{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:31:22Z","timestamp":1730223082649,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,8]]},"DOI":"10.1109\/fuzzy.2009.5277221","type":"proceedings-article","created":{"date-parts":[[2009,10,6]],"date-time":"2009-10-06T19:04:47Z","timestamp":1254855887000},"page":"2051-2056","source":"Crossref","is-referenced-by-count":0,"title":["Refining classifier from unsampled data"],"prefix":"10.1109","author":[{"given":"Donghai","family":"Guan","sequence":"first","affiliation":[]},{"given":"Yong-koo","family":"Han","sequence":"additional","affiliation":[]},{"given":"Young-koo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Sungyoung","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Chongkug","family":"Park","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"13"},{"key":"11","first-page":"408","article-title":"asymptotic properties of nearest neighbor rules using edited data, systems, man and cybernetics","volume":"2","author":"wilson","year":"1972","journal-title":"IEEE Trans"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/BF00153759"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022604100933"},{"key":"2","first-page":"6","article-title":"intrusion detection by backpropagation neural networks with sample-query and attribute-query","volume":"3","author":"ray-i","year":"2007","journal-title":"International Journal of Computational Intelligence Research"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCSCT.2008.132"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/IGARSS.1996.516669"},{"key":"7","first-page":"181","article-title":"discovering informative patterns and data cleaning, advances in knowledge discovery and data mining","author":"guyon","year":"1996","journal-title":"American Association for Artificial Intelligence"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1080\/088395100117124"},{"journal-title":"C4 5 Programs for Machine Learning","year":"1993","author":"quinlan","key":"4"},{"key":"9","first-page":"799","article-title":"identifying and eliminating mislabeled training instances","volume":"1","author":"brodley","year":"1996","journal-title":"AAAI\/IAAI"},{"key":"8","first-page":"143","article-title":"experiments with noise filtering in a medical domain","author":"gamberger","year":"1999","journal-title":"Proceedings of the Sixteenth International Conference on Machine Learning"}],"event":{"name":"2009 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","start":{"date-parts":[[2009,8,20]]},"location":"Jeju Island, South Korea","end":{"date-parts":[[2009,8,24]]}},"container-title":["2009 IEEE International Conference on Fuzzy Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5247842\/5276875\/05277221.pdf?arnumber=5277221","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T23:04:32Z","timestamp":1489878272000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5277221\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/fuzzy.2009.5277221","relation":{},"subject":[],"published":{"date-parts":[[2009,8]]}}}