{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T01:56:26Z","timestamp":1775008586786,"version":"3.50.1"},"reference-count":71,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,6,23]],"date-time":"2018-06-23T00:00:00Z","timestamp":1529712000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s13042-018-0838-1","type":"journal-article","created":{"date-parts":[[2018,6,23]],"date-time":"2018-06-23T01:52:29Z","timestamp":1529718749000},"page":"1893-1907","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":50,"title":["A feature selection technique based on rough set and improvised PSO algorithm (PSORS-FS) for permission based detection of Android malwares"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3369-3002","authenticated-orcid":false,"given":"Abhishek","family":"Bhattacharya","sequence":"first","affiliation":[]},{"given":"Radha Tamal","family":"Goswami","sequence":"additional","affiliation":[]},{"given":"Kuntal","family":"Mukherjee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,23]]},"reference":[{"key":"838_CR1","unstructured":"Androguard Project in Google Code Archive (2017) \n                    https:\/\/code.google.com\/p\/androguard\n                    \n                  . Accessed 27th April 2017"},{"key":"838_CR2","doi-asserted-by":"crossref","unstructured":"Arp D, Spreitzenbarth M, Hubner M, Gascon H, Rieck K, Siemens C (2014) DREBIN: effective and explainable detection of android malware in your pocket. \n                    https:\/\/www.internetsociety.org\/foc\/drebin-effective-and-explainable-detection-android-malware-you-pocket\n                    \n                  . Accessed 29th April 2017","DOI":"10.14722\/ndss.2014.23247"},{"key":"838_CR3","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-319-12060-7_20","volume":"8804","author":"AM Aswini","year":"2014","unstructured":"Aswini AM, Vinod P (2014) Android malware analysis using ensemble features. Security, privacy, and applied cryptography engineering lecture. Notes Comput Sci 8804:303\u2013318","journal-title":"Notes Comput Sci"},{"key":"838_CR4","doi-asserted-by":"publisher","unstructured":"Aswini AM, Vinod P (2014) Droid permission miner: mining prominent permissions for android malware analysis. In: Proceedings of the 5th international conference on the applications of the digital information and web technologies. \n                    https:\/\/doi.org\/10.1109\/ICADIWAT.2014.6814679","DOI":"10.1109\/ICADIWAT.2014.6814679"},{"key":"838_CR5","doi-asserted-by":"publisher","unstructured":"Azevedo G, Cavalcanti G, Filho E (2007) An approach to feature selection for keystroke dynamics systems based on PSO and feature weighting. In: Proceedings of IEEE congress on evolutionary computation, pp 3577\u20133584. \n                    https:\/\/doi.org\/10.1007\/978-3-319-13563-2-51","DOI":"10.1007\/978-3-319-13563-2-51"},{"key":"838_CR6","doi-asserted-by":"publisher","unstructured":"Bazan J, Nguyen HS, Nguyen SH, Synak P, Wroblewski J (2000) Rough set algorithms in classification problem. \n                    https:\/\/doi.org\/10.1007\/978-3-7908-1840-6$43","DOI":"10.1007\/978-3-7908-1840-6$43"},{"key":"838_CR7","doi-asserted-by":"publisher","unstructured":"Bello R, G\u00f3mez Y, Caballero Y, Nowe A, Falc\u00f3n R (2009) Rough sets and evolutionary computation to solve the feature selection problem. \n                    https:\/\/doi.org\/10.1007\/978-3-540-89921-1$49","DOI":"10.1007\/978-3-540-89921-1$49"},{"key":"838_CR8","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/978-981-10-2035-3_20","volume-title":"Proceedings of the first international conference on intelligent computing and communication","author":"A Bhattacharya","year":"2016","unstructured":"Bhattacharya A, Goswami RT (2016) DMDAM: data mining based detection of android malware. In: Mandal J, Satapathy S, Sanyal