{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T07:46:47Z","timestamp":1772956007602,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,20]],"date-time":"2021-06-20T00:00:00Z","timestamp":1624147200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,6,20]],"date-time":"2021-06-20T00:00:00Z","timestamp":1624147200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,20]],"date-time":"2021-06-20T00:00:00Z","timestamp":1624147200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,20]]},"DOI":"10.1109\/sera51205.2021.9509270","type":"proceedings-article","created":{"date-parts":[[2021,8,11]],"date-time":"2021-08-11T20:40:41Z","timestamp":1628714441000},"page":"91-96","source":"Crossref","is-referenced-by-count":10,"title":["Analysis of Focussed Under-Sampling Techniques with Machine Learning Classifiers"],"prefix":"10.1109","author":[{"given":"Ankita","family":"Bansal","sequence":"first","affiliation":[]},{"given":"Abha","family":"Jain","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Survey of Fraud Detection Techniques","author":"kou","year":"0","journal-title":"IEEE International Conference on Networking Sensing and Control"},{"key":"ref11","article-title":"Implementation of Novel Approach for Credit Card fraud Detection","author":"agrawal","year":"0","journal-title":"2nd International Conference on Computing for Sustainable Global Development (INDIACom)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2259203"},{"key":"ref13","first-page":"28","article-title":"Data Imbalance: Effects and Solutions for Classification of Large and Highly Imbalanced Data","author":"somasundaram","year":"0","journal-title":"Proceedings of 1st International Conference on Research in Engineering Computers and Technology"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"ref15","article-title":"An Empirical Comparison of Repetitive Undersampling Techniques","author":"hulse","year":"0","journal-title":"Proc of IEEE Int Conf on Information Reuse and Integration"},{"key":"ref16","first-page":"342","volume":"8","author":"aggarwal","year":"2019","journal-title":"International Journal of Innovative Technology and Exploring Engineering (IJITEE)"},{"key":"ref17","first-page":"496","article-title":"A Comparative Analysis Of Classification Algorithms for Predicting The Performance of Students","volume":"8","author":"aggarwal","year":"2019","journal-title":"International International Journal of Recent Technology and Engineering (IJRTE)"},{"key":"ref18","first-page":"111","article-title":"Cross-validatory choice and assessment of statistical predictions","volume":"36","author":"stone","year":"1974","journal-title":"S R A J"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CONFLUENCE.2017.7943121"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-007-0089-7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2017.8285379"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2917953"},{"key":"ref5","first-page":"35","article-title":"An application of classification analysis for skewed class distribution in therapeutic drug monitoring-the case of vancomycin","author":"chen","year":"0","journal-title":"IEEE Workshop on Medical Information Systems (IDEAS-DH&#x2019;04)"},{"key":"ref8","first-page":"1704","article-title":"Total margin based adaptive fuzzy support vector machines for multiview face recognition","volume":"2","author":"liu","year":"0","journal-title":"IEEE International Conference on Systems Man and Cybernetics"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCCE.2018.00123"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/5254.809570"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.egypro.2012.02.078"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007738"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICITECH.2017.8079924"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/GrC.2007.40"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TGE.1977.6498972"},{"key":"ref24","first-page":"463","author":"baeza-yates","year":"1999","journal-title":"Modern Information Retrieval"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1549"},{"key":"ref25","first-page":"179","article-title":"Addressing the curse of imbalanced training sets: one-sided selection","author":"kubat","year":"0","journal-title":"Proceeding of the International Conference on Machine Learning"}],"event":{"name":"2021 IEEE\/ACIS 19th International Conference on Software Engineering Research, Management and Applications (SERA)","location":"Kanazawa, Japan","start":{"date-parts":[[2021,6,20]]},"end":{"date-parts":[[2021,6,22]]}},"container-title":["2021 IEEE\/ACIS 19th International Conference on Software Engineering Research, Management and Applications (SERA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9509253\/9509031\/09509270.pdf?arnumber=9509270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:44:30Z","timestamp":1652197470000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9509270\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,20]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/sera51205.2021.9509270","relation":{},"subject":[],"published":{"date-parts":[[2021,6,20]]}}}