{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T05:08:17Z","timestamp":1745989697961,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:00:00Z","timestamp":1603065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:00:00Z","timestamp":1603065600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:00:00Z","timestamp":1603065600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,19]]},"DOI":"10.1109\/idsta50958.2020.9264114","type":"proceedings-article","created":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T16:50:41Z","timestamp":1606755041000},"page":"11-20","source":"Crossref","is-referenced-by-count":3,"title":["A Machine Learning based Approach to Reduce Behavioral Noise Problem in an Imbalanced Data: Application to a fraud detection"],"prefix":"10.1109","author":[{"given":"Salma El","family":"Hajjami","sequence":"first","affiliation":[]},{"given":"Jamal","family":"Malki","sequence":"additional","affiliation":[]},{"given":"Alain","family":"Bouju","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Berrada","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/UBMK.2017.8093417"},{"year":"2019","author":"jonnalagadda","journal-title":"Credit card fraud detection using random forest algorithm","key":"ref32"},{"key":"ref31","article-title":"Machine learning for anomaly detection. performance study considering anomaly distribution in an imbalanced dataset","author":"salma","year":"0","journal-title":"2020 5th International Conference on Cloud Computing and Artificial Intelligence Technologies and Applications (Cloudtech'20)"},{"year":"2013","author":"inc","journal-title":"Credit card fraud detection Anonymized credit card transactions labeled as fraudulent or genuine","key":"ref30"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1007\/978-3-030-38501-9_29"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1023\/A:1010933404324"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/978-3-540-24694-7_32"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1142\/S0218001409007326"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ACCESS.2019.2915611"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1007\/978-981-15-0758-8_20"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1016\/j.ins.2017.05.008"},{"key":"ref15","first-page":"3","article-title":"Cluster based under-sampling for unbalanced cardiovascular data","volume":"3","author":"rahman","year":"0","journal-title":"Proceedings of the World Congress on Engineering"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ICMLC48188.2019.8949290"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1016\/j.ins.2018.06.056"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1016\/j.patcog.2007.04.009"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/978-3-642-37456-2_24"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1007\/s10462-004-0751-8"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.3233\/IDA-2002-6504"},{"key":"ref27","first-page":"179","article-title":"Addressing the curse of imbalanced training sets: one-sided selection","volume":"97","author":"kubat","year":"1997","journal-title":"ICML"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/978-3-319-98074-4"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/SSCI.2015.33"},{"year":"1997","author":"alsabti","journal-title":"An efficient K-means clustering algorithm","key":"ref29"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/1007730.1007733"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1016\/j.ins.2010.12.016"},{"key":"ref7","first-page":"973","article-title":"The foundations of cost-sensitive learning","author":"elkan","year":"0","journal-title":"International Joint Conference on Artificial Intelligence"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/s13748-016-0094-0"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1016\/j.ins.2013.07.007"},{"key":"ref1","first-page":"176","article-title":"Classification with class imbalance problem: a review","volume":"7","author":"ali","year":"2015","journal-title":"Int J Advance Soft Comput Appl"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/TNNLS.2013.2246188"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/TIT.1968.1054155"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1016\/j.patcog.2013.05.006"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/TSMC.1972.4309137"},{"key":"ref23","first-page":"679","article-title":"Two modifications of cnn","volume":"7","author":"tomek","year":"1976","journal-title":"IEEE Transactions on Systems Man and Cybernetics"},{"key":"ref26","article-title":"An experiment with the edited nearest-neighbor rule","author":"tomek","year":"1976","journal-title":"IEEE Transactions on Systems Man and Cybernetics"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1007\/3-540-48229-6_9"}],"event":{"name":"2020 International Conference on Intelligent Data Science Technologies and Applications (IDSTA)","start":{"date-parts":[[2020,10,19]]},"location":"Valencia, Spain","end":{"date-parts":[[2020,10,22]]}},"container-title":["2020 International Conference on Intelligent Data Science Technologies and Applications (IDSTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9263698\/9264028\/09264114.pdf?arnumber=9264114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T20:15:21Z","timestamp":1656360921000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9264114\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,19]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/idsta50958.2020.9264114","relation":{},"subject":[],"published":{"date-parts":[[2020,10,19]]}}}