M, Bhateja V (eds) Proceedings of the first international conference on intelligent computing and communication. Advances in intelligent systems and computing, vol 458. Springer, Singapore, pp 187\u2013194"},{"key":"838_CR9","volume-title":"Proceedings of the 5th international conference on frontiers in intelligent computing: theory and applications","author":"A Bhattacharya","year":"2016","unstructured":"Bhattacharya A, Goswami RT (2016) Comparative analysis of different feature ranking techniques in data mining based android malware detection. In: Satapathy S, Bhateja V, Udgata S, Pattnaik P (eds) Proceedings of the 5th international conference on frontiers in intelligent computing: theory and applications. Advances in intelligent systems and computing, vol 515. Springer, Singapore"},{"key":"838_CR10","volume-title":"Binary particle swarm optimisation and rough set theory for dimension reduction in classification, Evolutionary Computation (CEC). Computation Series","author":"L Cervante","year":"2013","unstructured":"Cervante L, Xue B, Shang L, Zhang M (2013) Binary particle swarm optimisation and rough set theory for dimension reduction in classification, Evolutionary Computation (CEC). Computation Series. Morgan Kaufman, San Francisco"},{"key":"838_CR11","unstructured":"Contagiodump Mobile Dump (2017). \n                    http:\/\/contagiodump.blogspot.in\n                    \n                  . Accessed 1 Apr 2017"},{"key":"838_CR12","unstructured":"Crussel J, Gibler C, Chen H (2012) AnDarwin: scalable detection of semantically similar android applications. In: Proceedings of the European symposium on research in computer security. Springer, pp 182\u2013199"},{"key":"838_CR13","doi-asserted-by":"publisher","DOI":"10.1002\/9780470512517","volume-title":"Computational intelligence: an introduction","author":"AP Engelbrecht","year":"2007","unstructured":"Engelbrecht AP (2007) Computational intelligence: an introduction, 2nd edn. Wiley, New York","edition":"2"},{"key":"838_CR14","doi-asserted-by":"publisher","unstructured":"Felt AP, Chin ME, Hanna S, Wagner D (2011) A survey of mobile malware in the wild. In: Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices (SPSM \u201911). ACM, New York, NY, USA, pp 3\u201314. \n                    https:\/\/doi.org\/10.1145\/2046614.2046618","DOI":"10.1145\/2046614.2046618"},{"key":"838_CR15","doi-asserted-by":"publisher","first-page":"954","DOI":"10.1002\/asi.20042","volume":"55","author":"AE Hassanien","year":"2004","unstructured":"Hassanien AE (2004) Rough set approach for attribute reduction and rule generation: a case of patients with suspected breast cancer. J Am Soc Inform Sci Technol 55:954\u2013962","journal-title":"J Am Soc Inform Sci Technol"},{"key":"838_CR16","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.compag.2017.02.026","volume":"136","author":"AE Hassanien","year":"2017","unstructured":"Hassanien AE, Gaber T, Mokhtar U, Hefny H (2017) An improved moth flame optimization algorithm based on rough sets for tomato diseases detection. Comput Electron Agric 136:86\u201396","journal-title":"Comput Electron Agric"},{"key":"838_CR17","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1142\/S0218213003001319","volume":"12","author":"Hassanien","year":"2003","unstructured":"Hassanien (2003) Intelligent data analysis of breast cancer based on rough set theory. Int J Artif Intell Tools 12:465\u2013479","journal-title":"Int J Artif Intell Tools"},{"key":"838_CR18","unstructured":"Hassanien AE, Emary E, Yamany W (2014) New approach for feature selection based on rough set and bat algorithm. In: 9th International conference on computer engineering & systems (ICCES). IEEE, pp 346\u2013353"},{"key":"838_CR19","volume-title":"Advanced machine learning technologies and applications. Communications in computer and information science","author":"AE