{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:44:13Z","timestamp":1764996253823,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T00:00:00Z","timestamp":1583107200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T00:00:00Z","timestamp":1583107200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100012476","name":"Fundamental Research Funds for Central Universities of the Central South University","doi-asserted-by":"publisher","award":["No.2019zzts588"],"award-info":[{"award-number":["No.2019zzts588"]}],"id":[{"id":"10.13039\/501100012476","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.61772553","No.61379058"],"award-info":[{"award-number":["No.61772553","No.61379058"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s11227-020-03211-3","type":"journal-article","created":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T21:03:52Z","timestamp":1583183032000},"page":"9716-9738","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Dynamic clustering method for imbalanced learning based on AdaBoost"],"prefix":"10.1007","volume":"76","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2740-8025","authenticated-orcid":false,"given":"Xiaoheng","family":"Deng","sequence":"first","affiliation":[]},{"given":"Yuebin","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Lingchi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Weijian","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Alireza","family":"Jolfaei","sequence":"additional","affiliation":[]},{"given":"Xi","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,2]]},"reference":[{"key":"3211_CR1","doi-asserted-by":"publisher","DOI":"10.1201\/9781315139470","volume-title":"Classification and regression trees","author":"L Breiman","year":"2017","unstructured":"Breiman L (2017) Classification and regression trees. Routledge, Abingdon"},{"key":"3211_CR2","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) Smote: synthetic minority over-sampling technique. J Artif Intell Res 16:321\u2013357","journal-title":"J Artif Intell Res"},{"key":"3211_CR3","doi-asserted-by":"crossref","unstructured":"Chawla NV, Lazarevic A, Hall LO, Bowyer KW (2003) Smoteboost: improving prediction of the minority class in boosting. In: European Conference on Principles of Data Mining and Knowledge Discovery. Springer, pp 107\u2013119","DOI":"10.1007\/978-3-540-39804-2_12"},{"issue":"1","key":"3211_CR4","doi-asserted-by":"publisher","first-page":"767","DOI":"10.3233\/JIFS-171250","volume":"35","author":"X Deng","year":"2018","unstructured":"Deng X, Zeng D, Shen H (2018) Causation analysis model: based on ahp and hybrid apriori-genetic algorithm. J Intell Fuzzy Syst 35(1):767\u2013778","journal-title":"J Intell Fuzzy Syst"},{"key":"3211_CR5","doi-asserted-by":"crossref","unstructured":"Deng X, Chen H, Cai R, Zeng F, Xu G, Zhang H (2019) A knowledge-based multiplayer collaborative routing in opportunistic networks. In: 2019 IEEE Intl Conf on Dependable. Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech). IEEE, pp 16\u201321","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/CyberSciTech.2019.00019"},{"key":"3211_CR6","first-page":"1","volume":"3","author":"RL Devi","year":"2019","unstructured":"Devi RL, Kalaivani V (2019) Machine learning and iot-based cardiac arrhythmia diagnosis using statistical and dynamic features of ecg. J Supercomput 3:1\u201312","journal-title":"J Supercomput"},{"key":"3211_CR7","unstructured":"Elkan C (2001) The foundations of cost-sensitive learning. In: International Joint Conference on Artificial Intelligence, Vol 17, No 1. Lawrence Erlbaum Associates Ltd"},{"issue":"1","key":"3211_CR8","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1006\/jcss.1997.1504","volume":"55","author":"Y Freund","year":"1997","unstructured":"Freund Y, Schapire