{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:58:12Z","timestamp":1730267892587,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/indin.2018.8471934","type":"proceedings-article","created":{"date-parts":[[2018,10,9]],"date-time":"2018-10-09T02:00:15Z","timestamp":1539050415000},"page":"701-706","source":"Crossref","is-referenced-by-count":3,"title":["A Cloud-Based Training And Evaluation System For Facial Paralysis Rehabilitation"],"prefix":"10.1109","author":[{"given":"Zeqing","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Wenbin","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Wenjin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CBMS.2012.6266389"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2015.2495179"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/RIVF.2015.7049882"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2017.26"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2014.7004298"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1109\/TSMCB.2007.914695","article-title":"Adaboost-based algorithm for network intrusion detection","volume":"38","author":"hu","year":"2008","journal-title":"IEEE Transactions on Systems Man and Cybernetics Part B (Cybernetics)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.241"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2009.2017508"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2012.2186519"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2016.7587650"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNSRE.2013.2279169"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.51"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2754507"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2016.7459636"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICMIRA.2013.126"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7293299"}],"event":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","start":{"date-parts":[[2018,7,18]]},"location":"Porto","end":{"date-parts":[[2018,7,20]]}},"container-title":["2018 IEEE 16th International Conference on Industrial Informatics (INDIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8453042\/8471919\/08471934.pdf?arnumber=8471934","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,23]],"date-time":"2021-12-23T18:26:53Z","timestamp":1640284013000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8471934\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/indin.2018.8471934","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}