Hassanien","year":"2014","unstructured":"Hassanien AE, Tolba M, Azar AT (2014) Advanced machine learning technologies and applications. Communications in computer and information science, vol\u00a0488. Springer-Verlag GmbH, Berlin\/Heidelberg (ISBN: 978-3-319-13460-4)"},{"key":"838_CR20","unstructured":"http:\/\/virusshare.com\n                    \n                  . Accessed 10th April 2017"},{"key":"838_CR21","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1016\/j.patrec.2005.09.004","volume":"27","author":"QH Hu","year":"2006","unstructured":"Hu QH, Yu DR, Xie ZX (2006) Information-preserving hybrid data reduction based on fuzzy-rough techniques. Pattern Recogn Lett 27:414\u2013423","journal-title":"Pattern Recogn Lett"},{"key":"838_CR22","doi-asserted-by":"publisher","first-page":"1381","DOI":"10.1016\/j.asoc.2007.10.007","volume":"8","author":"CL Huang","year":"2008","unstructured":"Huang CL, Dun JF (2008) A distributed PSO-SVM hybrid system with feature selection and parameter optimization. Appl Soft Comput 8:1381\u20131391","journal-title":"Appl Soft Comput"},{"key":"838_CR23","volume-title":"Advances in intelligent systems and applications\u2014volume 2","author":"CY Huang","year":"2013","unstructured":"Huang CY, Tsai YT, Hsu CH (2013) Performance evaluation on permission-based detection for android malware. In: Pan JS, Yang CN, Lin CC (eds) Advances in intelligent systems and applications\u2014volume 2. Smart innovation, systems and technologies, vol 21. Springer, Berlin, Heidelberg"},{"key":"838_CR24","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.cmpb.2013.10.007","volume":"113","author":"HH Inbarani","year":"2014","unstructured":"Inbarani HH, Azar AT, Jothi G (2014) Supervised hybrid feature selection based on PSO and rough sets for medical diagnosis. Comput Methods Program Biomed 113:175\u2013185","journal-title":"Comput Methods Program Biomed"},{"key":"838_CR25","unstructured":"Jensen R, Shen Q (2003) Finding rough set reducts with ant colony optimization. In: Proceedings of the 2003 UK workshop on computational intelligence, pp 15\u201322"},{"key":"838_CR26","doi-asserted-by":"publisher","unstructured":"Jensen R, Shen Q (2008) Interval-valued fuzzy-rough feature selection and application for handling missing values in datasets. In: Proceedings of the 8th annual UK workshop on computational intelligence (UKCI\u201908), pp 59\u201364. \n                    https:\/\/doi.org\/10.1109\/FUZZY.2009.5277289","DOI":"10.1109\/FUZZY.2009.5277289"},{"key":"838_CR27","unstructured":"Juniper Networks: Third Annual Mobile Threats Report (2013) \n                    http:\/\/www.juniper.net\/us\/en\/local\/pdf\/additional-resources\/jnpr-2012-mobile-threats-report.pdf\n                    \n                  . Accessed 10 Apr 2017"},{"key":"838_CR28","doi-asserted-by":"publisher","unstructured":"Kennedy J, Eberhart RC (1997) A discrete binary version of the particle swarm algorithm. In: Proceedings of IEEE international conference on systems, man, and cybernetics, computational cybernetics and simulation, pp 4104\u20134109. \n                    https:\/\/doi.org\/10.1109\/ICSMC.1997.637339","DOI":"10.1109\/ICSMC.1997.637339"},{"key":"838_CR29","unstructured":"Kennedy J, Eberhart RC, Shi Y (2001) Swarm Intelligence. Morgan Kaufmann (ISBN: 9780080518268)"},{"key":"838_CR30","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/S0004-3702(97)00043-X","volume":"97","author":"R Kohavi","year":"1997","unstructured":"Kohavi R, John GH (1997) Wrappers for feature subset selection. Artif Intell 97:273\u2013324","journal-title":"Artif Intell"},{"key":"838_CR31","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.ipm.2004.08.006","volume":"42","author":"C Lee","year":"2006","unstructured":"Lee C, Lee GG (2006) Information gain and divergence-based feature selection for