RE (1997) A decision-theoretic generalization of on-line learning and an application to boosting. J Comput Syst Sci 55(1):119\u2013139","journal-title":"J Comput Syst Sci"},{"key":"3211_CR9","unstructured":"Freund Y, Schapire RE et al (1996) Experiments with a new boosting algorithm. In: Icml, vol 96. Citeseer, pp 148\u2013156"},{"key":"3211_CR10","doi-asserted-by":"crossref","unstructured":"Han H, Wang WY, Mao BH (2005) Borderline-smote: a new over-sampling method in imbalanced data sets learning. In: International Conference on Intelligent Computing, Springer, pp 878\u2013887","DOI":"10.1007\/11538059_91"},{"issue":"138","key":"3211_CR11","first-page":"6857","volume":"9","author":"FS Hanifah","year":"2015","unstructured":"Hanifah FS, Wijayanto H, Kurnia A (2015) Smotebagging algorithm for imbalanced dataset in logistic regression analysis (case: Credit of bank x). Appl. Math. Sci. 9(138):6857\u20136865","journal-title":"Appl. Math. Sci."},{"key":"3211_CR12","unstructured":"He H, Bai Y, Garcia EA, Li S (2008) Adasyn: Adaptive synthetic sampling approach for imbalanced learning. In: IEEE International Joint Conference on Neural Networks, 2008. IJCNN 2008.(IEEE World Congress on Computational Intelligence). IEEE, pp 1322\u20131328"},{"key":"3211_CR13","first-page":"1480","volume":"264","author":"P Hu","year":"2019","unstructured":"Hu P, Xia E, Li S, Du X, Ma C, Dong J, Chan KC (2019) Network-based prediction of major adverse cardiac events in acute coronary syndromes from imbalanced emr data. Stud Health Technol Inf 264:1480\u20131481","journal-title":"Stud Health Technol Inf"},{"key":"3211_CR14","doi-asserted-by":"crossref","unstructured":"Hu S, Liang Y, Ma L, He Y (2009) Msmote: improving classification performance when training data is imbalanced. In: Second International Workshop on Computer Science and Engineering, WCSE\u201909, vol 2. IEEE, pp 13\u201317","DOI":"10.1109\/WCSE.2009.756"},{"key":"3211_CR15","doi-asserted-by":"crossref","unstructured":"Desai A, Jadav K, Chaudhary S (2015) An empirical evaluation of costboost extensions for cost-sensitive classification. In: Proceedings of the 8th Annual ACM India Conference, pp 73\u201377","DOI":"10.1145\/2835043.2835048"},{"key":"3211_CR16","unstructured":"Kaur P, Negi V (2016) Techniques based upon boosting to counter class imbalance problem?a survey. In: 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), IEEE. pp 2620\u20132623"},{"issue":"4","key":"3211_CR17","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s13748-016-0094-0","volume":"5","author":"B Krawczyk","year":"2016","unstructured":"Krawczyk B (2016) Learning from imbalanced data: open challenges and future directions. Prog Artif Intell 5(4):221\u2013232","journal-title":"Prog Artif Intell"},{"issue":"6","key":"3211_CR18","doi-asserted-by":"publisher","first-page":"3028","DOI":"10.1007\/s11227-018-2394-6","volume":"75","author":"J Lee","year":"2019","unstructured":"Lee J, Moon D, Kim I, Lee Y (2019) A semantic approach to improving machine readability of a large-scale attack graph. J Supercomput 75(6):3028\u20133045","journal-title":"J Supercomput"},{"key":"3211_CR19","doi-asserted-by":"crossref","unstructured":"Lingchi C, Xiaoheng D, Hailan S, Congxu Z, Le C (2018) Dycusboost: Adaboost-based imbalanced learning using dynamic clustering and undersampling. In: 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech). IEEE, pp 208\u2013215","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00045"},{"key":"3211_CR20","doi-asserted-by":"crossref","unstructured":"Liu TY (2009) Easyensemble and feature selection for imbalance data sets. In: International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing, 2009. IJCBS\u201909. IEEE, pp 