{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:08:53Z","timestamp":1729649333019,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/ic3.2015.7346648","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T22:17:05Z","timestamp":1449613025000},"page":"30-35","source":"Crossref","is-referenced-by-count":6,"title":["Online anomaly detection via class-imbalance learning"],"prefix":"10.1109","author":[{"family":"Chandresh Kumar Maurya","sequence":"first","affiliation":[]},{"given":"Durga","family":"Toshniwal","sequence":"additional","affiliation":[]},{"family":"Gopalan Vijendran Venkoparao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"551","article-title":"Online passive-aggressive algorithms","volume":"7","author":"crammer","year":"2006","journal-title":"J Mach Learn Res"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2010.5596702"},{"key":"ref12","first-page":"973","article-title":"The foundations of cost-sensitive learning","volume":"2","author":"elkan","year":"2001","journal-title":"Proceedings of the 17th International Joint Conference on Artificial Intelligence -"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.131"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.158"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2011.2129498"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1142\/S1469026813400014"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.157"},{"key":"ref18","first-page":"179","article-title":"Addressing the curse of imbalanced training sets: One-sided selection","author":"kubat","year":"1997","journal-title":"Proceedings of the Fourteenth International Conference on Machine Learning"},{"key":"ref19","first-page":"928","article-title":"Online convex programming and generalized infinitesimal gradient ascent","author":"zinkevich","year":"2003","journal-title":"Machine Learning Proceedings of the Twentieth International Conference (ICML 2003)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.52"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1613\/jair.3623","article-title":"Toward supervised anomaly detection","volume":"46","author":"goernitz","year":"2013","journal-title":"J Artif Intell Res (JAIR)"},{"key":"ref6","first-page":"321","article-title":"Smote: Synthetic minority over-sampling technique","volume":"16","author":"chawla","year":"2002","journal-title":"J Artif Int Res"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2623330"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1037\/h0042519","article-title":"Neurocomputing: Foundations of research","volume":"65","author":"rosenblatt","year":"1958","journal-title":"Psychological Review"},{"key":"ref7","first-page":"107","article-title":"Smote-boost: Improving prediction of the minority class in boosting","volume":"2838","author":"chawla","year":"2003","journal-title":"PKDD"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref9","article-title":"Online learning with kernels","volume":"100","author":"kivinen","year":"2010","journal-title":"IEEE Transactions on Signal Processing"},{"key":"ref20","first-page":"379","article-title":"The perceptron algorithm with uneven margins","author":"li","year":"2002","journal-title":"Proceedings of the Nineteenth International Conference on Machine Learning"}],"event":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","start":{"date-parts":[[2015,8,20]]},"location":"Noida, India","end":{"date-parts":[[2015,8,22]]}},"container-title":["2015 Eighth International Conference on Contemporary Computing (IC3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7337021\/7346637\/07346648.pdf?arnumber=7346648","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:17:15Z","timestamp":1602685035000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7346648"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/ic3.2015.7346648","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}