{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:12:58Z","timestamp":1750219978009,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,23]]},"DOI":"10.1145\/3573942.3573951","type":"proceedings-article","created":{"date-parts":[[2023,5,16]],"date-time":"2023-05-16T23:45:42Z","timestamp":1684280742000},"page":"57-62","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Express-related Counterfeit Cigarette Crime Prediction with Imbalanced Data-based Machine Learning Techniques"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3131-7401","authenticated-orcid":false,"given":"Wei","family":"Liu","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Xi'an University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4666-6580","authenticated-orcid":false,"given":"Rong-yao","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xi'an University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0607-3131","authenticated-orcid":false,"given":"Lang-chao","family":"Qiao","sequence":"additional","affiliation":[{"name":"Division of Monopoly Administration, Shaanxi Branch of China National Tobacco Corporation, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4072-4831","authenticated-orcid":false,"given":"Jin-lu","family":"Wang","sequence":"additional","affiliation":[{"name":"Division of Monopoly Administration, Shaanxi Branch of China National Tobacco Corporation, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1588-0704","authenticated-orcid":false,"given":"Bao-hong","family":"Gao","sequence":"additional","affiliation":[{"name":"Division of Monopoly Administration, Shaanxi Branch of China National Tobacco Corporation, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5553-2715","authenticated-orcid":false,"given":"Xin-gang","family":"Yang","sequence":"additional","affiliation":[{"name":"Division of Monopoly Administration, Shaanxi Branch of China National Tobacco Corporation, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9737-3505","authenticated-orcid":false,"given":"Wen-tao","family":"Feng","sequence":"additional","affiliation":[{"name":"Division of Monopoly Administration, Shaanxi Branch of China National Tobacco Corporation, China"}]}],"member":"320","published-online":{"date-parts":[[2023,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","article-title":"Express-related counterfeit cigarette criminality analysis based on spatio-temporal data features","author":"Langchao WANG","year":"2021","unstructured":"QIAO Langchao, WANG Jinlu and GAO Baohong, 2021. Express-related counterfeit cigarette criminality analysis based on spatio-temporal data features. Chinese Journal of Tobacco : 1\u201311. 2022\u201307\u201331.","journal-title":"Chinese Journal of Tobacco"},{"key":"e_1_3_2_1_2_1","volume-title":"Analysis on the Acceptance and Application of Electronic Evidence in Combating Internet Cigarette-related Crimes","author":"Yingyi","year":"2018","unstructured":"WEI Yingyi. 2018. Analysis on the Acceptance and Application of Electronic Evidence in Combating Internet Cigarette-related Crimes. Guangxi Tobacco Society 2018 Papers. 2018:187-192."},{"issue":"23","key":"e_1_3_2_1_3_1","first-page":"85","article-title":"Study on the Countermeasures of Network Cigarette-related Crime","volume":"2020","author":"Minghua","year":"2020","unstructured":"MO Minghua. 2020. Study on the Countermeasures of Network Cigarette-related Crime. Legal System and Society, 2020(23):85-87.","journal-title":"Legal System and Society"},{"issue":"10","key":"e_1_3_2_1_4_1","first-page":"80","article-title":"Application of Big Data on' Internet + Delivery 'Cigarette-related Crime","volume":"2018","author":"Yi YANG","year":"2018","unstructured":"JIANG Yi, YANG Yueyao and LI Xiaofan. 2018. Application of Big Data on' Internet + Delivery 'Cigarette-related Crime. Computer Products and Circulation, 2018(10):80.","journal-title":"Computer Products and Circulation"},{"key":"e_1_3_2_1_5_1","volume-title":"Tobacco Control","author":"Pizarro M E","year":"2021","unstructured":"Pizarro M E, Giacobone G, Shammah C, 2021. Illicit tobacco trade: empty pack survey in eight Argentinean cities. Tobacco Control, 2021."},{"key":"e_1_3_2_1_6_1","first-page":"1","article-title":"Empty pack survey to estimate Illicit Tobacco Trade in the city of Buenos Aires, Argentina","volume":"2021","author":"Pizarro M E","year":"2021","unstructured":"Pizarro M E, Giacobone G, Shammah C, 2021. Empty pack survey to estimate Illicit Tobacco Trade in the city of Buenos Aires, Argentina. Trends in Organized Crime, 2021: 1-17.","journal-title":"Trends in Organized Crime"},{"key":"e_1_3_2_1_7_1","first-page":"161","volume-title":"China Management Informatization","author":"Fei","year":"2019","unstructured":"LV Fei. 2019. Research on Internet Smoke-related Crime Area Division Based on Improved K-Means Clustering Algorithm. China Management Informatization, 2019, 22(22): 161-165."