{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T08:03:54Z","timestamp":1769933034075,"version":"3.49.0"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T00:00:00Z","timestamp":1751587200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T00:00:00Z","timestamp":1751587200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62373078"],"award-info":[{"award-number":["62373078"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comp. Appl. Math."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s40314-025-03293-w","type":"journal-article","created":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T14:29:45Z","timestamp":1751639385000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Transfer Graph in the Context of Evidence Theory"],"prefix":"10.1007","volume":"44","author":[{"given":"Tianxiang","family":"Zhan","sequence":"first","affiliation":[]},{"given":"Qianzhou","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yuanpeng","family":"He","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9286-2123","authenticated-orcid":false,"given":"Yong","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,4]]},"reference":[{"issue":"8","key":"3293_CR1","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1016\/0031-3203(94)90145-7","volume":"27","author":"S Aeberhard","year":"1994","unstructured":"Aeberhard S, Coomans D, De Vel O (1994) Comparative analysis of statistical pattern recognition methods in high dimensional settings. Pattern Recognition 27(8):1065\u20131077","journal-title":"Pattern Recognition"},{"key":"3293_CR2","unstructured":"Aeberhard S, Forina M (1992) Wine. UCI Machine Learning Repository"},{"key":"3293_CR3","doi-asserted-by":"crossref","unstructured":"Bao W, Yu Q, Kong Y (2021) Evidential deep learning for open set action recognition. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 13349\u201313358","DOI":"10.1109\/ICCV48922.2021.01310"},{"key":"3293_CR4","doi-asserted-by":"crossref","unstructured":"Cohen S, Guibasm L (1999) The earth mover\u2019s distance under transformation sets. In: Proceedings of the Seventh IEEE International Conference on Computer Vision, vol. 2, pp. 1076\u20131083. IEEE","DOI":"10.1109\/ICCV.1999.790393"},{"key":"3293_CR5","doi-asserted-by":"crossref","unstructured":"Chen X, Zhan T, Zhou G, Deng Y (2025) Variance of belief information. Applied Mathematical Modelling, 116148","DOI":"10.1016\/j.apm.2025.116148"},{"issue":"8","key":"3293_CR6","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1038\/nbt1406","volume":"26","author":"CB Do","year":"2008","unstructured":"Do CB, Batzoglou S (2008) What is the expectation maximization algorithm? Nature biotechnology 26(8):897\u2013899","journal-title":"Nature biotechnology"},{"key":"3293_CR7","doi-asserted-by":"crossref","unstructured":"Deng J, Deng Y, Yang J-B (2024) Random permutation set reasoning. IEEE Transactions on Pattern Analysis and Machine Intelligence","DOI":"10.1109\/TPAMI.2024.3438349"},{"key":"3293_CR8","doi-asserted-by":"crossref","unstructured":"DEMPSTER A (1967) Upper and lower probabilities induced by a multivalued mapping. Annals of Mathematical Statistics 38:325\u2013339","DOI":"10.1214\/aoms\/1177698950"},{"issue":"1","key":"3293_CR9","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1109\/TKDE.2011.201","volume":"25","author":"T Denoeux","year":"2011","unstructured":"Denoeux T (2011) Maximum likelihood estimation from uncertain data in the belief function framework. IEEE Transactions on knowledge and data engineering 25(1):119\u2013130","journal-title":"IEEE Transactions on knowledge and data engineering"},{"key":"3293_CR10","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1016\/j.chaos.2016.07.014","volume":"91","author":"Y Deng","year":"2016","unstructured":"Deng Y (2016) Deng entropy. Chaos, Solitons & Fractals 91:549\u2013553","journal-title":"Chaos, Solitons & Fractals"},{"key":"3293_CR11","doi-asserted-by":"crossref","unstructured":"Deng Y (2022) Random permutation set. International Journal of Computers Communications & Control 17(1)","DOI":"10.15837\/ijccc.2022.1.4542"},{"key":"3293_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.121622","volume":"691","author":"W Ding","year":"2025","unstructured":"Ding W, Hou T, Huang J, Ju H, Jiang S (2025) Dynamic evidence fusion neural networks with uncertainty theory and its application in brain network analysis. Information Sciences 691:121622","journal-title":"Information Sciences"},{"key":"3293_CR13","unstructured":"Fisher RA (1936) Iris. UCI Machine Learning