{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T05:02:27Z","timestamp":1776402147443,"version":"3.51.2"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Project","award":["2018YFB1703404"],"award-info":[{"award-number":["2018YFB1703404"]}]},{"DOI":"10.13039\/501100001809","name":"NSFC Program","doi-asserted-by":"publisher","award":["62076146"],"award-info":[{"award-number":["62076146"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC Program","doi-asserted-by":"publisher","award":["U1801263"],"award-info":[{"award-number":["U1801263"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC Program","doi-asserted-by":"publisher","award":["U20A6003"],"award-info":[{"award-number":["U20A6003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC Program","doi-asserted-by":"publisher","award":["U19A2062"],"award-info":[{"award-number":["U19A2062"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC Program","doi-asserted-by":"publisher","award":["U1911401"],"award-info":[{"award-number":["U1911401"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key-Area Research and Development Program of Guangdong Province","award":["2020B010164001"],"award-info":[{"award-number":["2020B010164001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cybern."],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/tcyb.2021.3126756","type":"journal-article","created":{"date-parts":[[2021,11,24]],"date-time":"2021-11-24T20:32:21Z","timestamp":1637785941000},"page":"2767-2778","source":"Crossref","is-referenced-by-count":13,"title":["Cost-Sensitive Hypergraph Learning With F-Measure Optimization"],"prefix":"10.1109","volume":"53","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4562-3506","authenticated-orcid":false,"given":"Nan","family":"Wang","sequence":"first","affiliation":[{"name":"Beijing National Research Center for Information Science and Technology, Key Laboratory for Information System Security, Ministry of Education, School of Software, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4535-2742","authenticated-orcid":false,"given":"Ruozhou","family":"Liang","sequence":"additional","affiliation":[{"name":"Beijing National Research Center for Information Science and Technology, Key Laboratory for Information System Security, Ministry of Education, School of Software, Tsinghua University, Beijing, China"}]},{"given":"Xibin","family":"Zhao","sequence":"additional","affiliation":[{"name":"Beijing National Research Center for Information Science and Technology, Key Laboratory for Information System Security, Ministry of Education, School of Software, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4971-590X","authenticated-orcid":false,"given":"Yue","family":"Gao","sequence":"additional","affiliation":[{"name":"Beijing National Research Center for Information Science and Technology, Key Laboratory for Information System Security, Ministry of Education, School of Software, Tsinghua University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2877663"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2016.2636370"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2016.2551735"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2872802"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2804940"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2336876"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487647"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2868507"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11761"},{"key":"ref10","first-page":"1915","article-title":"Active learning for cost-sensitive classification","volume-title":"Proc. ICML","volume":"70","author":"Krishnamurthy"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835857"},{"key":"ref12","first-page":"1411","article-title":"Cost-aware pre-training for multiclass cost-sensitive deep learning","volume-title":"Proc. IJCAI","author":"Chung"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2810806"},{"key":"ref14","first-page":"2123","article-title":"Optimizing f-measures by cost-sensitive classification","volume-title":"Proc. NIPS","author":"Parambath"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/eap.2043"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2755595"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2607757"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2013.2246188"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2732482"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2832648"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502540"},{"key":"ref22","first-page":"1404","article-title":"An exact algorithm for F-measure maximization","volume-title":"Proc. NIPS","author":"Dembczynski"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32115-3_52"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3115\/1220575.1220662"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/215206.215366"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2781298"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7503.003.0205"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2307862"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2190083"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2019.2936652"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2020.2963848"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2020.2995709"},{"key":"ref33","first-page":"8","article-title":"The Genia event extraction shared task, 2013 edition\u2014Overview","volume-title":"Proc. BioNLP","author":"Kim"},{"key":"ref34","first-page":"2744","article-title":"Consistent binary classification with generalized performance metrics","volume-title":"Proc. NIPS","author":"Koyejo"},{"key":"ref35","volume-title":"UCI Machine Learning Repository","author":"Dheeru","year":"2017"},{"key":"ref36","volume-title":"The Promise Repository of Empirical Software Engineering Data","author":"Menzies","year":"2015"},{"key":"ref37","first-page":"1725","article-title":"Graph quality judgement: A large margin expedition","volume-title":"Proc. IJCAI","author":"Li"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-016-0194-x"},{"key":"ref39","first-page":"4063","article-title":"Multi-class optimal margin distribution machine","volume-title":"Proc. ICML","volume":"70","author":"Zhang"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/387"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0143"},{"key":"ref42","first-page":"4784","article-title":"Optimizing black-box metrics with adaptive surrogates","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Jiang"}],"container-title":["IEEE Transactions on Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221036\/10106628\/09626567.pdf?arnumber=9626567","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T19:08:40Z","timestamp":1709320120000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9626567\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":42,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tcyb.2021.3126756","relation":{},"ISSN":["2168-2267","2168-2275"],"issn-type":[{"value":"2168-2267","type":"print"},{"value":"2168-2275","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5]]}}}