{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T17:02:22Z","timestamp":1775667742177,"version":"3.50.1"},"reference-count":88,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100013589","name":"Research England for the Pitch-In Project","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100013589","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2020.3047838","type":"journal-article","created":{"date-parts":[[2020,12,28]],"date-time":"2020-12-28T20:46:56Z","timestamp":1609188416000},"page":"2734-2757","source":"Crossref","is-referenced-by-count":45,"title":["Learning With Imbalanced Data in Smart Manufacturing: A Comparative Analysis"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7398-5283","authenticated-orcid":false,"given":"Yasmin","family":"Fathy","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0908-3207","authenticated-orcid":false,"given":"Mona","family":"Jaber","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4189-2434","authenticated-orcid":false,"given":"Alexandra","family":"Brintrup","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2019.07.001"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00980"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18781-5_17"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2016.7845472"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/BF02589501"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/s11590-020-01574-3"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.3390\/e19020047"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/BF00058655"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.2307\/2283970"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-009-9124-7"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/EMBC.2013.6610228"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.earscirev.2017.11.027"},{"key":"ref33","first-page":"973","article-title":"The foundations of cost-sensitive learning","volume":"17","author":"elkan","year":"2001","journal-title":"Proc Int Joint Conf Artif Intell"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHM.2019.8819392"},{"key":"ref31","article-title":"Data augmentation using GANs","author":"dos santos tanaka","year":"2019","journal-title":"arXiv 1904 09135"},{"key":"ref30","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2015.06.001"},{"key":"ref36","first-page":"231","article-title":"Cost-sensitive learning and the class imbalance problem","volume":"2011","author":"ling","year":"2008","journal-title":"Encyc of Mach Learn"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.05.020"},{"key":"ref34","first-page":"176","article-title":"Classification with class imbalance problem: A review","volume":"7","author":"ali","year":"2015","journal-title":"Int J Advance Soft Comput Appl"},{"key":"ref60","first-page":"1","article-title":"Improving the improved training of wasserstein GANs: A consistency term and its dual effect","author":"wei","year":"2018","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref62","first-page":"5767","article-title":"Improved training of wasserstein gans","author":"gulrajani","year":"2017","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref61","volume":"338","author":"villani","year":"2008","journal-title":"Optimal Transport Old and New"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-018-1196-0"},{"key":"ref28","first-page":"878","article-title":"Borderline-SMOTE: A new over-sampling method in imbalanced data sets learning","author":"han","year":"2005","journal-title":"Proc Int Conf Intell Comput"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.10.014"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01307-2_43"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ROBIO49542.2019.8961501"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.05.045"},{"key":"ref29","first-page":"1322","article-title":"ADASYN: Adaptive synthetic sampling approach for imbalanced learning","author":"he","year":"2008","journal-title":"Proc IEEE Int Joint Conf Neural Netw (IEEE World Congr Comput Intell )"},{"key":"ref67","first-page":"1","article-title":"An access control mechanism based on risk prediction for the IoV","author":"liu","year":"2020","journal-title":"Proc IEEE Veh Technol Conf (VTC Spring)"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/584091.584093"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/0377-0427(87)90125-7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS.2017.8342870"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2018.01.006"},{"key":"ref20","first-page":"1","article-title":"kNN approach to unbalanced data distributions: A case study involving information extraction","volume":"126","author":"mani","year":"2003","journal-title":"Proc of Workshop on Learning from Imbalanced Datasets"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.10.017"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1302\/2\/022064"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2019.07.001"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-017-0037-9"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258307"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2920246"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2955086"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.11192"},{"key":"ref59","first-page":"365","article-title":"Using WGAN for improving imbalanced classification performance","author":"bhatia","year":"2019","journal-title":"Proc AICSP"},{"key":"ref58","article-title":"Wasserstein GAN","author":"arjovsky","year":"2017","journal-title":"arXiv 1701 07875"},{"key":"ref57","article-title":"Conditional generative adversarial nets","author":"mirza","year":"2014","journal-title":"arXiv 1411 1784"},{"key":"ref56","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"arXiv 1412 6980"},{"key":"ref55","article-title":"NIPS 2016 tutorial: Generative adversarial networks","author":"goodfellow","year":"2017","journal-title":"arXiv 1701 00160"},{"key":"ref54","article-title":"How (not) to train your generative model: Scheduled sampling, likelihood, adversary?","author":"husz\u00e1r","year":"2015","journal-title":"arXiv 1511 05101"},{"key":"ref53","article-title":"From GAN to WGAN","author":"weng","year":"2019","journal-title":"arXiv 1904 08994"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.299"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105683"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46349-0_33"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2018.01.003"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007734"},{"key":"ref82","first-page":"217","article-title":"Logistic regression","author":"wright","year":"1995","journal-title":"Reading and understanding multivariate statistics"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273614"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1038\/nmeth.4346"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2961784"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0192-5"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.05.008"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.4271\/2017-01-0237"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.05.006"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/s18092946"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2959784"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2018.2868316"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1002\/9781118646106"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3154525"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46349-0_36"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3015034"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2960310"},{"key":"ref87","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2020.05.035"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s13748-016-0094-0"},{"key":"ref46","first-page":"1","article-title":"C4. 5, class imbalance, and cost sensitivity: Why under-sampling beats over-sampling","volume":"11","author":"drummond","year":"2003","journal-title":"Proc of the ICML workshop on learning from imbalanced datasets"},{"key":"ref45","first-page":"1","article-title":"Applying adaptive over-sampling technique based on data density and cost-sensitive SVM to imbalanced learning","author":"wang","year":"2012","journal-title":"Proc Int Joint Conf Neural Netw (IJCNN)"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3291801.3291812"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.09.013"},{"key":"ref42","doi-asserted-by":"crossref","DOI":"10.1002\/9781118914564","author":"kuncheva","year":"2014","journal-title":"Combining Pattern Classifiers Methods Algorithms"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1013203451"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICIII.2011.276"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2013.04.006"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09309288.pdf?arnumber=9309288","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T11:12:14Z","timestamp":1697454734000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9309288\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":88,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3047838","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}