machine learning-based text categorization. Inform Process Manag 42:155\u2013165","journal-title":"Inform Process Manag"},{"key":"838_CR32","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1007\/s00521-016-2707-8","volume":"28","author":"Z Li","year":"2017","unstructured":"Li Z, Shi K, Dey N, Ashour AS, Wang D, Balas VE, McCauley P, Fuqian S (2017) Rule-based back propagation neural networks for various precision rough set presented KANSEI knowledge prediction: a case study on shoe product form features extraction. Neural Comput Appl 28:613\u2013630","journal-title":"Neural Comput Appl"},{"key":"838_CR33","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1016\/j.asoc.2009.01.001","volume":"9","author":"SW Lin","year":"2009","unstructured":"Lin SW, Chen SC (2009) Psolda: a particle swarm optimization approach for enhancing classification accuracy rate of linear discriminant analysis. Appl Soft Comput 9:1008\u20131015","journal-title":"Appl Soft Comput"},{"key":"838_CR34","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/S1672-6529(11)60020-6","volume":"8","author":"Y Liu","year":"2011","unstructured":"Liu Y, Wang G, Chen H, Dong H, Zhu X, Wang S (2011) An improved particle swarm optimization for feature selection. J Bionic Eng 8:191\u2013200","journal-title":"J Bionic Eng"},{"key":"838_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.06.090","author":"XY Luan","year":"2016","unstructured":"Luan XY, Li ZP, Liu TZ (2016) A novel attribute reduction algorithm based on rough set and improved artificial fish swarm algorithm. Neurocomputing. \n                    https:\/\/doi.org\/10.1016\/j.neucom.2015.06.090","journal-title":"Neurocomputing"},{"key":"838_CR36","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.eswa.2007.08.089","volume":"35","author":"Y Marinakis","year":"2008","unstructured":"Marinakis Y, Marinaki M, Dounias G (2008) Particle swarm optimization for pap-smear diagnosis. Expert Syst Appl 35:1645\u20131656","journal-title":"Expert Syst Appl"},{"key":"838_CR37","doi-asserted-by":"publisher","unstructured":"Mohemmed A, Zhang M, Johnston M (2009) Particle swarm optimization based adaboost for face detection. In: IEEE congress on evolutionary computation, Trondheim, pp 2494\u20132501. \n                    https:\/\/doi.org\/10.1109\/CEC.2009.4983254","DOI":"10.1109\/CEC.2009.4983254"},{"key":"838_CR38","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/BF01001956","volume":"11","author":"Z Pawlak","year":"1982","unstructured":"Pawlak Z (1982) Rough sets. Int J Comput Inform Sci 11:341\u2013356 (pp.\u00a02428\u20132435)","journal-title":"Int J Comput Inform Sci"},{"key":"838_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJRSDA.2016070101","volume":"3","author":"SH Ripon","year":"2016","unstructured":"Ripon SH, Kamal S, Hossain S, Dey N (2016) Theoretical analysis of different classifiers under reduction rough data set: a brief proposal. Int J Rough Sets Data Analysis (IJRSDA) 3:1\u201320","journal-title":"Int J Rough Sets Data Analysis (IJRSDA)"},{"key":"838_CR40","first-page":"387","volume-title":"Instance-based anomaly method for android malware detection","author":"B Sanz","year":"2013","unstructured":"Sanz B, Santos I, Pedrero XU, Nieves CJ, Bringas PG (2013) Instance-based anomaly method for android malware detection. SECRYPT SciTePress, Vienna, pp\u00a0387\u2013394"},{"key":"838_CR41","doi-asserted-by":"crossref","unstructured":"Shi Y, Eberhart RC (1999) Empirical study of particle swarm optimization. In: Proceedings of the IEEE congress on evolutionary computation. IEEE Press, pp 1945\u20131950","DOI":"10.1109\/CEC.1999.785511"},{"key":"838_CR42","unstructured":"Skowron A, Bazan J, Son NH, Wroblewski J (2005) RSES 2.2 user\u2019s guide. Institute of Mathematics"},{"key":"838_CR43","first-page":"49","volume":"2","author":"N Suguna","year":"2010","unstructured":"Suguna