{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:51:50Z","timestamp":1776113510440,"version":"3.50.1"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2021ZD0112400"],"award-info":[{"award-number":["2021ZD0112400"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62206041"],"award-info":[{"award-number":["62206041"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013314","name":"Higher Education Discipline Innovation Project","doi-asserted-by":"publisher","award":["D23006"],"award-info":[{"award-number":["D23006"]}],"id":[{"id":"10.13039\/501100013314","id-type":"DOI","asserted-by":"publisher"}]},{"name":"China University Industry-University-Research Innovation Fund","award":["2022IT174"],"award-info":[{"award-number":["2022IT174"]}]},{"name":"Open Fund of National Engineering Laboratory for Big Data System Computing Technology","award":["SZU-BDSC-OF2024-09"],"award-info":[{"award-number":["SZU-BDSC-OF2024-09"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Comput. Intell. Mag."],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1109\/mci.2026.3657694","type":"journal-article","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T19:44:33Z","timestamp":1775763873000},"page":"55-67","source":"Crossref","is-referenced-by-count":0,"title":["EvoSampling: A Granular Ball-Based Evolutionary Hybrid Sampling With Knowledge Transfer for Imbalanced Learning [Research Frontier]"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8259-2614","authenticated-orcid":false,"given":"Wenbin","family":"Pei","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Dalian University of Technology, Dalian, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9475-1759","authenticated-orcid":false,"given":"Ruohao","family":"Dai","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Dalian University of Technology, Dalian, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4865-8026","authenticated-orcid":false,"given":"Bing","family":"Xue","sequence":"additional","affiliation":[{"name":"School of Engineering and Computer Science, Victoria University of Wellington, Wellington, New Zealand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4463-9538","authenticated-orcid":false,"given":"Mengjie","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Engineering and Computer Science, Victoria University of Wellington, Wellington, New Zealand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3776-9799","authenticated-orcid":false,"given":"Qiang","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Dalian University of Technology, Dalian, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7629-4648","authenticated-orcid":false,"given":"Yiu-Ming","family":"Cheung","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Hong Kong Baptist University, Hong Kong SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5993-9563","authenticated-orcid":false,"given":"Shuyin","family":"Xia","sequence":"additional","affiliation":[{"name":"Chongqing Key Laboratory of Computational Intelligence, Key Laboratory of Big Data Intelligent Computing, Key Laboratory of Cyberspace Big Data Intelligent Security, Ministry of Education, Chongqing University of Posts and Telecommunications, Chongqing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2008.239"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13682"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3718734"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2024.3384961"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2019.2944962"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/tevc.2023.3257230"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-025-01119-4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/tsmcb.2008.2007853"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2019.2913859"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/11538059_91"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn.2008.4633969"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.108992"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/icctct.2018.8551020"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31753-3_2"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-022-10186-5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007735"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.05.008"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4236\/jilsa.2015.74010"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1201\/b12207"},{"key":"ref21","first-page":"229","article-title":"A field guide to genetic programming","volume":"10","author":"Poli","year":"2009","journal-title":"Genet. Program. Evolvable Mach."},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2021.3070203"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/tevc.2022.3199783"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2020.3008694"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-016-9395-7"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/tcyb.2022.3196887"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/tevc.2019.2962747"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/tevc.2015.2458037"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/tevc.2019.2906927"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2022.3203381"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2024.3400281"},{"issue":"1","key":"ref32","first-page":"1","article-title":"KNN approach to unbalanced data distributions: A case study involving information extraction","volume-title":"Proc. Workshop Learn. From Imbalanced Datasets","volume":"126","author":"Mani","year":"2003"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.03.011"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108295"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.07.024"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/tnn.2010.2066988"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.compmedimag.2016.07.011"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01307-2_43"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/iccv.2019.00178"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539454"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2025.3608246"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2020.2985965"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.120891"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/tevc.2024.3515485"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-56852-7_5"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1162\/evco_a_00304"},{"issue":"1","key":"ref47","first-page":"2171","article-title":"DEAP: Evolutionary algorithms made easy","volume":"13","author":"Fortin","year":"2012","journal-title":"J. Mach. Learn. Res."},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.5555\/3122009.3122026"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/s1874-1029(13)60052-x"},{"key":"ref51","first-page":"3149","article-title":"LightGBM: A highly efficient gradient boosting decision tree","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Ke","year":"2017"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1023\/a:1010933404324"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"}],"container-title":["IEEE Computational Intelligence Magazine"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10207\/11478563\/11478587.pdf?arnumber=11478587","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:35:37Z","timestamp":1776108937000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11478587\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":54,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/mci.2026.3657694","relation":{},"ISSN":["1556-603X","1556-6048"],"issn-type":[{"value":"1556-603X","type":"print"},{"value":"1556-6048","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,5]]}}}