{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T17:11:30Z","timestamp":1770743490369,"version":"3.49.0"},"reference-count":73,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2021YFB3301200"],"award-info":[{"award-number":["2021YFB3301200"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62073069"],"award-info":[{"award-number":["62073069"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62203093"],"award-info":[{"award-number":["62203093"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018617","name":"Liaoning Revitalization Talents Program","doi-asserted-by":"publisher","award":["XLYC2002041"],"award-info":[{"award-number":["XLYC2002041"]}],"id":[{"id":"10.13039\/501100018617","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Syst. Man Cybern, Syst."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1109\/tsmc.2023.3335241","type":"journal-article","created":{"date-parts":[[2023,12,27]],"date-time":"2023-12-27T19:36:01Z","timestamp":1703705761000},"page":"2079-2091","source":"Crossref","is-referenced-by-count":28,"title":["BO-SMOTE: A Novel Bayesian-Optimization-Based Synthetic Minority Oversampling Technique"],"prefix":"10.1109","volume":"54","author":[{"given":"Shen","family":"Yan","sequence":"first","affiliation":[{"name":"State Key Laboratory of Synthetical Automation for Process Industries and the College of Information Science and Engineering, Northeastern University, Shenyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5858-4489","authenticated-orcid":false,"given":"Ziyan","family":"Zhao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Synthetical Automation for Process Industries and the College of Information Science and Engineering, Northeastern University, Shenyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3404-9297","authenticated-orcid":false,"given":"Shixin","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Synthetical Automation for Process Industries and the College of Information Science and Engineering, Northeastern University, Shenyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5408-8752","authenticated-orcid":false,"given":"Mengchu","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Information and Electronic Engineering, Zhejiang Gongshang University, Hangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2019.1911447"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s13748-016-0094-0"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1016\/j.eswa.2016.12.035","article-title":"Learning from class-imbalanced data: Review of methods and applications","volume":"73","author":"Guo","year":"2017","journal-title":"Expert Syst. Appl."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106116"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2013.12.003"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.232"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2324567"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.10.031"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105662"},{"key":"ref12","article-title":"A tutorial on Bayesian optimization","author":"Frazier","year":"2018","journal-title":"arXiv:1807.02811"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2494218"},{"issue":"4","key":"ref14","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1023\/A:1008306431147","article-title":"Efficient global optimization of expensive black-box functions","volume":"13","author":"Jones","year":"1998","journal-title":"J. Global Optim."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.03.073"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-008-0323-y"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2016.2594288"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2020.3016283"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2755595"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2008.2002909"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2017.11.006"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2016.2598270"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2011.2161285"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.12.023"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.11192"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.108288"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2015.10.009"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.04.046"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICECTECH.2011.5941710"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISCBI.2015.12"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2017.03.007"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.04.021"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-016-2179-2"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2013.01.050"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15702-3_37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.10.041"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.02.019"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-021-03213-y"},{"key":"ref39","first-page":"2951","article-title":"Practical Bayesian optimization of machine learning algorithms","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Snoek"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298621"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/S0898-1221(02)00206-7"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390157"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2182033"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/3206.001.0001"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxq003"},{"key":"ref46","first-page":"918","article-title":"Predictive entropy search for efficient global optimization of black-box functions","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Hern\u00e1ndez-Lobato"},{"key":"ref47","first-page":"397","article-title":"Using confidence bounds for exploitation-exploration trade-offs","volume":"3","author":"Auer","year":"2003","journal-title":"J. Mach. Learn. Res."},{"key":"ref48","article-title":"A tutorial on Bayesian optimization of expensive cost functions, with application to active user modeling and hierarchical reinforcement learning","author":"Brochu","year":"2010"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-05717-7"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840827"},{"key":"ref51","article-title":"Supervised contrastive learning with TPE-based Bayesian optimization of tabular data for imbalanced learning","author":"Tao","year":"2022","journal-title":"arXiv:2210.10824"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.undsp.2021.12.009"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/DAS.2008.74"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37456-2_27"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.08.051"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2701126.2701181"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/iciii.2011.276"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2014.258"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1515\/amcs-2017-0050"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1186\/1756-0381-6-16"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2013.6707035"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007735"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.06.007"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.10.013"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108919"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2846646"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2020.1003393"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2021.1004198"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2020.1003396"},{"key":"ref71","volume-title":"YanYes\/BOSMOTE: Supplementary file","year":"2023"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2443723"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3069108"}],"container-title":["IEEE Transactions on Systems, Man, and Cybernetics: Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221021\/10474542\/10374407.pdf?arnumber=10374407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T19:05:06Z","timestamp":1732129506000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10374407\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4]]},"references-count":73,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tsmc.2023.3335241","relation":{},"ISSN":["2168-2216","2168-2232"],"issn-type":[{"value":"2168-2216","type":"print"},{"value":"2168-2232","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4]]}}}