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT52962.2021.9657960"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","unstructured":"H. Luo X. Pan Q. Wang S. Ye and Y. Qian. 2019. \"Logistic Regression and Random Forest for Effective Imbalanced Classification \" 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC) 2019 pp. 916-917 doi: 10.1109\/COMPSAC.2019.00139.","DOI":"10.1109\/COMPSAC.2019.00139"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","unstructured":"H. R. Sanabila and W. Jatmiko 2018. \"Ensemble Learning on Large Scale Financial Imbalanced Data \" 2018 International Workshop on Big Data and Information Security (IWBIS) 2018 pp. 93-98 doi: 10.1109\/IWBIS.2018.8471702.","DOI":"10.1109\/IWBIS.2018.8471702"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/M2GARSS52314.2022.9840044"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3195212"},{"key":"e_1_3_2_1_13_1","article-title":"Aliasing artefact suppression incompressed sensing MRI for random phase-encode undersampling","volume":"2015","author":"Yang Y","year":"2015","unstructured":"Yang Y, Liu F, Jin Z Y, 2015. Aliasing artefact suppression incompressed sensing MRI for random phase-encode undersampling. IEEE Trans Bio-Med Eng, 2015, 62(9): 2215.","journal-title":"IEEE Trans Bio-Med Eng"},{"key":"e_1_3_2_1_14_1","first-page":"50","article-title":"Minority Report in Fraud Detection: Classification of Skewed Data.","volume":"2004","year":"2004","unstructured":"CLIFTON P, DAMMINDA A, VINCENT L.2004. Minority Report in Fraud Detection: Classification of Skewed Data.ACM SIGKDD Explorations Newsletter, 2004, 6(1):50-59.","journal-title":"ACM SIGKDD Explorations Newsletter"},{"volume-title":"Approach to Unbalanced Data Distributions: A Case Study Involving Information Extraction\/\/Proc.Int'1 Conf Machine Learning From Imbalanced Data Sets.Washington DC:AAAI Press","year":"2003","key":"e_1_3_2_1_15_1","unstructured":"ZHANG J, MANI I.2003. Approach to Unbalanced Data Distributions: A Case Study Involving Information Extraction\/\/Proc.Int'1 Conf Machine Learning From Imbalanced Data Sets.Washington DC:AAAI Press, 2003."},{"key":"e_1_3_2_1_16_1","first-page":"179","article-title":"Addressing the Curse of Imbalanced Training Sets","volume":"1997","year":"1997","unstructured":"KUBAT M, MATWIN S.1997.Addressing the Curse of Imbalanced Training Sets: One-Sided Selection\/\/Proc.Int'l Conf Machine Learning.San Francisco: Morgan Kaufmann, 1997:179-186.","journal-title":"One-Sided Selection\/\/Proc.Int'l Conf Machine Learning.San Francisco: Morgan Kaufmann"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"HAN H WANG W Y MAO B H.2005. Borderline-SMOTE:A New Over-Sampling Method in Imbalanced Data Sets Learning.Lecture Notes In Computer Science 2005 3644(1):878-887.","DOI":"10.1007\/11538059_91"},{"volume-title":"Adaptive Synthetic Sampling Approach for Imbalanced Learning\/\/IEEE.Proc Int'l J Conf Neural Networks.USA:IEEE Press","year":"2008","key":"e_1_3_2_1_19_1","unstructured":"HE H, BAI Y, GARCIA E A.2008. Adaptive Synthetic Sampling Approach for Imbalanced Learning\/\/IEEE.Proc Int'l J Conf Neural Networks.USA:IEEE Press, 2008:1322-1328."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxab039"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","unstructured":"G. A. Pradipta R. Wardoyo A. Musdholifah I. N. H. Sanjaya and M. Ismail. 2021. \"SMOTE for Handling Imbalanced Data Problem: A Review \" 2021 Sixth International Conference on Informatics and Computing (ICIC) 2021 pp. 1-8 doi: 10.1109\/ICIC54025.2021.9632912.","DOI":"10.1109\/ICIC54025.2021.9632912"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TENSYMP50017.2020.9230983"},{"key":"e_1_3_2_1_23_1","unstructured":"Jieba Chinese word segmentation https:\/\/github.com\/fxsjy\/jieba"}],"event":{"name":"AIPR 2022: 2022 5th International Conference on Artificial Intelligence and Pattern Recognition","acronym":"AIPR 2022","location":"Xiamen China"},"container-title":["Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573942.3573951","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3573942.3573951","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:22Z","timestamp":1750182562000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573942.3573951"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,23]]},"references-count":23,"alternative-id":["10.1145\/3573942.3573951","10.1145\/3573942"],"URL":"https:\/\/doi.org\/10.1145\/3573942.3573951","relation":{},"subject":[],"published":{"date-parts":[[2022,9,23]]},"assertion":[{"value":"2023-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}