Repository"},{"key":"3293_CR14","doi-asserted-by":"crossref","unstructured":"Gao X, Pan L, Deng Y (2022) Cross entropy of mass function and its application in similarity measure. Applied Intelligence, 1\u201314","DOI":"10.1007\/s10489-021-02890-6"},{"issue":"6","key":"3293_CR15","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s40314-022-01975-3","volume":"41","author":"X Gao","year":"2022","unstructured":"Gao X, Xiao F (2022) An improved belief $$\\chi $$ 2 divergence for dempster-shafer theory and its applications in pattern recognition. Computational and Applied Mathematics 41(6):277","journal-title":"Computational and Applied Mathematics"},{"key":"3293_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.110040","volume":"146","author":"B Gao","year":"2024","unstructured":"Gao B, Zhou Q, Deng Y (2024) Hie-edt: Hierarchical interval estimation-based evidential decision tree. Pattern Recognition 146:110040","journal-title":"Pattern Recognition"},{"issue":"4","key":"3293_CR17","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/5254.708428","volume":"13","author":"MA Hearst","year":"1998","unstructured":"Hearst MA, Dumais ST, Osuna E, Platt J, Scholkopf B (1998) Support vector machines. IEEE Intelligent Systems and their applications 13(4):18\u201328","journal-title":"IEEE Intelligent Systems and their applications"},{"key":"3293_CR18","unstructured":"Hamerly G, Elkan C (2003) Learning the k in k-means. Advances in neural information processing systems 16"},{"key":"3293_CR19","unstructured":"Hofmann H (1994) Statlog (German Credit Data). UCI Machine Learning Repository"},{"key":"3293_CR20","doi-asserted-by":"publisher","unstructured":"KAHRAMAN HT (2018) Land Mines. UCI Machine Learning Repository. https:\/\/doi.org\/10.24432\/C54C8Z","DOI":"10.24432\/C54C8Z"},{"key":"3293_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107262","volume":"127","author":"R Liu","year":"2024","unstructured":"Liu R, Li Z, Deng Y (2024) Performance evaluation of information fusion systems based on belief entropy. Engineering Applications of Artificial Intelligence 127:107262","journal-title":"Engineering Applications of Artificial Intelligence"},{"issue":"22","key":"3293_CR22","doi-asserted-by":"publisher","first-page":"3632","DOI":"10.3390\/math12223632","volume":"12","author":"M Li","year":"2024","unstructured":"Li M, Li L, Zhang Q (2024) Information fusion and decision-making utilizing additional permutation information. Mathematics 12(22):3632","journal-title":"Mathematics"},{"issue":"6","key":"3293_CR23","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/s40314-022-02000-3","volume":"41","author":"P Liu","year":"2022","unstructured":"Liu P, Xiao F (2022) Earth movers divergence of belief function. Computational and Applied Mathematics 41(6):292","journal-title":"Computational and Applied Mathematics"},{"issue":"7","key":"3293_CR24","doi-asserted-by":"publisher","first-page":"1764","DOI":"10.1109\/TFUZZ.2020.2985332","volume":"29","author":"Z Liu","year":"2020","unstructured":"Liu Z, Zhang X, Niu J, Dezert J (2020) Combination of classifiers with different frames of discernment based on belief functions. IEEE Transactions on Fuzzy Systems 29(7):1764\u20131774","journal-title":"IEEE Transactions on Fuzzy Systems"},{"issue":"4","key":"3293_CR25","doi-asserted-by":"publisher","first-page":"1384","DOI":"10.1016\/j.patcog.2007.08.014","volume":"41","author":"M-H Masson","year":"2008","unstructured":"Masson M-H, Denoeux T (2008) Ecm: An evidential version of the fuzzy c-means algorithm. Pattern Recognition 41(4):1384\u20131397","journal-title":"Pattern Recognition"},{"key":"3293_CR26","doi-asserted-by":"crossref","unstructured":"Martins MV, Tolledo D, Machado J, Baptista LM, Realinho V (2021) Early prediction of students performance in higher education: a case study. In: Trends and Applications in Information Systems and Technologies: Volume 1 9, pp. 166\u2013175. Springer","DOI":"10.1007\/978-3-030-72657-7_16"},{"key":"3293_CR27","unstructured":"National Poll on Healthy Aging (NPHA). UCI Machine Learning Repository (2017)"},{"key":"3293_CR28","unstructured":"Paszke A, Gross S, Massa F, Lerer A, Bradbury J, Chanan G, Killeen T, Lin Z, Gimelshein N, Antiga L et al (2019) Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems 32"},{"key":"3293_CR29","unstructured":"Quinlan R (1987) Statlog (Australian Credit Approval). UCI Machine Learning Repository"},{"key":"3293_CR30","doi-asserted-by":"crossref","unstructured":"Realinho, V., Vieira, M. Martins, Machado, J., Baptista, L.: Predict Students\u2019 