{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:33:24Z","timestamp":1761647604048,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,8,24]],"date-time":"2008-08-24T00:00:00Z","timestamp":1219536000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,8,24]]},"DOI":"10.1145\/1401890.1401980","type":"proceedings-article","created":{"date-parts":[[2008,8,27]],"date-time":"2008-08-27T11:56:41Z","timestamp":1219838201000},"page":"749-757","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Asymmetric support vector machines"],"prefix":"10.1145","author":[{"given":"Shan-Hung","family":"Wu","sequence":"first","affiliation":[{"name":"National Taiwan University, Taipei, Taiwan, ROC and Telcordia Applied Research Center, Taipei, Taiwan, ROC"}]},{"given":"Keng-Pei","family":"Lin","sequence":"additional","affiliation":[{"name":"National Taiwan University, Taipei, Taiwan, ROC"}]},{"given":"Chung-Min","family":"Chen","sequence":"additional","affiliation":[{"name":"Telcordia Applied Research Center, Taipei, Taiwan, ROC"}]},{"given":"Ming-Syan","family":"Chen","sequence":"additional","affiliation":[{"name":"National Taiwan University, Taipei, Taiwan, ROC"}]}],"member":"320","published-online":{"date-parts":[[2008,8,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/345508.345569"},{"key":"e_1_3_2_1_2_1","volume-title":"UCI Machine Learning Repository","author":"Asuncion A.","year":"2007","unstructured":"A. Asuncion and D.J. Newman . UCI Machine Learning Repository , 2007 . A. Asuncion and D.J. Newman. UCI Machine Learning Repository, 2007."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972719.28"},{"key":"e_1_3_2_1_4_1","volume-title":"Advances in Kernel Methods: Support Vector Learning","author":"Bartlett P.","year":"1998","unstructured":"P. Bartlett and J. Shawe-Taylor . Generalization performance of support vector machines and other pattern classifiers . In Advances in Kernel Methods: Support Vector Learning . MIT Press , 1998 . P. Bartlett and J. Shawe-Taylor. Generalization performance of support vector machines and other pattern classifiers. In Advances in Kernel Methods: Support Vector Learning. MIT Press, 1998."},{"key":"e_1_3_2_1_5_1","first-page":"125","article-title":"Support vector clustering","volume":"2","author":"Ben-Hur A.","year":"2001","unstructured":"A. Ben-Hur , D. Horn , H.T. Siegelmann , and V. Vapnik . Support vector clustering . Journal of Machine Learning Research , 2 : 125 -- 137 , 2001 . A. Ben-Hur, D. Horn, H.T. Siegelmann, and V. Vapnik. Support vector clustering. Journal of Machine Learning Research, 2:125--137, 2001.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.132"},{"key":"e_1_3_2_1_7_1","first-page":"7","article-title":"Spam filtering using statistical data compression models","author":"Bratko A.","year":"2006","unstructured":"A. Bratko , G. Cormack , B. Filipic , T. Lynam , and B. Zupan . Spam filtering using statistical data compression models . Journal of Machine Learning Research , 7 , 2006 . A. Bratko, G. Cormack, B. Filipic, T. Lynam, and B. Zupan. Spam filtering using statistical data compression models. Journal of Machine Learning Research, 7, 2006.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_8_1","volume-title":"Classification and Regression Trees","author":"Breiman L.","year":"1998","unstructured":"L. Breiman . Classification and Regression Trees . Chapman & amp; Hall, 1998 . L. Breiman. Classification and Regression Trees. Chapman &amp; Hall, 1998."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009715923555"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. of the 4th International Conference on Recent Advances in Natural Language Processing","author":"Carreras X.","year":"2001","unstructured":"X. Carreras and L. Marquez . Boosting trees for anti-spam email fltering . In Proc. of the 4th International Conference on Recent Advances in Natural Language Processing , 2001 . X. Carreras and L. Marquez. Boosting trees for anti-spam email fltering. In Proc. of the 4th International Conference on Recent Advances in Natural Language Processing, 2001."},{"key":"e_1_3_2_1_11_1","volume-title":"LIBSVM: a library for support vector machines. Software","author":"Chang C.-C.","year":"2001","unstructured":"C.-C. Chang and C.-J. Lin . LIBSVM: a library for support vector machines. Software available at http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm, 2001 . C.-C. Chang and C.-J. Lin. LIBSVM: a library for support vector machines. Software available at http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm, 2001."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(03)00192-4"},{"key":"e_1_3_2_1_13_1","volume-title":"Fourteenth Text REtrieval Conference (TREC-2005)","author":"Cormack G.","year":"2005","unstructured":"G. Cormack and T. Lynam . Overview of the trec 2005 spam evaluation track . In Fourteenth Text REtrieval Conference (TREC-2005) . NIST, 2005 . G. Cormack and T. Lynam. Overview of the trec 2005 spam evaluation track. In Fourteenth Text REtrieval Conference (TREC-2005). NIST, 2005."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022627411411"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.788645"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216016.1216017"},{"key":"e_1_3_2_1_17_1","unstructured":"C.