517\u2013520","DOI":"10.1109\/IJCBS.2009.22"},{"issue":"2","key":"3211_CR21","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1109\/TSMCB.2008.2007853","volume":"39","author":"XY Liu","year":"2009","unstructured":"Liu XY, Wu J, Zhou ZH (2009) Exploratory undersampling for class-imbalance learning. IEEE Trans Syst Man Cybern Part B (Cybern) 39(2):539\u2013550","journal-title":"IEEE Trans Syst Man Cybern Part B (Cybern)"},{"key":"3211_CR22","unstructured":"Lusa L et al (2012) Evaluation of smote for high-dimensional class-imbalanced microarray data. In: 2012 11th International Conference on Machine Learning and Applications, vol 2. IEEE, pp 89\u201394"},{"issue":"2","key":"3211_CR23","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1109\/TPAMI.2010.71","volume":"33","author":"H Masnadi-Shirazi","year":"2011","unstructured":"Masnadi-Shirazi H, Vasconcelos N (2011) Cost-sensitive boosting. IEEE Trans Pattern Anal Mach Intell 33(2):294\u2013309","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"3","key":"3211_CR24","doi-asserted-by":"publisher","first-page":"142","DOI":"10.6026\/97320630007142","volume":"7","author":"K Moorthy","year":"2011","unstructured":"Moorthy K, Mohamad MS (2011) Random forest for gene selection and microarray data classification. Bioinformation 7(3):142","journal-title":"Bioinformation"},{"key":"3211_CR25","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.neucom.2015.01.068","volume":"158","author":"L Nanni","year":"2015","unstructured":"Nanni L, Fantozzi C, Lazzarini N (2015) Coupling different methods for overcoming the class imbalance problem. Neurocomputing 158:48\u201361","journal-title":"Neurocomputing"},{"key":"3211_CR26","first-page":"1","volume":"55","author":"A Pandey","year":"2019","unstructured":"Pandey A, Sequeria R, Kumar P, Kumar S (2019) A multistage deep residual network for biomedical cyber-physical systems. IEEE Syst J 55:1\u201310","journal-title":"IEEE Syst J"},{"key":"3211_CR27","doi-asserted-by":"crossref","unstructured":"Prati RC, Batista GE, Monard MC (2004) Learning with class skews and small disjuncts. In: Brazilian Symposium on Artificial Intelligence. Springer, pp 296\u2013306","DOI":"10.1007\/978-3-540-28645-5_30"},{"key":"3211_CR28","doi-asserted-by":"publisher","first-page":"104933","DOI":"10.1016\/j.knosys.2019.104933","volume":"185","author":"K Qi","year":"2019","unstructured":"Qi K, Yang H, Hu Q, Yang D (2019) A new adaptive weighted imbalanced data classifier via improved support vector machines with high-dimension nature. Knowl-Based Syst 185:104933","journal-title":"Knowl-Based Syst"},{"issue":"1","key":"3211_CR29","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/TSMCA.2009.2029559","volume":"40","author":"C Seiffert","year":"2010","unstructured":"Seiffert C, Khoshgoftaar TM, Van Hulse J, Napolitano A (2010) Rusboost: a hybrid approach to alleviating class imbalance. IEEE Trans Syst Man Cybern Part A Syst Humans 40(1):185\u2013197","journal-title":"IEEE Trans Syst Man Cybern Part A Syst Humans"},{"key":"3211_CR30","doi-asserted-by":"crossref","unstructured":"Smeraldi F, Bicego M, Cristani M, Murino V (2011) Cloosting: Clustering data with boosting. In: International Workshop on Multiple Classifier Systems, vol 6713, pp 289\u2013298","DOI":"10.1007\/978-3-642-21557-5_31"},{"key":"3211_CR31","doi-asserted-by":"crossref","unstructured":"Soltani S, Sadri J, Torshizi HA (2011) Feature selection and ensemble hierarchical cluster-based under-sampling approach for extremely imbalanced datasets: Application to gene classification. In: 2011 1st International eConference on Computer and Knowledge Engineering (ICCKE). IEEE, pp 166\u2013171","DOI":"10.1109\/ICCKE.2011.6413345"},{"key":"3211_CR32","doi-asserted-by":"crossref","unstructured":"Tavallali P, Yazdi M, Khosravi MR (2017) An efficient training procedure for viola-jones face detector. In: 2017 