{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:33:44Z","timestamp":1762432424195,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T00:00:00Z","timestamp":1713398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,18]]},"DOI":"10.1145\/3603287.3651186","type":"proceedings-article","created":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T12:06:34Z","timestamp":1714219594000},"page":"259-265","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Benchmarking Machine Learning Techniques for Bankruptcy Prediction under Benign and Adversarial Behaviors"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-6761-8903","authenticated-orcid":false,"given":"Xing","family":"Yin","sequence":"first","affiliation":[{"name":"University of Mississippi, Oxford, Mississippi, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9632-6870","authenticated-orcid":false,"given":"Thai","family":"Le","sequence":"additional","affiliation":[{"name":"University of Mississippi, Oxford, Mississippi, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,4,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intfin.2021.101455"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3093461"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11749-016-0481-7"},{"key":"e_1_3_2_1_4_1","unstructured":"Claire Cardie and Nicholas Howe. 1997. Improving Minority Class Prediction Using Case-specific Feature Weights. (1997)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622407.1622416"},{"key":"e_1_3_2_1_6_1","volume-title":"Xgboost: Extreme Gradient Boosting. R package version 0.4-2 1, 4","author":"Chen Tianqi","year":"2015","unstructured":"Tianqi Chen, Tong He, Michael Benesty, Vadim Khotilovich, Yuan Tang, Hyunsu Cho, Kailong Chen, Rory Mitchell, Ignacio Cano, Tianyi Zhou, et al. 2015. Xgboost: Extreme Gradient Boosting. R package version 0.4-2 1, 4 (2015), 1--4."},{"key":"e_1_3_2_1_7_1","volume-title":"L2 Regularization for Learning Kernels. arXiv preprint arXiv:1205.2653","author":"Cortes Corinna","year":"2012","unstructured":"Corinna Cortes, Mehryar Mohri, and Afshin Rostamizadeh. 2012. L2 Regularization for Learning Kernels. arXiv preprint arXiv:1205.2653 (2012)."},{"key":"e_1_3_2_1_8_1","volume-title":"Deep Learning-based Model for Financial Distress Prediction. Annals of Operations Research","author":"Elhoseny Mohamed","year":"2022","unstructured":"Mohamed Elhoseny, Noura Metawa, Gabor Sztano, and Ibrahim M El-Hasnony. 2022. Deep Learning-based Model for Financial Distress Prediction. Annals of Operations Research (2022), 1--23."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.24136\/oc.2022.035"},{"key":"e_1_3_2_1_10_1","volume-title":"Explaining and Harnessing Adversarial Examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and Harnessing Adversarial Examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_1_11_1","volume-title":"Adversarial Attacks on Classifiers for Eye-based User Modelling. In ACM Symposium on Eye Tracking Research and Applications. 1--3.","author":"Hagestedt Inken","year":"2020","unstructured":"Inken Hagestedt, Michael Backes, and Andreas Bulling. 2020. Adversarial Attacks on Classifiers for Eye-based User Modelling. In ACM Symposium on Eye Tracking Research and Applications. 1--3."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym13030443"},{"key":"e_1_3_2_1_13_1","volume-title":"Lightgbm: A Highly Efficient Gradient Boosting Decision Tree. Advances in Neural Information Processing Systems 30","author":"Ke Guolin","year":"2017","unstructured":"Guolin Ke, Qi Meng, Thomas Finley, Taifeng Wang, Wei Chen, Weidong Ma, Qiwei Ye, and Tie-Yan Liu. 2017. Lightgbm: A Highly Efficient Gradient Boosting Decision Tree. Advances in Neural Information Processing Systems 30 (2017)."},{"key":"e_1_3_2_1_14_1","volume-title":"Timing Attacks on Machine Learning: State of the Art. In Intelligent Systems and Applications: Proceedings of the 2019 Intelligent Systems Conference (IntelliSys)","volume":"1","author":"Kianpour Mazaher","year":"2020","unstructured":"Mazaher Kianpour and Shao-Fang Wen. 2020. Timing Attacks on Machine Learning: State of the Art. In Intelligent Systems and Applications: Proceedings of the 2019 Intelligent Systems Conference (IntelliSys) Volume 1. Springer, 111--125."