{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:35:41Z","timestamp":1729654541417,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/bigdata.2017.8258130","type":"proceedings-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T22:47:28Z","timestamp":1516056448000},"page":"1860-1965","source":"Crossref","is-referenced-by-count":0,"title":["Noise self-filtering K-nearest neighbors algorithms"],"prefix":"10.1109","author":[{"given":"Shuyin","family":"Xia","sequence":"first","affiliation":[]},{"given":"Guoyin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yunsheng","family":"Liur","sequence":"additional","affiliation":[]},{"given":"Qun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Five balltree construction algorithms","year":"1989","author":"omohundro","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02962-2_81"},{"key":"ref33","article-title":"Teaching classification boundaries to humans","author":"basu","year":"2013","journal-title":"AAAI'09 Proceedings of Association for the Advancement of Artificial Intelligence"},{"key":"ref32","first-page":"638","article-title":"Shifting weights: Adapting object detectors from image to video","author":"tang","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654918"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.50"},{"key":"ref37","first-page":"2078","article-title":"Self-paced learning with diversity","author":"jiang","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref36","first-page":"1189","article-title":"Self-paced learning for latent variable models","author":"kumar","year":"2010","journal-title":"Advances in neural information processing systems"},{"key":"ref35","article-title":"Are all training examples equally valuable?","author":"lapedriza","year":"2013","journal-title":"Computer Science"},{"key":"ref34","first-page":"1","article-title":"Baby steps: How &#x201C;less is more&#x201D; in unsupervised dependency parsing","author":"spitkovsky","year":"2009","journal-title":"NIPS Grammar Induction Representation of Language and Language Learning"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28651-6_28"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2500224"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2001.937551"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1109\/ICASSP.1984.1172352","article-title":"Fast search algorithms for vector quantization and pattern matching","author":"cheng","year":"1984","journal-title":"Acoustics Speech and Signal Processing IEEE International Conference on ICA SSP"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2010.01.003"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1132","DOI":"10.1109\/TCOM.1985.1096214","article-title":"An improvement of the minimum distortion encoding algorithm for vector quantization","volume":"33","author":"bei","year":"1985","journal-title":"IEEE Transactions on Communications"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/26.545888"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/34.615448"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.09.028"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5121\/ijdms.2013.5108"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2012.35"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1126\/science.1127242"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553380"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2456899"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1975.224297"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/BF01759061"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1126\/science.1127242"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/355744.355745"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8655(96)00032-3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1986.4767859"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1201\/9781420089653","author":"wu","year":"2009","journal-title":"The Top Ten Algorithms in Data Mining"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/34.955110"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2321376"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1109\/TKDE.2012.251","article-title":"Building confidential and efficient query services in the cloud with rasp data perturbation","volume":"26","author":"xu","year":"2014","journal-title":"IEEE Transactions on Knowledge & Data Engineering"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2520473"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498388"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-004-0751-8"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/69.991726"},{"journal-title":"Very Deep Convolutional Networks for Large-scale Image Recognition","year":"2014","author":"simonyan","key":"ref41"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(94)00094-8"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2015.2402236"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2013.2292894"}],"event":{"name":"2017 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2017,12,11]]},"location":"Boston, MA","end":{"date-parts":[[2017,12,14]]}},"container-title":["2017 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8241556\/8257893\/08258130.pdf?arnumber=8258130","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T11:06:36Z","timestamp":1570619196000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8258130\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2017.8258130","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}