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, pp 828\u2013831","DOI":"10.1109\/CSCI.2017.143"},{"issue":"2","key":"3211_CR33","doi-asserted-by":"publisher","first-page":"2599","DOI":"10.1007\/s11042-018-6385-7","volume":"78","author":"P Tavallali","year":"2019","unstructured":"Tavallali P, Yazdi M, Khosravi MR (2019) Robust cascaded skin detector based on adaboost. Multimed Tools Appl 78(2):2599\u20132620","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"3211_CR34","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1023\/B:VISI.0000013087.49260.fb","volume":"57","author":"P Viola","year":"2004","unstructured":"Viola P, Jones MJ (2004) Robust real-time face detection. Int J Comput Vis 57(2):137\u2013154","journal-title":"Int J Comput Vis"},{"key":"3211_CR35","first-page":"S10848045183004","volume":"107","author":"G Xu","year":"2018","unstructured":"Xu G, Jia L, Lu Y, Zeng X, Yao Z, Li X (2018a) A novel efficient maka protocol with desynchronization for anonymous roaming service in global mobility networks. J Netw Comput Appl 107:S1084804518300407","journal-title":"J Netw Comput Appl"},{"key":"3211_CR36","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1016\/j.ins.2018.05.022","volume":"476","author":"G Xu","year":"2018","unstructured":"Xu G, Yao Z, Sangaiah AK, Li X, Castiglione A, Xi Z (2018b) Csp-e 2: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems. Inf Sci 476:505\u2013515","journal-title":"Inf Sci"},{"issue":"3","key":"3211_CR37","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s00521-007-0089-7","volume":"16","author":"K Yoon","year":"2007","unstructured":"Yoon K, Kwek S (2007) A data reduction approach for resolving the imbalanced data issue in functional genomics. Neural Comput Appl 16(3):295\u2013306","journal-title":"Neural Comput Appl"},{"issue":"99","key":"3211_CR38","first-page":"1","volume":"PP","author":"X Zeng","year":"2018","unstructured":"Zeng X, Xu G, Xi Z, Yang X, Zhou W (2018) E-aua: an efficient anonymous user authentication protocol for mobile iot. IEEE Internet Things J PP(99):1\u20131","journal-title":"IEEE Internet Things J"},{"issue":"11","key":"3211_CR39","first-page":"63","volume":"42","author":"X Zhang","year":"2015","unstructured":"Zhang X, Luo Q (2015) Unbalanced data classification algorithm based on clustering ensemble under-sampling. Comput Sci 42(11):63\u201366","journal-title":"Comput Sci"},{"key":"3211_CR40","doi-asserted-by":"publisher","first-page":"104826","DOI":"10.1016\/j.knosys.2019.06.034","volume":"187","author":"T Zhu","year":"2020","unstructured":"Zhu T, Lin Y, Liu Y (2020) Improving interpolation-based oversampling for imbalanced data learning. Knowl-Based Syst 187:104826","journal-title":"Knowl-Based Syst"},{"issue":"8","key":"3211_CR41","doi-asserted-by":"publisher","first-page":"936","DOI":"10.1016\/j.cherd.2010.01.005","volume":"88","author":"ZB Zhu","year":"2010","unstructured":"Zhu ZB, Song ZH (2010) Fault diagnosis based on imbalance modified kernel fisher discriminant analysis. Chem Eng Res Des 88(8):936\u2013951","journal-title":"Chem Eng Res Des"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-020-03211-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-020-03211-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-020-03211-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,2]],"date-time":"2021-03-02T00:58:38Z","timestamp":1614646718000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-020-03211-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,2]]},"references-count":41,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["3211"],"URL":"https:\/\/doi.org\/10.1007\/s11227-020-03211-3","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2020,3,2]]},"assertion":[{"value":"2 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}