Dropout and Academic Success. UCI Machine Learning Repository. DOI: https:\/\/doi.org\/10.24432\/C5MC89 (2021)","DOI":"10.3390\/data7110146"},{"key":"3293_CR31","unstructured":"Sigillito WSHLV, Baker K (1989) Ionosphere. UCI Machine Learning Repository"},{"key":"3293_CR32","unstructured":"Sejnowski T, Gorman R (1988) Connectionist Bench (Sonar, Mines vs. Rocks). UCI Machine Learning Repository"},{"issue":"3","key":"3293_CR33","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE (1948) A mathematical theory of communication. The Bell system technical journal 27(3):379\u2013423","journal-title":"The Bell system technical journal"},{"key":"3293_CR34","doi-asserted-by":"crossref","unstructured":"Shafer G (1976) A mathematical theory of evidence","DOI":"10.1515\/9780691214696"},{"issue":"4","key":"3293_CR35","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1109\/TIT.1981.1056373","volume":"27","author":"J Shore","year":"1981","unstructured":"Shore J, Johnson R (1981) Properties of cross-entropy minimization. IEEE Transactions on Information Theory 27(4):472\u2013482","journal-title":"IEEE Transactions on Information Theory"},{"key":"3293_CR36","doi-asserted-by":"crossref","unstructured":"Smets P, Kennes R (2008) The transferable belief model. Classic Works of the Dempster-Shafer Theory of Belief Functions, 693\u2013736","DOI":"10.1007\/978-3-540-44792-4_28"},{"key":"3293_CR37","unstructured":"Sensoy M, Kaplan L, Kandemir M (2018) Evidential deep learning to quantify classification uncertainty. Advances in neural information processing systems 31"},{"issue":"5","key":"3293_CR38","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1109\/34.55104","volume":"12","author":"P Smets","year":"1990","unstructured":"Smets P (1990) The combination of evidence in the transferable belief model. IEEE Transactions on pattern analysis and machine intelligence 12(5):447\u2013458","journal-title":"IEEE Transactions on pattern analysis and machine intelligence"},{"key":"3293_CR39","doi-asserted-by":"crossref","unstructured":"Suthaharan S, Suthaharan S (2016) Decision tree learning. Machine Learning Models and Algorithms for Big Data Classification: Thinking with Examples for Effective Learning, 237\u2013269","DOI":"10.1007\/978-1-4899-7641-3_10"},{"issue":"9","key":"3293_CR40","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1080\/0740817X.2012.706378","volume":"45","author":"M Sallak","year":"2013","unstructured":"Sallak M, Sch\u00f6n W, Aguirre F (2013) Reliability assessment for multi-state systems under uncertainties based on the dempster-shafer theory. IIE Transactions 45(9):995\u20131007","journal-title":"IIE Transactions"},{"key":"3293_CR41","unstructured":"Statlog (Heart). UCI Machine Learning Repository"},{"key":"3293_CR42","unstructured":"Street WN, Wolberg WH, Mangasarian OL (1993) Nuclear feature extraction for breast tumor diagnosis. In: Biomedical Image Processing and Biomedical Visualization, vol. 1905, pp. 861\u2013870. SPIE"},{"issue":"6","key":"3293_CR43","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1111\/1740-9713.01589","volume":"18","author":"A Unwin","year":"2021","unstructured":"Unwin A, Kleinman K (2021) The iris data set: In search of the source of virginica. Significance 18(6):26\u201329","journal-title":"Significance"},{"key":"3293_CR44","unstructured":"Wolberg W, Mangasarian O, Street N, Street W (1993) Breast Cancer Wisconsin (Diagnostic). UCI Machine Learning Repository"},{"key":"3293_CR45","doi-asserted-by":"crossref","unstructured":"Wang M, Zhou G, Deng Y (2025) Uncertainty management with quantitative propensity matrix in random permutation set theory. Inf Sci 692:121645","DOI":"10.1016\/j.ins.2024.121645"},{"key":"3293_CR46","doi-asserted-by":"crossref","unstructured":"Wang N, Yuen KF, Yuan J, Li D (2024) Ship collision risk assessment: A multi-criteria decision-making framework based on dempster\u2013shafer evidence theory. Applied Soft Computing, 111823","DOI":"10.1016\/j.asoc.2024.111823"},{"key":"3293_CR47","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.ijar.2015.05.002","volume":"72","author":"P Xu","year":"2016","unstructured":"Xu P, Davoine F, Zha H, Denoeux T (2016) Evidential calibration of binary svm classifiers. International Journal of Approximate Reasoning 72:55\u201370","journal-title":"International Journal of Approximate Reasoning"},{"key":"3293_CR48","doi-asserted-by":"publisher","first-page":"47870","DOI":"10.1109\/ACCESS.2018.2866538","volume":"6","author":"C Yilmaz","year":"2018","unstructured":"Yilmaz C, Kahraman