{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:25:07Z","timestamp":1772555107771,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/icca.2011.6138076","type":"proceedings-article","created":{"date-parts":[[2012,1,31]],"date-time":"2012-01-31T16:49:16Z","timestamp":1328028556000},"page":"750-754","source":"Crossref","is-referenced-by-count":6,"title":["Exploring the stability of feature selection for imbalanced intrusion detection data"],"prefix":"10.1109","author":[{"given":"Fang","family":"Li","sequence":"first","affiliation":[]},{"given":"Hong","family":"Mi","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012487302797"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557084"},{"key":"12","year":"0","journal-title":"KDD Cup 99 Network Intrusion Dataset"},{"key":"3","first-page":"147","article-title":"Effects of several evaluation metrics on imbalanced data learning","volume":"38","author":"lin","year":"2010","journal-title":"Journal of South China University of Technology (Natural Science)"},{"key":"2","first-page":"1","article-title":"Posterior-probability-based feature selection algorithm for imbalanced datasets","volume":"34","author":"cao","year":"2008","journal-title":"Eng Comput"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007741"},{"key":"10","doi-asserted-by":"crossref","first-page":"956","DOI":"10.1007\/978-3-540-89689-0_99","article-title":"Evaluating the stability of feature selectors that optimize feature subset cardinality","author":"somol","year":"2008","journal-title":"Proc Joint IAPR Int'l Workshop Structural Syntactic and Statistical Pattern Recognition"},{"key":"7","first-page":"421","article-title":"A stability index for feature selection","author":"kuncheva","year":"2007","journal-title":"Proc 25th IASTED Int'l Multi-Conf Artificial Intelligence and Applications"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.135"},{"key":"5","article-title":"Solutions to instability problems with sequential wrapper-based approaches to feature selection","author":"dunne","year":"2002","journal-title":"Technical Report TCD-CD-2002-28"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.34"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-006-0040-8"},{"key":"8","first-page":"929","article-title":"Improving stability of feature selection methods","author":"ki?z?ek","year":"2007","journal-title":"Proc 12th Int'l Conf Computer Analysis of Images and Patterns"}],"event":{"name":"2011 9th IEEE International Conference on Control and Automation (ICCA)","location":"Santiago, Chile","start":{"date-parts":[[2011,12,19]]},"end":{"date-parts":[[2011,12,21]]}},"container-title":["2011 9th IEEE International Conference on Control and Automation (ICCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6126159\/6137867\/06138076.pdf?arnumber=6138076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T09:37:13Z","timestamp":1497951433000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6138076\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icca.2011.6138076","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}