{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:25:32Z","timestamp":1750307132071,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,8,5]],"date-time":"2011-08-05T00:00:00Z","timestamp":1312502400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"\"SUST Spring Bud\" research project","award":["2010AZZ179"],"award-info":[{"award-number":["2010AZZ179"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,8,5]]},"DOI":"10.1145\/2043674.2043708","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"page":"116-119","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A learning strategy for highly imbalanced classification"],"prefix":"10.1145","author":[{"given":"Tong","family":"Liu","sequence":"first","affiliation":[{"name":"Shandong university of Science and Technology, Tai'an Shandong, P. R. China"}]},{"given":"Yongquan","family":"Liang","sequence":"additional","affiliation":[{"name":"Shandong university of Science and Technology, Qingdao, P. R. China"}]},{"given":"Weijian","family":"Ni","sequence":"additional","affiliation":[{"name":"Shandong university of Science and Technology, Qingdao, P. R. China"}]}],"member":"320","published-online":{"date-parts":[[2011,8,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SWS.2010.5607463"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622407.1622416"},{"issue":"5","key":"e_1_3_2_1_3_1","first-page":"1094","article-title":"Research on classification technique for imbalanced dataset based on support vector machines","volume":"30","author":"Zhiming Yang","year":"2009","journal-title":"Chinese Journal of Scientific Instrument"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007733"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007734"},{"key":"e_1_3_2_1_6_1","first-page":"408","article-title":"Asymptotic properties of nearest neighbor rules using edited data sets","volume":"2","author":"D.","year":"1972","journal-title":"IEEE Trans. on Systems, Man and Cybernetics"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2010.03.005"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Prati R. C. Batista G. E. 2004. Class Imbalances versus Class Overlapping: an Analysis of a Learning System Behavior. MICAI. pp. 312--321. LNAI 2972.  Prati R. C. Batista G. E. 2004. Class Imbalances versus Class Overlapping: an Analysis of a Learning System Behavior. MICAI. pp. 312--321. LNAI 2972.","DOI":"10.1007\/978-3-540-24694-7_32"},{"first-page":"567","volume-title":"Procedding of the 21st National Conference on Artificial Intelligence","author":"Zhou Z. H.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.95"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009715923555"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143874"}],"event":{"name":"ICIMCS '11: The Third International Conference on Internet Multimedia Computing and Service","sponsor":["Sichuan University","Chinese Academy of Sciences","SCF Sichuan Computer Federation","Southwest Jiaotong University","Beijing ACM SIGMM Chapter"],"location":"Chengdu China","acronym":"ICIMCS '11"},"container-title":["Proceedings of the Third International Conference on Internet Multimedia Computing and Service"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043674.2043708","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2043674.2043708","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:39Z","timestamp":1750240119000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043674.2043708"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8,5]]},"references-count":12,"alternative-id":["10.1145\/2043674.2043708","10.1145\/2043674"],"URL":"https:\/\/doi.org\/10.1145\/2043674.2043708","relation":{},"subject":[],"published":{"date-parts":[[2011,8,5]]},"assertion":[{"value":"2011-08-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}