{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:09:48Z","timestamp":1764936588516,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/cidm.2011.5949423","type":"proceedings-article","created":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T15:48:16Z","timestamp":1310572096000},"page":"341-348","source":"Crossref","is-referenced-by-count":58,"title":["Opening black box Data Mining models using Sensitivity Analysis"],"prefix":"10.1109","author":[{"given":"Paulo","family":"Cortez","sequence":"first","affiliation":[]},{"given":"Mark J.","family":"Embrechts","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.artmed.2005.07.006"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1142\/S0218213092000260"},{"key":"ref12","first-page":"383","article-title":"Opening the black box-data driven visualization of neural networks","author":"tzeng","year":"0","journal-title":"Proc IEEE Visualization (VIS '05)"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1109\/TITB.2007.902300","article-title":"Nonlinear support vector machine visualization for risk factor analysis using nomograms and localized radial basis function kernels","volume":"12","author":"cho","year":"2008","journal-title":"Information Technology in Biomedicine IEEE Transactions on"},{"key":"ref14","first-page":"40","article-title":"Feature selection using a multilayer perceptron","volume":"2","author":"ruck","year":"1990","journal-title":"Journal of Neural Network Computing"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2002.1005488"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.05.016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/72.846738"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1080\/10255810390245555"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1007\/978-3-642-04747-3_8","article-title":"Using data mining for wine quality assessment","volume":"lncs 5808","author":"cortez","year":"2009","journal-title":"Discovery Science"},{"article-title":"Neural Networks - A Compreensive Foundation","year":"1999","author":"haykin","key":"ref4"},{"key":"ref3","article-title":"CRISP-DM 1.0: Step-by-step data mining guide","author":"chapman","year":"2000","journal-title":"CRISP-DM Consortium"},{"key":"ref6","first-page":"1","article-title":"Ensemble methods in machine learning","author":"dietterich","year":"2000","journal-title":"Multiple Classifier Systems 1857 of Lecture Notes in Computer Science"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511801389"},{"key":"ref8","first-page":"99","article-title":"Techniques for Extracting Classification and Regression Rules from Artificial Neural Networks","author":"setiono","year":"2003","journal-title":"Computational Intelligence The Experts Speak"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/72.728352"},{"journal-title":"Decision Support and Business Intelligence Systems","year":"2010","author":"turban","key":"ref2"},{"article-title":"Advances in Knowledge Discovery and Data Mining","year":"1996","author":"fayyad","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2006.04.051"},{"journal-title":"R Development Core Team r A Language and Environment for Statistical Computing r Foundation for Statistical Computing Vienna Austria","year":"2009","key":"ref20"},{"journal-title":"UCI Machine Learning Repository Univ of California Irvine","year":"2007","author":"asuncion","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14400-4_44"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"article-title":"Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations","year":"2005","author":"witten","key":"ref23"}],"event":{"name":"2011 Ieee Symposium On Computational Intelligence And Data Mining - Part Of 17273 - 2011 Ssci","start":{"date-parts":[[2011,4,11]]},"location":"Paris, France","end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 IEEE Symposium on Computational Intelligence and Data Mining (CIDM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5937059\/5949295\/05949423.pdf?arnumber=5949423","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T23:37:48Z","timestamp":1560382668000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5949423\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/cidm.2011.5949423","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}