},{"key":"e_1_3_2_1_15_1","volume-title":"Corporate Bankruptcy Prediction with Domain-adapted BERT. In EMNLP 2021, 3rd Workshop on ECONLP.","author":"Kim Alex G","year":"2021","unstructured":"Alex G Kim and Sangwon Yoon. 2021. Corporate Bankruptcy Prediction with Domain-adapted BERT. In EMNLP 2021, 3rd Workshop on ECONLP."},{"key":"e_1_3_2_1_16_1","volume-title":"Adversarial Machine Learning at Scale. arXiv preprint arXiv:1611.01236","author":"Kurakin Alexey","year":"2016","unstructured":"Alexey Kurakin, Ian Goodfellow, and Samy Bengio. 2016. Adversarial Machine Learning at Scale. arXiv preprint arXiv:1611.01236 (2016)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1161\/CIRCULATIONAHA.106.682658"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ribaf.2017.07.104"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2021.3057686"},{"key":"e_1_3_2_1_20_1","article-title":"Fraud Risk Factor of the Fraud Triangle Assessing the Likelihood of Fraudulent Financial Reporting","volume":"7","author":"Lou I","year":"2009","unstructured":"Yung-I Lou, Ming-Long Wang, et al. 2009. Fraud Risk Factor of the Fraud Triangle Assessing the Likelihood of Fraudulent Financial Reporting. Journal of Business & Economics Research (JBER) 7, 2 (2009).","journal-title":"Journal of Business & Economics Research (JBER)"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74958-5_28"},{"key":"e_1_3_2_1_22_1","first-page":"130","article-title":"Decision Tree Methods: Applications for Classification and Prediction","volume":"27","author":"Song Yan-Yan","year":"2015","unstructured":"Yan-Yan Song and Lu Ying. 2015. Decision Tree Methods: Applications for Classification and Prediction. Shanghai Archives of Psychiatry 27, 2 (2015), 130.","journal-title":"Shanghai Archives of Psychiatry"},{"key":"e_1_3_2_1_23_1","volume-title":"Geomatic Approaches for Modeling Land Change Scenarios","author":"Taud Hind","year":"2018","unstructured":"Hind Taud and JF Mas. 2018. Multilayer Perceptron (MLP). Geomatic Approaches for Modeling Land Change Scenarios (2018), 451--455."},{"key":"e_1_3_2_1_24_1","volume-title":"Class Imbalance Deep Learning for Bankruptcy Prediction. In 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T). IEEE, 421--425","author":"Vellamcheti Shanmukha","year":"2020","unstructured":"Shanmukha Vellamcheti and Pradeep Singh. 2020. Class Imbalance Deep Learning for Bankruptcy Prediction. In 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T). IEEE, 421--425."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.3390\/su12187529"},{"volume-title":"An Experimental Study of Supervised Sentiment Analysis Using Gaussian Na\u00efve Bayes. In 2018 International Seminar on Application for Technology of Information and Communication","author":"Wijayanto Unggul Widodo","key":"e_1_3_2_1_26_1","unstructured":"Unggul Widodo Wijayanto and Riyanarto Sarno. 2018. An Experimental Study of Supervised Sentiment Analysis Using Gaussian Na\u00efve Bayes. In 2018 International Seminar on Application for Technology of Information and Communication. IEEE, 476--481."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9878-1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Lin Zhu Dawen Yan Zhihua Zhang Guotai Chi et al. 2022. Financial Distress Prediction of Chinese Listed Companies Using the Combination of Optimization Model and Convolutional Neural Network. Mathematical Problems in Engineering 2022 (2022).","DOI":"10.1155\/2022\/9038992"}],"event":{"name":"ACM SE '24: 2024 ACM Southeast Conference","sponsor":["ACM Association for Computing Machinery"],"location":"Marietta GA USA","acronym":"ACM SE '24"},"container-title":["Proceedings of the 2024 ACM Southeast Conference on ZZZ"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603287.3651186","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603287.3651186","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T17:05:54Z","timestamp":1756487154000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603287.3651186"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,18]]},"references-count":28,"alternative-id":["10.1145\/3603287.3651186","10.1145\/3603287"],"URL":"https:\/\/doi.org\/10.1145\/3603287.3651186","relation":{},"subject":[],"published":{"date-parts":[[2024,4,18]]},"assertion":[{"value":"2024-04-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}