{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T05:48:03Z","timestamp":1749793683016,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T00:00:00Z","timestamp":1666137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T00:00:00Z","timestamp":1666137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,19]]},"DOI":"10.1109\/kse56063.2022.9953798","type":"proceedings-article","created":{"date-parts":[[2022,11,21]],"date-time":"2022-11-21T16:25:53Z","timestamp":1669047953000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["A multi-population coevolutionary approach for Software defect prediction with imbalanced data"],"prefix":"10.1109","author":[{"given":"Lam Thu","family":"Bui","sequence":"first","affiliation":[{"name":"Academy of Cryptography Techniques,Viet Nam"}]},{"given":"Van Truong","family":"Vu","sequence":"additional","affiliation":[{"name":"Le Quy Don Technical University,Viet Nam"}]},{"given":"Bich Van","family":"Pham","sequence":"additional","affiliation":[{"name":"Le Quy Don Technical University,Viet Nam"}]},{"given":"Viet Anh","family":"Phan","sequence":"additional","affiliation":[{"name":"Le Quy Don Technical University,Viet Nam"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2014.64"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.454"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2015.02.006"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.12.056"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2322358"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/2.962984"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2259203"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9400-x"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1972.4309137"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.09.001"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICISIM.2017.8122151"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2755-7_10"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.9734\/BJMCS\/2016\/26337"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2016.05.038"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2016.25"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.07.006"},{"journal-title":"Elements of Software Science (Operating and Programming Systems Series)","year":"1977","author":"halstead","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IranianCIS.2014.6802598"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"ref20","first-page":"448","article-title":"An Experiment with the Edited Nearest-Neighbor Rule","volume":"6","author":"ivan","year":"1976","journal-title":"IEEE Transactions on Systems Man and Cybernetics"},{"key":"ref22","first-page":"664","author":"witten","year":"2011","journal-title":"Data Mining Practical Machine Learning Tools and Techniques"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.11.008"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(96)00142-2"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-58484-6_269"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/sam.10061"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2029559"}],"event":{"name":"2022 14th International Conference on Knowledge and Systems Engineering (KSE)","start":{"date-parts":[[2022,10,19]]},"location":"Nha Trang, Vietnam","end":{"date-parts":[[2022,10,21]]}},"container-title":["2022 14th International Conference on Knowledge and Systems Engineering (KSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9953734\/9953612\/09953798.pdf?arnumber=9953798","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T13:46:49Z","timestamp":1671025609000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9953798\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,19]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/kse56063.2022.9953798","relation":{},"subject":[],"published":{"date-parts":[[2022,10,19]]}}}