N, Thanushkodi K (2010) A novel rough set reduct algorithm for medical domain based on bee colony optimization. CoRR 2:49\u201354","journal-title":"CoRR"},{"key":"838_CR44","unstructured":"TrendLabs 2Q (2013) Security roundup. \n                    http:\/\/www.trendmicro.com\/cloud-content\/us\/pdfs\/security-intelligence\/reports\/rpt-2q-2013-trendlabs-security-roundup.pdf\n                    \n                  . Accessed 10 Apr 2017"},{"key":"838_CR45","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1016\/j.ejor.2010.02.032","volume":"206","author":"A Unler","year":"2010","unstructured":"Unler A, Murat A (2010) A discrete particle swarm optimization method for feature selection in binary Classification problems. Eur J Oper Res 206:528\u2013539","journal-title":"Eur J Oper Res"},{"key":"838_CR46","doi-asserted-by":"crossref","unstructured":"Vieira SM, Mendon\u00e7a LF, Farinha GJ, Sousa JMC (2012) Metaheuristics for feature selection: In: Application to sepsis outcome prediction, IEEE congress on evolutionary computation, Brisbane, QLD, pp 1\u20138","DOI":"10.1109\/CEC.2012.6256651"},{"key":"838_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2006.09.003","author":"X Wang","year":"2007","unstructured":"Wang X, Yang J, Teng X, Xia W, Jensen R (2007) Feature selection based on rough set and particle swarm optimization. Pattern Recogn Lett. \n                    https:\/\/doi.org\/10.1016\/j.patrec.2006.09.003","journal-title":"Pattern Recogn Lett"},{"key":"838_CR48","doi-asserted-by":"publisher","first-page":"1869","DOI":"10.1109\/TIFS.2014.2353996","volume":"9","author":"W Wang","year":"2014","unstructured":"Wang W, Wang X, Feng D, Liu J, Han Z, Zhang X (2014) Exploring permission-induced risk in android applications for malicious application detection. IEEE Trans Inf Forensics Secur 9:1869\u20131882","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"838_CR49","unstructured":"Wei Wang\u2019s Home Page (2016) \n                    http:\/\/infosec.bjtu.edu.cn\/wangwei\/?page_id=85\n                    \n                  . Accessed 31 Oct 2016"},{"key":"838_CR50","unstructured":"Weka Toolkit (2017) \n                    http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/\n                    \n                  . Accessed 10 Aug 2017"},{"key":"838_CR51","doi-asserted-by":"publisher","first-page":"3706","DOI":"10.1016\/j.patcog.2008.05.004","volume":"41","author":"WY Wing","year":"2008","unstructured":"Wing WY, Yeung DS, Firth M, Tsang ECC, Wang XZ (2008) Feature selection using localized generalization error for supervised classification problems using RBFNN. Pattern Recogn 41:3706\u20133719","journal-title":"Pattern Recogn"},{"key":"838_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.08.083","author":"W Yamany","year":"2016","unstructured":"Yamany W, Emary E, Hassanien AE, Schaefer G, Zhu SY (2016) An innovative approach for attribute reduction using rough sets and flower pollination optimisation. Procedia Comput Sci. \n                    https:\/\/doi.org\/10.1016\/j.procs.2016.08.083","journal-title":"Procedia Comput Sci"},{"key":"838_CR53","doi-asserted-by":"publisher","unstructured":"Yang CS, Chuang LY, Ke C-H, Yang C-H (2008) Boolean binary particle swarm optimization for feature selection. In: IEEE congress on evolutionary computation (IEEE world congress on computational intelligence), Hong Kong, pp\u00a02093\u20132098. \n                    https:\/\/doi.org\/10.1109\/CEC.2008.4631076","DOI":"10.1109\/CEC.2008.4631076"},{"key":"838_CR54","doi-asserted-by":"publisher","unstructured":"Yerima SY, Sezer S, McWilliams G, Muttik I (2013) A new android malware detection using Bayesian classification. In: IEEE 27th international conference on advanced information networking and applications (AINA), Barcelona, pp 121\u2013128. \n                    