HT, S\u00f6yler S (2018) Passive mine detection and classification method based on hybrid model. IEEE Access 6:47870\u201347888","journal-title":"IEEE Access"},{"key":"3293_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.artint.2013.09.003","volume":"205","author":"J-B Yang","year":"2013","unstructured":"Yang J-B, Xu D-L (2013) Evidential reasoning rule for evidence combination. Artificial Intelligence 205:1\u201329","journal-title":"Artificial Intelligence"},{"key":"3293_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.112017","volume":"164","author":"H Zhang","year":"2024","unstructured":"Zhang H, Chang Y, Zhang Y, Kang B (2024) Evaluate the competence of fuzzy preference using statistical conflict in the frame of ds evidence theory. Applied Soft Computing 164:112017","journal-title":"Applied Soft Computing"},{"key":"3293_CR51","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2022.108750","volume":"174","author":"Q Zhou","year":"2022","unstructured":"Zhou Q, Huang Y, Deng Y (2022) Belief evolution network-based probability transformation and fusion. Computers & Industrial Engineering 174:108750","journal-title":"Computers & Industrial Engineering"},{"key":"3293_CR52","doi-asserted-by":"crossref","unstructured":"Zhan T, He Y, Deng Y, Li Z, Du W, Wen Q (2024) Time evidence fusion network: Multi-source view in long-term time series forecasting. arXiv preprint arXiv:2405.06419","DOI":"10.1109\/TPAMI.2025.3596905"},{"key":"3293_CR53","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2023.114388","volume":"178","author":"T Zhao","year":"2024","unstructured":"Zhao T, Li Z, Deng Y (2024) Linearity in deng entropy. Chaos, Solitons & Fractals 178:114388","journal-title":"Chaos, Solitons & Fractals"},{"issue":"2","key":"3293_CR54","doi-asserted-by":"publisher","first-page":"837","DOI":"10.1109\/TKDE.2024.3484009","volume":"37","author":"Q Zhou","year":"2025","unstructured":"Zhou Q, Pedrycz W, Deng Y (2025) Order-2 probabilistic information fusion on random permutation set. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 37(2):837\u2013850. https:\/\/doi.org\/10.1109\/TKDE.2024.3484009","journal-title":"IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING"},{"issue":"1","key":"3293_CR55","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/s40314-023-02543-z","volume":"43","author":"Z Zeng","year":"2024","unstructured":"Zeng Z, Xiao F (2024) A generalized hellinger distance for multisource information fusion and its application in pattern classification. Computational and Applied Mathematics 43(1):50","journal-title":"Computational and Applied Mathematics"},{"key":"3293_CR56","doi-asserted-by":"crossref","unstructured":"Zhang L, Xiao F (2024) Belief re\u2019 nyi divergence of divergence and its application in time series classification. IEEE Transactions on Knowledge and Data Engineering","DOI":"10.1109\/TKDE.2024.3369719"},{"key":"3293_CR57","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119107","volume":"642","author":"L Zhang","year":"2023","unstructured":"Zhang L, Xiao F, Cao Z (2023) Multi-channel eeg signals classification via cnn and multi-head self-attention on evidence theory. Information Sciences 642:119107","journal-title":"Information Sciences"},{"key":"3293_CR58","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.114976","volume":"184","author":"T Zhan","year":"2024","unstructured":"Zhan T, Zhou J, Li Z, Deng Y (2024) Generalized information entropy and generalized information dimension. Chaos, Solitons & Fractals 184:114976","journal-title":"Chaos, Solitons & Fractals"}],"container-title":["Computational and Applied Mathematics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40314-025-03293-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40314-025-03293-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40314-025-03293-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T05:05:06Z","timestamp":1757394306000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40314-025-03293-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,4]]},"references-count":58,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["3293"],"URL":"https:\/\/doi.org\/10.1007\/s40314-025-03293-w","relation":{},"ISSN":["2238-3603","1807-0302"],"issn-type":[{"value":"2238-3603","type":"print"},{"value":"1807-0302","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,4]]},"assertion":[{"value":"26 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author(s) declares that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}],"article-number":"345"}}