{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T00:11:48Z","timestamp":1755216708969,"version":"3.43.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/spac46244.2018.8965553","type":"proceedings-article","created":{"date-parts":[[2020,1,23]],"date-time":"2020-01-23T21:51:08Z","timestamp":1579816268000},"page":"91-96","source":"Crossref","is-referenced-by-count":3,"title":["Comparison of Different Classification Methods for Breast Cancer Subtypes Prediction"],"prefix":"10.1109","author":[{"given":"Jing","family":"Xu","sequence":"first","affiliation":[{"name":"University of Jinan Shandong Provincial Key Laboratory of Network Based Intelligent, Computing,School of Information Science and Engineering,Jinan,China"}]},{"given":"Peng","family":"Wu","sequence":"additional","affiliation":[{"name":"University of Jinan Shandong Provincial Key Laboratory of Network Based Intelligent, Computing,School of Information Science and Engineering,Jinan,China"}]},{"given":"Yuehui","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Jinan Shandong Provincial Key Laboratory of Network Based Intelligent, Computing,School of Information Science and Engineering,Jinan,China"}]},{"given":"Li","family":"Zhang","sequence":"additional","affiliation":[{"name":"Affiliated Hospital of Qingdao University,Qingdao,China"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1186\/bcr3493"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1177\/117693510600200030"},{"key":"ref12","first-page":"230","article-title":"Development of Novel Breast Cancer Recurrence Prediction Model Using Support Vector Machine","volume":"2","author":"woojae","year":"2012","journal-title":"Breast Cancer"},{"journal-title":"using three machine learning techniques for predicting breast cancer [J]","year":"2013","author":"ahmad","key":"ref13"},{"key":"ref14","first-page":"61","article-title":"Comprehensive molecular portraits of human breast tumors","year":"2012","journal-title":"Nature"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1515\/jib-2014-236"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1186\/s13058-015-0520-4"},{"key":"ref17","first-page":"409","article-title":"The Nature Of Statistical Learning Theory","volume":"4","author":"cherkassky","year":"1997","journal-title":"Technometrics"},{"journal-title":"Neural Networks for Pattern Recognition","year":"1995","author":"bishop","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/497"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1158\/0008-5472.CAN-10-1039"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/nrc2212"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/bcr2635"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1018854108"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1186\/s12859-017-1959-3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btu128"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.01.009"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3322\/caac.20107"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1504\/IJDMB.2017.084268"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.01.025"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/asjc.1419"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2018.2868341"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2008.01.006"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2017.05.027"}],"event":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","start":{"date-parts":[[2018,12,14]]},"location":"Jinan, China","end":{"date-parts":[[2018,12,17]]}},"container-title":["2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8959268\/8965430\/08965553.pdf?arnumber=8965553","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T18:43:49Z","timestamp":1754333029000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8965553\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/spac46244.2018.8965553","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}