{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:16:12Z","timestamp":1775837772278,"version":"3.50.1"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/csnet.2018.8602972","type":"proceedings-article","created":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T01:10:27Z","timestamp":1546996227000},"page":"1-5","source":"Crossref","is-referenced-by-count":18,"title":["Using Genetic Algorithm to Improve Classification of Imbalanced Datasets for Credit Card Fraud Detection"],"prefix":"10.1109","author":[{"given":"Ibtissam","family":"Benchaji","sequence":"first","affiliation":[]},{"given":"Samira","family":"Douzi","sequence":"additional","affiliation":[]},{"given":"Bouabid","family":"ElOuahidi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Representation Learning via Semi-supervised Autoencoder for Multitask Learning. al","author":"zhuang","year":"2015","journal-title":"S l EEE International Conference on Data Mining"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.02.075"},{"key":"ref12","first-page":"125","article-title":"Advanced Phishing Filter Using Autoencoder and Denoising Autoencoder","author":"douzi","year":"0","journal-title":"Proceedings of International Conference on Internet of Things and Big Data"},{"key":"ref13","article-title":"Adaptation In Natural And Artificial Systems","author":"\u00fairsoy","year":"1975","journal-title":"University of Michigan Press"},{"key":"ref14","article-title":"Computer-Aided Gas Pipeline Operation Using Genetic Algorithms And Rule Learning","author":"goldberg","year":"1983","journal-title":"Ann Arbor University of Michigan"},{"key":"ref15","first-page":"1531","article-title":"Intelligent exploration for genetic algorithms: Using self-organizing maps in evolutionary computation","author":"ben amor","year":"2005","journal-title":"Proc 2005 Conf Genetic and Evolutionary Computation"},{"key":"ref16","article-title":"Genetic Algorithms in Search, Optimization and Machine Learning","author":"goldberg","year":"1989","journal-title":"S l Addison-Wesley Longman Publishing Co Inc"},{"key":"ref17","first-page":"14","article-title":"Reducing bias and inefficiency in the selection algorithm","author":"baker","year":"1987","journal-title":"Proc Second Int Conf on Genetic Algorithms and Their Application"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/BF00058655","article-title":"Bagging Predictors","volume":"24","author":"leo","year":"1996","journal-title":"Machine Learning L"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.04.009"},{"key":"ref5","first-page":"148","article-title":"Experiments with a New Boosting Algorithm. Machine Learning","author":"yoav","year":"1996","journal-title":"Proc Thirteenth Int Conf Machine Learning"},{"key":"ref8","first-page":"1263","article-title":"Learning from imbalanced data. Knowledge and Data Engineering","volume":"21","author":"he","year":"2009","journal-title":"S l IEEE Transactions on"},{"key":"ref7","article-title":"Classification with class imbalance problem: A Review","volume":"7","author":"ali","year":"2015","journal-title":"Int J Advance Soft Comput Appl"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-23528-8_13","article-title":"When is undersampling effective in unbalanced classification tasks?","author":"dal pozzolo","year":"2015","journal-title":"Machine Learning and Knowledge Discovery in Databases"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2014.6889638"},{"key":"ref9","first-page":"449","article-title":"RODEO: Robust de-Aliasing autoencoder for Real-Time Medical Image Reconstruction","volume":"63","author":"janki","year":"2017","journal-title":"Pattern Recognit L"}],"event":{"name":"2018 2nd Cyber Security in Networking Conference (CSNet)","location":"Paris","start":{"date-parts":[[2018,10,24]]},"end":{"date-parts":[[2018,10,26]]}},"container-title":["2018 2nd Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8574117\/8602668\/08602972.pdf?arnumber=8602972","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T01:20:28Z","timestamp":1643160028000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8602972\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/csnet.2018.8602972","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}