{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:11:29Z","timestamp":1730207489355,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/cisda.2012.6291531","type":"proceedings-article","created":{"date-parts":[[2012,9,7]],"date-time":"2012-09-07T19:58:22Z","timestamp":1347047902000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Identity verification based on haptic handwritten signatures: Genetic programming with unbalanced data"],"prefix":"10.1109","author":[{"given":"Fawaz A.","family":"Alsulaiman","sequence":"first","affiliation":[]},{"given":"Julio J.","family":"Valdes","sequence":"additional","affiliation":[]},{"given":"Abdulmotaleb","family":"El Saddik","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Genetic Programming III Darwinian Invention and Problem Solving","year":"1999","author":"koza","key":"19"},{"journal-title":"Genetic Programming On the Programming of Computers by Means of Natural Selection","year":"1992","author":"koza","key":"17"},{"journal-title":"Genetic Programming II Automatic Discovery of Reusable Programs","year":"1994","author":"koza","key":"18"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/1274000.1274070"},{"journal-title":"Multiobjective Optimization Using Evolutionary Algorithms","year":"2001","author":"deb","key":"15"},{"journal-title":"Ecj A Java-based Evolution Computing Research System","year":"2007","author":"luke","key":"34"},{"key":"16","first-page":"768","article-title":"Hierarchical genetic algorithms operating on populations of computer programs","author":"john","year":"0","journal-title":"Proc of the 11th International Joint Conference on Artificial Intelligence 1989"},{"journal-title":"Reachin Display","year":"0","author":"ab","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/6.819926"},{"key":"11","first-page":"71","article-title":"Relevant feature selection and generation in high dimensional hapticbased biometric data","author":"sakr","year":"0","journal-title":"Proc of International Conference on Data Mining (DMIN) July 2009"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356540"},{"journal-title":"Gene Expression Programming Mathematical Modeling by an Artificial Intelligence","year":"2006","author":"ferreira","key":"21"},{"key":"20","first-page":"87","article-title":"Gene expression programming: A new adaptive algorithm for problem solving","volume":"13","author":"ferreira","year":"2001","journal-title":"Journal of Complex Systems"},{"key":"22","first-page":"179","article-title":"Addressing the curse of imbalanced training set: One sided selection","author":"kubat","year":"0","journal-title":"Proc of the 14th International Conference on Machine Learning Nov 2004"},{"key":"23","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1109\/TSMC.1976.4309452","article-title":"Two modifications of cnn","volume":"6","author":"tomek","year":"1976","journal-title":"IEEE Transactions on Systems Man and Communications"},{"key":"24","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.953","article-title":"Smote: Synthetic minority over-sampling technique","volume":"16","author":"chawla","year":"2002","journal-title":"Journal of Artificial Intelligence Research"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-335-6.50034-9"},{"key":"26","doi-asserted-by":"crossref","first-page":"429","DOI":"10.3233\/IDA-2002-6504","article-title":"The class imbalance problem: A systematic study","volume":"6","author":"japkowics","year":"2002","journal-title":"Intelligent Data Analysis"},{"key":"27","first-page":"935","article-title":"Experimental perspectives on learning from imbalanced data","author":"hulse","year":"0","journal-title":"Proc of the 24th International Conference on Machine Learning 2007"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2009.4983294"},{"key":"29","first-page":"266","article-title":"Gp classification under imbalanced data sets: Active sub-sampling and auc approximation","author":"doucette","year":"0","journal-title":"Proc of the European Conference on Genetic Programming 2008"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2010.5584258"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2006.887174"},{"key":"10","article-title":"Haptic-based sensible graphical password","author":"orozco","year":"0","journal-title":"Proceedings of Virtual Concept 2006"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/HAPTIC.2010.5444614"},{"key":"30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-12148-7_1","article-title":"Genetic programming for classification with unbalanced data","volume":"6021","author":"bhowan","year":"2010","journal-title":"Lecture Notes in Computer Science Genetic Programming"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2008.4751298"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/HAVE.2007.4371596"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76928-6_90"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/VR.2006.69"},{"key":"31","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/978-3-642-17432-2_25","article-title":"A comparison of classification strategies in genetic programming with unbalanced data","volume":"6464","author":"bhowan","year":"2011","journal-title":"Lecture Notes in Computer Science AI 2010 Advances in Artificial Intelligence"},{"key":"4","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/s11042-007-0169-9","article-title":"Experiments in haptic-based authentication of humans","volume":"37","author":"orozco","year":"2008","journal-title":"Journal of Multimedia Tools and Applications"},{"key":"9","first-page":"179","article-title":"Novel shoulder-surfing resistant haptic-based graphical password","author":"malek","year":"0","journal-title":"Proc of Eurohaptics Conference 2006"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/HAPTICS.2008.4479992"}],"event":{"name":"2012 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)","start":{"date-parts":[[2012,7,11]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2012,7,13]]}},"container-title":["2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6279634\/6291498\/06291531.pdf?arnumber=6291531","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,12]],"date-time":"2022-02-12T01:07:11Z","timestamp":1644628031000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6291531\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/cisda.2012.6291531","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}