/doi.org\/10.1109\/TNNLS.2017.2673241","journal-title":"IEEE Trans Neural Networks Learn Syst"},{"issue":"10","key":"18066_CR44","doi-asserted-by":"publisher","first-page":"1361","DOI":"10.1109\/TKDE.2008.234","volume":"21","author":"L Jiang","year":"2009","unstructured":"Jiang L, Zhang H, Cai Z (2009) A novel bayes model: Hidden naive bayes. IEEE TransKnowl Data Eng 21(10):1361\u20131371. https:\/\/doi.org\/10.1109\/TKDE.2008.234","journal-title":"IEEE TransKnowl Data Eng"},{"issue":"3","key":"18066_CR45","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1109\/TSMCB.2005.861067","volume":"36","author":"J-T Jeng","year":"2006","unstructured":"Jeng J-T (2006) Hybrid approach of selecting hyperparameters of support vector machine for regression. IEEE Trans Syst Man, Cybern Part B 36(3):699\u2013709. https:\/\/doi.org\/10.1109\/TSMCB.2005.861067","journal-title":"IEEE Trans Syst Man, Cybern Part B"},{"issue":"4","key":"18066_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3017427","volume":"49","author":"K Tam","year":"2017","unstructured":"Tam K, Feizollah A, Anuar NB, Salleh R, Cavallaro L (2017) The evolution of android malware and android analysis techniques. ACM Comput Surv 49(4):1\u201341. https:\/\/doi.org\/10.1145\/3017427","journal-title":"ACM Comput Surv"},{"key":"18066_CR47","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-981-15-5616-6_22\/COVER","volume":"1174","author":"P Agrawal","year":"2021","unstructured":"Agrawal P, Trivedi B (2021) Machine learning classifiers for android malware detection. Adv Intell Syst Comput 1174:311\u2013322. https:\/\/doi.org\/10.1007\/978-981-15-5616-6_22\/COVER","journal-title":"Adv Intell Syst Comput"},{"issue":"1","key":"18066_CR48","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 2001 451 45(1):5\u201332. https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach Learn 2001 451"},{"issue":"1","key":"18066_CR49","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1006\/jcss.1997.1504","volume":"55","author":"Y Freund","year":"1997","unstructured":"Freund Y, Schapire RE (1997) A decision-theoretic generalization of on-line learning and an application to boosting. J Comput Syst Sci 55(1):119\u2013139. https:\/\/doi.org\/10.1006\/jcss.1997.1504","journal-title":"J Comput Syst Sci"},{"key":"18066_CR50","unstructured":"Bergstra J, Bardenet R, Bengio Y, K\u00e9gl B (2011) Algorithms for hyper-parameter optimization. Adv Neural Inf Process Syst 24"},{"key":"18066_CR51","unstructured":"MalPat: Mining patterns of malicious and benign android apps via permission-related APIs. http:\/\/malpat.inpluslab.com\/. Accessed 09 May 2023"},{"key":"18066_CR52","unstructured":"MUDFLOW - Mining apps for abnormal usage of sensitive data. https:\/\/www.st.cs.uni-saarland.de\/appmining\/mudflow\/. Accessed 11 May 2023"},{"key":"18066_CR53","unstructured":"GitHub - ChenJunHero\/DroidAPIMiner: Mining API-level features for robust malware detection in android. https:\/\/github.com\/ChenJunHero\/DroidAPIMiner. Accessed 09 May 2023"},{"key":"18066_CR54","doi-asserted-by":"publisher","first-page":"116468","DOI":"10.1016\/j.eswa.2021.116468","volume":"193","author":"MV Kazemi","year":"2022","unstructured":"Kazemi MV, Veysari EF (2022) A new optimization algorithm inspired by the quest for the evolution of human society: Human felicity algorithm. Expert Syst Appl 193:116468. https:\/\/doi.org\/10.1016\/j.eswa.2021.116468","journal-title":"Expert Syst Appl"},{"key":"18066_CR55","doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez A, Garc\u00eda S, Galar M, Prati RC, B. Krawczyk, Herrera F (2018) \u201cCost-Sensitive Learning,\u201d In: Learning from Imbalanced Data Sets, Cham: Springer International Publishing, pp. 63\u201378","DOI":"10.1007\/978-3-319-98074-4_4"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-18066-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-18066-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-18066-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T17:49:09Z","timestamp":1720460949000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-18066-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,17]]},"references-count":55,"journal-issue":{"issue":"24","published-online":{"date-parts":[[2024,7]]}},"alternative-id":["18066"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-18066-y","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,1,17]]},"assertion":[{"value":"23 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no conflicts of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}