{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:30Z","timestamp":1750220370906,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T00:00:00Z","timestamp":1625616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61877045"],"award-info":[{"award-number":["61877045"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,7,7]]},"DOI":"10.1145\/3449726.3459434","type":"proceedings-article","created":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T14:49:57Z","timestamp":1625755797000},"page":"115-116","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Pathogen dose based natural killer cell algorithm for classification"],"prefix":"10.1145","author":[{"given":"Dongmei","family":"Wang","sequence":"first","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Yiwen","family":"Liang","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Chengyu","family":"Tan","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Hongbin","family":"Dong","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Xinmin","family":"Yang","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2021,7,8]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/356789.356797"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1994.296580"},{"key":"e_1_3_2_2_3_1","volume-title":"The evolution of the danger theory. Expert review of clinical immunology 8, 4","author":"Matzinger Polly","year":"2012","unstructured":"Polly Matzinger . 2012. The evolution of the danger theory. Expert review of clinical immunology 8, 4 ( 2012 ), 311--317. Polly Matzinger. 2012. The evolution of the danger theory. Expert review of clinical immunology 8, 4 (2012), 311--317."},{"key":"e_1_3_2_2_4_1","volume-title":"Eicke Latz, Kingston HG Mills, Gioacchino Natoli, Hendrik G Stunnenberg, Luke AJ ONeill, and Ramnik J Xavier.","author":"Netea Mihai G","year":"2016","unstructured":"Mihai G Netea , Leo AB Joosten , Eicke Latz, Kingston HG Mills, Gioacchino Natoli, Hendrik G Stunnenberg, Luke AJ ONeill, and Ramnik J Xavier. 2016 . Trained immunity: a program of innate immune memory in health and disease. Science 352, 6284 (2016). Mihai G Netea, Leo AB Joosten, Eicke Latz, Kingston HG Mills, Gioacchino Natoli, Hendrik G Stunnenberg, Luke AJ ONeill, and Ramnik J Xavier. 2016. Trained immunity: a program of innate immune memory in health and disease. Science 352, 6284 (2016)."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/jcm9041030"},{"key":"e_1_3_2_2_6_1","volume-title":"What defines NK cell functional fate: phenotype or metabolism? Frontiers in immunology 10","author":"Poznanski Sophie M","year":"2019","unstructured":"Sophie M Poznanski and Ali A Ashkar . 2019. What defines NK cell functional fate: phenotype or metabolism? Frontiers in immunology 10 ( 2019 ), 1414. Sophie M Poznanski and Ali A Ashkar. 2019. What defines NK cell functional fate: phenotype or metabolism? Frontiers in immunology 10 (2019), 1414."},{"key":"e_1_3_2_2_7_1","first-page":"20","article-title":"Negative selection algorithm: recent improvements and its application in intrusion detection system","volume":"6","author":"Ramdane Chikh","year":"2017","unstructured":"Chikh Ramdane and Salim Chikhi . 2017 . Negative selection algorithm: recent improvements and its application in intrusion detection system . Int. J. Comput. Acad. Res.(IJCAR) 6 , 2 (2017), 20 -- 30 . Chikh Ramdane and Salim Chikhi. 2017. Negative selection algorithm: recent improvements and its application in intrusion detection system. Int. J. Comput. Acad. Res.(IJCAR) 6, 2 (2017), 20--30.","journal-title":"Int. J. Comput. Acad. Res.(IJCAR)"}],"event":{"name":"GECCO '21: Genetic and Evolutionary Computation Conference","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation"],"location":"Lille France","acronym":"GECCO '21"},"container-title":["Proceedings of the Genetic and Evolutionary Computation Conference Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3449726.3459434","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3449726.3459434","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:37Z","timestamp":1750191457000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3449726.3459434"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,7]]},"references-count":7,"alternative-id":["10.1145\/3449726.3459434","10.1145\/3449726"],"URL":"https:\/\/doi.org\/10.1145\/3449726.3459434","relation":{},"subject":[],"published":{"date-parts":[[2021,7,7]]},"assertion":[{"value":"2021-07-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}