https:\/\/doi.org\/10.1109\/AINA.2013.88","DOI":"10.1109\/AINA.2013.88"},{"key":"838_CR55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73053-8_40","volume-title":"Bio-inspired modeling of cognitive tasks","author":"B Yue","year":"2007","unstructured":"Yue B, Yao W, Abraham A, Liu H (2007) A new rough set reduct algorithm based on particle swarm optimization. In: Mira J, \u00c1lvarez JR (eds) Bio-inspired modeling of cognitive tasks. IWINAC 2007. Lecture notes in computer science, vol 4527. Springer, Berlin, Heidelberg"},{"key":"838_CR56","doi-asserted-by":"publisher","unstructured":"Zeng A, Li T, Luo C, Zhang J, Yang Y (2013) A fuzzy rough set approach for incrementally updating approximations in hybrid information systems. In: Ciucci D, Inuiguchi M, Yao Y, \u015al\u0119zak D, Wang G (eds) (2013) Rough sets, fuzzy sets, data mining, and granular computing. RSFDGrC. lecture notes in computer science. \n                    https:\/\/doi.org\/10.1007\/978-3-642-41218-9_17","DOI":"10.1007\/978-3-642-41218-9_17"},{"key":"838_CR57","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.neucom.2012.09.049","volume":"148","author":"Y Zhang","year":"2015","unstructured":"Zhang Y, Gong DW (2015) Feature selection algorithm based on bare bones particle swarm optimization. Neurocomputing 148:150\u2013157. \n                    https:\/\/doi.org\/10.1016\/j.neucom.2012.09.049","journal-title":"Neurocomputing"},{"key":"838_CR58","doi-asserted-by":"publisher","unstructured":"Zheng M, Lee PP, Lui JC (2013) ADAM: an automatic and extensible platform to stress test android anti-virus systems. Detection of Intrusions and Malwares and Vulnerability Assessment. \n                    https:\/\/doi.org\/10.1007\/978-3-642-37300-8_5","DOI":"10.1007\/978-3-642-37300-8_5"},{"key":"838_CR59","doi-asserted-by":"publisher","unstructured":"Shi Y, Eberhart R (1998) A modified particle swarm optimizer. In: IEEE international conference on evolutionary computation proceedings. IEEE world congress on computational intelligence (Cat. No.98TH8360), Anchorage, AK, pp 69\u201373. \n                    https:\/\/doi.org\/10.1109\/ICEC.1998.699146","DOI":"10.1109\/ICEC.1998.699146"},{"key":"838_CR60","doi-asserted-by":"publisher","first-page":"1362","DOI":"10.1109\/TSMCB.2009.2015956","volume":"39","author":"ZH Zhan","year":"2009","unstructured":"Zhan ZH, Zhang J, Li Y (2009) Adaptive particle swarm optimization. IEEE Trans Syst Man Cybern Part B-Cybern 39:1362\u20131381","journal-title":"IEEE Trans Syst Man Cybern Part B-Cybern"},{"key":"838_CR61","doi-asserted-by":"publisher","first-page":"1281","DOI":"10.1016\/j.neucom.2015.07.057","volume":"171","author":"Z Yong","year":"2016","unstructured":"Yong Z, Gong DW, Zhang WQ (2016) Feature selection of unreliable data using an improved multi-objective PSO algorithm. Neurocomputing 171:1281\u20131290","journal-title":"Neurocomputing"},{"key":"838_CR62","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-017-00416-0","author":"Z Yong","year":"2017","unstructured":"Yong Z, Gong DW, Sun XY, Guo YN (2017) A PSO-based multi-objective multi-label feature selection method in classification. Sci Rep. \n                    https:\/\/doi.org\/10.1038\/s41598-017-00416-0","journal-title":"Sci Rep"},{"key":"838_CR63","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/TCBB.2015.2476796","volume":"14","author":"Z Yong","year":"2017","unstructured":"Yong Z, Gong DW, Cheng J (2017) Multi-objective particle swarm optimization approach for cost-based feature selection in classification. IEEE\/ACM Trans Comput Biol Bioinf 14:64\u201375","journal-title":"IEEE\/ACM Trans Comput Biol Bioinf"},{"key":"838_CR64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37198-1_3","volume-title":"Evolutionary computation in combinatorial optimization","author":"L Cervante","year":"2013","unstructured":"Cervante