-W. Hsu C.-C. Chang and C.-J. Lin. A practical guide to support vector classification. Technical report http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm 2003.  C.-W. Hsu C.-C. Chang and C.-J. Lin. A practical guide to support vector classification. Technical report http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm 2003."},{"key":"e_1_3_2_1_18_1","volume-title":"Online learning with kernels. Advances in Neural Information Processing Systems","author":"Kivinen J.","year":"2002","unstructured":"J. Kivinen , A. Smola , and R. Williamson . Online learning with kernels. Advances in Neural Information Processing Systems . MIT Press , 14: 785--793, 2002 . J. Kivinen, A. Smola, and R. Williamson. Online learning with kernels. Advances in Neural Information Processing Systems. MIT Press, 14:785--793, 2002."},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. of TextDM","author":"Kolcz A.","year":"2001","unstructured":"A. Kolcz and J. Alspector . SVM-based filtering of e-mail spam with content-specific misclassification costs . In Proc. of TextDM , 2001 . A. Kolcz and J. Alspector. SVM-based filtering of e-mail spam with content-specific misclassification costs. In Proc. of TextDM, 2001."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14711\/thesis-b987573"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148195"},{"key":"e_1_3_2_1_22_1","volume-title":"Advances in Kernel Methods: Support Vector Learning","author":"Platt J.","year":"1998","unstructured":"J. Platt . Sequenital minimal optimization: A fast algorithm for training support vector machines . In Advances in Kernel Methods: Support Vector Learning . MIT Press , 1998 . J. Platt. Sequenital minimal optimization: A fast algorithm for training support vector machines. In Advances in Kernel Methods: Support Vector Learning. MIT Press, 1998."},{"volume-title":"IJCNN 2001 neural network competition, 2001. Slide presentation in IJCNN'01, Ford Research Laboratory.","author":"Prokhorov D.","key":"e_1_3_2_1_23_1","unstructured":"D. Prokhorov . IJCNN 2001 neural network competition, 2001. Slide presentation in IJCNN'01, Ford Research Laboratory. D. Prokhorov. IJCNN 2001 neural network competition, 2001. Slide presentation in IJCNN'01, Ford Research Laboratory."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.3115\/1067807.1067848"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"e_1_3_2_1_27_1","volume-title":"Regularization, Optimization, and Beyond","author":"Scholkopf B.","year":"2002","unstructured":"B. Scholkopf and A. Smola . Learning with Kernels:: Support Vector Machines , Regularization, Optimization, and Beyond . MIT Press , 2002 . B. Scholkopf and A. Smola. Learning with Kernels:: Support Vector Machines, Regularization, Optimization, and Beyond. MIT Press, 2002."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277813"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.705570"},{"key":"e_1_3_2_1_30_1","volume-title":"Statistical Learning Theory","author":"Vapnik V.","year":"1998","unstructured":"V. Vapnik . Statistical Learning Theory . Wiley , NY , 1998 . V. Vapnik. Statistical Learning Theory. Wiley, NY, 1998."},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. of Neural Information Processing Systems (NIPS)","author":"Viola P.","year":"2002","unstructured":"P. Viola and M. Jones . Fast and robust classification using asymmetric adaboost and a detector cascade . In Proc. of Neural Information Processing Systems (NIPS) , 2002 . P. Viola and M. Jones. Fast and robust classification using asymmetric adaboost and a detector cascade. In Proc. of Neural Information Processing Systems (NIPS), 2002."},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. of the 3rd Conference on Email and Anti-Spam (CEAS)","author":"Yih W.","year":"2006","unstructured":"W. Yih , J. Goodman , and G. Hulten . Learning at low false positive rates . In Proc. of the 3rd Conference on Email and Anti-Spam (CEAS) , 2006 . W. Yih, J. Goodman, and G. Hulten. Learning at low false positive rates. In Proc. of the 3rd Conference on Email and Anti-Spam (CEAS), 2006."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/42.538936"}],"event":{"name":"KDD08: The 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","ACM Association for Computing Machinery"],"location":"Las Vegas Nevada USA","acronym":"KDD08"},"container-title":["Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1401890.1401980","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1401890.1401980","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:58:04Z","timestamp":1750255084000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1401890.1401980"}},"subtitle":["low false-positive learning under the user tolerance"],"short-title":[],"issued":{"date-parts":[[2008,8,24]]},"references-count":32,"alternative-id":["10.1145\/1401890.1401980","10.1145\/1401890"],"URL":"https:\/\/doi.org\/10.1145\/1401890.1401980","relation":{},"subject":[],"published":{"date-parts":[[2008,8,24]]},"assertion":[{"value":"2008-08-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}