{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:47:53Z","timestamp":1774540073707,"version":"3.50.1"},"reference-count":55,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/aiccsa47632.2019.9035281","type":"proceedings-article","created":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T03:08:51Z","timestamp":1584414531000},"page":"1-6","source":"Crossref","is-referenced-by-count":22,"title":["Fundamentals of Feature Selection: An Overview and Comparison"],"prefix":"10.1109","author":[{"given":"Amina","family":"Benkessirat","sequence":"first","affiliation":[]},{"given":"Nadjia","family":"Benblidia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"loscalzo","year":"2009","journal-title":"Consensus group based stable feature selection ACM"},{"key":"ref38","author":"das","year":"2001","journal-title":"Filters wrappers and a boosting-based hybrid for feature selection"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-335-6.50031-3"},{"key":"ref32","author":"kittler","year":"1982","journal-title":"Introduction to statistical pattern recognition"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1984.6313294"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1987.4309029"},{"key":"ref37","first-page":"1331","article-title":"Randomized variable elimination","volume":"5","author":"stracuzzi","year":"2004","journal-title":"Journal of Machine Learning Research"},{"key":"ref36","author":"vafaie","year":"1994","journal-title":"Feature Selection Methods Genetic Algorithms Vs Greedy-like Search"},{"key":"ref35","author":"liu","year":"1997","journal-title":"Feature selection and classification-a probabilistic wrapper approach"},{"key":"ref34","author":"domingos","year":"1997","journal-title":"Why does bagging work? a bayesian account and its implications Citeseer"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/KDEX.1997.629862"},{"key":"ref27","article-title":"Correlation-based feature selection of discrete and numeric class machine learning","author":"hall","year":"2000","journal-title":"Department of Computer Science at the University of Waikato"},{"key":"ref29","article-title":"An evaluation of feature selection methods and their application to computer security","author":"doak","year":"1992","journal-title":"Techninal Report CSE-92&#x2013;18 University of California Department of Computer Science"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.09.084"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.6029\/smartcr.2014.03.007"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1006\/jvci.1999.0413"},{"key":"ref22","first-page":"395","article-title":"Feature selection with selective sampling","author":"liu","year":"2002","journal-title":"ICML"},{"key":"ref21","first-page":"129","volume":"2","author":"kira","year":"1992","journal-title":"The Feature Selection Problem Traditional Methods and A New Algorithm"},{"key":"ref24","author":"friedman","year":"2001","journal-title":"The Elements of Statistical Learning"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5725-8_7"},{"key":"ref26","author":"liu","year":"2012","journal-title":"Feature Selection for Knowledge Discovery and Data Mining"},{"key":"ref25","article-title":"Toward optimal feature selection","author":"koller","year":"1996","journal-title":"Stanford Infolab"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001416590138"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.11.042"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.02.016"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2385-6"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2762828"},{"key":"ref52","article-title":"A ranking-based feature selection approach for handwritten character recognition","author":"cilia","year":"2018","journal-title":"Pattern Recognition Letters"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-1997-1302"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-335-6.50023-4"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45571-X_13"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-007-0049-9"},{"key":"ref13","first-page":"1200","article-title":"A review of feature selection methods with applications","author":"jovi\u00e7","year":"2015","journal-title":"International Convention on Information and Communication Technology Electronics and Microelectronics (MIPRO)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/198363"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1977.1674939"},{"key":"ref16","author":"xu","year":"1988","journal-title":"Best first strategy for feature selection"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.1990.118160"},{"key":"ref18","first-page":"547","volume":"91","author":"almuallim","year":"1991","journal-title":"Learning with Many Relevant Features[R]"},{"key":"ref19","first-page":"101","author":"liul","year":"1998","journal-title":"A monotonic measure for optimal feature selection"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00063-5"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-006-0040-8"},{"key":"ref6","first-page":"1157","article-title":"An introduction to variable and feature selection","volume":"3","author":"guyon","year":"2003","journal-title":"Journal of Machine Learning Research"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-013-1368-0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2013.11.024"},{"key":"ref7","author":"han","year":"2011","journal-title":"Data Mining Concepts and Techniques"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2018.12.008"},{"key":"ref9","first-page":"491","article-title":"Toward integrating feature selection algorithms for classification and clustering","author":"liu","year":"2005","journal-title":"IEEE Transactions on Knowledge & Data Engineering"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2017.08.034"},{"key":"ref45","first-page":"1","article-title":"A literature survey on algorithms for multi-label learning","author":"sorower","year":"2010","journal-title":"Oregon State University"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.compmedimag.2016.12.002"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2017.12.048"},{"key":"ref42","author":"karayiannis","year":"2013","journal-title":"Artificial neural networks Learning algorithms performance evaluation and applications"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5121\/ijdkp.2015.5201","article-title":"A review on evaluation metrics for data classification evaluations","volume":"5","author":"hossin","year":"2015","journal-title":"International Journal of Data Mining & Knowledge Management Process"},{"key":"ref44","author":"joshi","year":"2002","journal-title":"On evaluating performance of classifiers for rare classes IEEE"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.12.008"}],"event":{"name":"2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA)","location":"Abu Dhabi, United Arab Emirates","start":{"date-parts":[[2019,11,3]]},"end":{"date-parts":[[2019,11,7]]}},"container-title":["2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9006726\/9035208\/09035281.pdf?arnumber=9035281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:45:59Z","timestamp":1658155559000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9035281\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/aiccsa47632.2019.9035281","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}