L, Xue B, Shang L, Zhang M (2013) A multi-objective feature selection approach based on binary pso and rough set theory. In: Middendorf M, Blum C (eds) Evolutionary computation in combinatorial optimization. EvoCOP 2013. Lecture notes in computer science, vol 7832. Springer, Berlin, Heidelberg"},{"key":"838_CR65","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2710422","author":"C Wang","year":"2017","unstructured":"Wang C, Hu Q, Wang XZ, Chen D, Qian Y, Dong Z (2017) Feature selection based on neighborhood discrimination index. IEEE Trans Neural Netw Learn Syst. \n                    https:\/\/doi.org\/10.1109\/TNNLS.2017.2710422","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"838_CR66","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.future.2017.05.044","volume":"78","author":"Y He","year":"2018","unstructured":"He Y, Xie H, Wong TL, Wang XZ (2018) A novel binary artificial bee colony algorithm for the set-union knapsack problem. Future Gener Comput Syst 78:77\u201386","journal-title":"Future Gener Comput Syst"},{"issue":"19","key":"838_CR67","doi-asserted-by":"publisher","first-page":"4230","DOI":"10.1016\/j.ins.2011.06.002","volume":"181","author":"XZ Wang","year":"2011","unstructured":"Wang XZ, He YL, Dong LC, Zhao HY (2011) Particle swarm optimization for determining fuzzy measures from data. Inf Sci 181(19):4230\u20134252","journal-title":"Inf Sci"},{"issue":"2","key":"838_CR68","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1109\/TFUZZ.2003.809895","volume":"11","author":"ECC Tsang","year":"2003","unstructured":"Tsang ECC, Yeung DS, Wang XZ (2003) OFFSS: Optimal fuzzy-valued feature subset selection. IEEE Trans Fuzzy Syst 11(2):202\u2013213","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"3","key":"838_CR69","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1007\/s00521-016-2707-8","volume":"28","author":"Z Li","year":"2017","unstructured":"Li Z, Shi K, Dey N, Ashour AS, Wang D, Balas VE, McCauley P, Shi F (2017) Rule-based back propagation neural networks for various precision rough set presented KANSEI knowledge prediction: a case study on shoe product form features extraction. Neural Comput Appl 28(3):613\u2013630","journal-title":"Neural Comput Appl"},{"issue":"3","key":"838_CR70","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJRSDA.2016070101","volume":"3","author":"SH Ripon","year":"2016","unstructured":"Ripon SH, Kama S, Hossain S, Dey N (2016) Theoretical analysis of different classifiers under reduction rough data set: a brief proposal. Int J Rough Sets Data Anal (IJRSDA) 3(3):1\u201320","journal-title":"Int J Rough Sets Data Anal (IJRSDA)"},{"issue":"2","key":"838_CR71","doi-asserted-by":"publisher","first-page":"32","DOI":"10.4018\/IJACI.2017040103","volume":"8","author":"D Acharjya","year":"2017","unstructured":"Acharjya D, Anitha A (2017) A comparative study of statistical and rough computing models in predictive data analysis. Int J Ambient Comput Intell (IJACI) 8(2):32\u201351","journal-title":"Int J Ambient Comput Intell (IJACI)"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-018-0838-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13042-018-0838-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-018-0838-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,22]],"date-time":"2019-06-22T19:08:17Z","timestamp":1561230497000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13042-018-0838-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,23]]},"references-count":71,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["838"],"URL":"https:\/\/doi.org\/10.1007\/s13042-018-0838-1","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,23]]},"assertion":[{"value":"4 September 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 June 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}