{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T21:10:17Z","timestamp":1762377017904,"version":"3.37.3"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T00:00:00Z","timestamp":1634083200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T00:00:00Z","timestamp":1634083200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000836","name":"University of Liverpool","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000836","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,13]]},"DOI":"10.1109\/cibcb49929.2021.9562959","type":"proceedings-article","created":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T04:00:25Z","timestamp":1634702425000},"page":"1-10","source":"Crossref","is-referenced-by-count":4,"title":["Predicting Influenza A Viral Host Using PSSM and Word Embeddings"],"prefix":"10.1109","author":[{"given":"Yanhua","family":"Xu","sequence":"first","affiliation":[{"name":"University of Liverpool,Department of Computer Science,Liverpool,UK"}]},{"given":"Dominik","family":"Wojtczak","sequence":"additional","affiliation":[{"name":"University of Liverpool,Department of Computer Science,Liverpool,UK"}]}],"member":"263","reference":[{"key":"ref39","first-page":"278","article-title":"Random decision forests","author":"ho","year":"0","journal-title":"Proceedings of 3rd International Conference on Document Analysis and Recognition"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1093\/protein\/gzg044"},{"journal-title":"Nlm nih gov","article-title":"Index of \/blast\/executables","year":"0","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/S0968-0004(98)01298-5"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/25.17.3389"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2008.4761297"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.biochi.2013.09.013"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.biochi.2010.06.013"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1089\/omi.2015.0095","article-title":"Harnessing computational biology for exact linear B-cell Epitope prediction: A novel amino acid composition-based feature descriptor","volume":"19","author":"vijayakumar","year":"2015","journal-title":"Omics"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0904991106"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/B978-0-12-396535-6.00004-1","article-title":"Machine learning and event-based software testing: Classifiers for identifying infeasible GUI event sequences","author":"gove","year":"2012","journal-title":"Advances in Computers"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3201\/eid1201.051254"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1126\/science.1176225"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1038\/nature08182"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1038\/s41579-018-0115-z"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1128\/jvi.64.4.1487-1497.1990"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1128\/mr.56.1.152-179.1992"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S0531-5131(01)00666-5"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.chom.2010.05.009"},{"key":"ref19","article-title":"Classification of host origin in influenza A virus by transferring protein sequences into numerical feature vectors","volume":"11","author":"sherif","year":"2017","journal-title":"Int J Biol Biomed Eng"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1093\/aje\/kwy191"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-5347(02)02502-8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1111\/j.1750-2659.2009.00096.x"},{"journal-title":"Gisaid org","article-title":"GIS AID-Initiative","year":"0","key":"ref27"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1353\/bhm.2002.0022"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1086\/511989"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1351\/pac197231040639"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/nature04230"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/nature04824"},{"key":"ref2","first-page":"415","article-title":"The structural variability of the influenza A hemagglutinin receptor-binding site","volume":"17","author":"lazniewski","year":"2018","journal-title":"Brief Funct Genomics"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1038\/nature13016"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-6736(99)01241-6"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.rvsc.2011.06.009"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1186\/1755-8794-7-S3-S1"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.3201\/eid2512.190636"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1186\/s12864-016-3250-9"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s00705-013-1771-y"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CIBCB.2010.5510726"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1111\/j.1865-1682.2011.01219.x"},{"journal-title":"Efficient Estimation of Word Representations in Vector Space","year":"2013","author":"mikolov","key":"ref24"},{"key":"ref41","first-page":"2079","article-title":"On Overfitting in Model Selection and Subsequent Selection Bias in Performance Evaluation","volume":"11","author":"cawley","year":"2010","journal-title":"Journal of Machine Learning Research"},{"journal-title":"In-tegrated use of three machine learning techniques for influenza virus classification","year":"2010","author":"attaluri","key":"ref23"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmi.2017.10.026"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1089\/hs.2019.0055"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0032858"},{"key":"ref25","article-title":"VID-HOP, viral host prediction with Deep Learning","author":"mock","year":"2020","journal-title":"Bioinformatics"}],"event":{"name":"2021 IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology (CIBCB)","start":{"date-parts":[[2021,10,13]]},"location":"Melbourne, Australia","end":{"date-parts":[[2021,10,15]]}},"container-title":["2021 IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology (CIBCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9562742\/9562772\/09562959.pdf?arnumber=9562959","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T00:14:24Z","timestamp":1659485664000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9562959\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,13]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/cibcb49929.2021.9562959","relation":{},"subject":[],"published":{"date-parts":[[2021,10,13]]}}}