{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:10:13Z","timestamp":1773155413454,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T00:00:00Z","timestamp":1746230400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T00:00:00Z","timestamp":1746230400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"DOI":"10.1186\/s40537-025-01171-0","type":"journal-article","created":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T17:11:47Z","timestamp":1746292307000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Evaluating techniques from low-shot learning on traditional imbalanced classification tasks"],"prefix":"10.1186","volume":"12","author":[{"given":"Preston","family":"Billion-Polak","sequence":"first","affiliation":[]},{"given":"Taghi M.","family":"Khoshgoftaar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,3]]},"reference":[{"key":"1171_CR1","unstructured":"As Nationwide Fraud Losses Top \\$10 Billion in 2023, FTC Steps Up Efforts to Protect the Public. https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2024\/02\/nationwide-fraud-losses-top-10-billion-2023-ftc-steps-efforts-protect-public (2024). Accessed 20 July 2024."},{"key":"1171_CR2","unstructured":"Office of Public Affairs | National Health Care Fraud Enforcement Action Results in 193 Defendants Charged and Over \\$2.75 Billion in False Claims | United States Department of Justice. https:\/\/www.justice.gov\/opa\/pr\/national-health-care-fraud-enforcement-action-results-193-defendants-charged-and-over-275-0 (2024). Accessed 27 Oct 2024."},{"key":"1171_CR3","unstructured":"Stolfo S, Fan DW, Lee W, Prodromidis A, Chan P. Credit card fraud detection using meta-learning: issues and initial results. In: AAAI-97 Workshop on Fraud Detection and Risk Management, vol. 83. 1997."},{"key":"1171_CR4","unstructured":"Burr T, Hale C, Kantor M. Fraud detection in medicare claims: a multivariate outlier detection approach. Technical Report LA-UR-97-1142; CONF-970837-1, Los Alamos National Lab. (LANL), Los Alamos, NM (United States). https:\/\/www.osti.gov\/biblio\/503526 (1997). Accessed 27 Oct 2024."},{"key":"1171_CR5","volume-title":"Advances in neural information processing systems","author":"E Triantafillou","year":"2017","unstructured":"Triantafillou E, Zemel R, Urtasun R. Few-shot learning through an information retrieval lens. In: Guyon I, Luxburg UV, Bengio S, Wallach H, Fergus R, Vishwanathan S, Garnett R, editors. Advances in neural information processing systems, vol. 30. Newry: Curran Associates; 2017."},{"issue":"1","key":"1171_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-023-00851-z","volume":"11","author":"P Billion Polak","year":"2024","unstructured":"Billion Polak P, Prusa JD, Khoshgoftaar TM. Low-shot learning and class imbalance: a survey. J Big Data. 2024;11(1):1. https:\/\/doi.org\/10.1186\/s40537-023-00851-z.","journal-title":"J Big Data"},{"key":"1171_CR7","doi-asserted-by":"publisher","unstructured":"Bansal A, Goldblum M, Cherepanova V, Schwarzschild A, Bruss CB, Goldstein T. MetaBalance: High-performance neural networks for class-imbalanced data. 2021. https:\/\/doi.org\/10.48550\/arxiv.2106.09643.","DOI":"10.48550\/arxiv.2106.09643"},{"issue":"16","key":"1171_CR8","doi-asserted-by":"publisher","first-page":"11086","DOI":"10.1021\/acsomega.1c01266","volume":"6","author":"D Fern\u00e1ndez-Llaneza","year":"2021","unstructured":"Fern\u00e1ndez-Llaneza D, Ulander S, Gogishvili D, Nittinger E, Zhao H, Tyrchan C. Siamese recurrent neural network with a self-attention mechanism for bioactivity prediction. ACS Omega. 2021;6(16):11086\u201394. https:\/\/doi.org\/10.1021\/acsomega.1c01266.","journal-title":"ACS Omega"},{"key":"1171_CR9","doi-asserted-by":"publisher","unstructured":"Leevy JL, Khoshgoftaar TM, Hancock J. Evaluating performance metrics for credit card fraud classification. In: 2022 IEEE 34th international conference on tools with artificial intelligence (ICTAI). 2022. pp. 1336\u201341. https:\/\/doi.org\/10.1109\/ICTAI56018.2022.00202. https:\/\/ieeexplore.ieee.org\/document\/10098000 Accessed 22 Jun 2024.","DOI":"10.1109\/ICTAI56018.2022.00202"},{"issue":"3","key":"1171_CR10","doi-asserted-by":"publisher","first-page":"0118432","DOI":"10.1371\/journal.pone.0118432","volume":"10","author":"T Saito","year":"2015","unstructured":"Saito T, Rehmsmeier M. The precision-recall plot is more informative than the ROC plot when evaluating binary classifiers on imbalanced datasets. PLoS ONE. 2015;10(3):0118432. https:\/\/doi.org\/10.1371\/journal.pone.0118432.","journal-title":"PLoS ONE"},{"key":"1171_CR11","unstructured":"Kotsiantis S, Kanellopoulos D, Pintelas P. Handling imbalanced datasets: a review. https:\/\/www.semanticscholar.org\/paper\/Handling-imbalanced-datasets:A-A-review-Kotsiantis-Kanellopoulos\/95dfdc02010b9c390878729f459893c2a5c0898f (2006). Accessed 25 Nov 2024."},{"issue":"9","key":"1171_CR12","doi-asserted-by":"publisher","first-page":"1263","DOI":"10.1109\/TKDE.2008.239","volume":"21","author":"H He","year":"2009","unstructured":"He H, Garcia EA. Learning from imbalanced data. IEEE Trans Knowl Data Eng. 2009;21(9):1263\u201384. https:\/\/doi.org\/10.1109\/TKDE.2008.239.","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"1171_CR13","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1186\/s40537-018-0151-6","volume":"5","author":"JL Leevy","year":"2018","unstructured":"Leevy JL, Khoshgoftaar TM, Bauder RA, Seliya N. A survey on addressing high-class imbalance in big data. J Big Data. 2018;5(1):42. https:\/\/doi.org\/10.1186\/s40537-018-0151-6.","journal-title":"J. Big Data"},{"issue":"1","key":"1171_CR14","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1186\/s40537-019-0192-5","volume":"6","author":"JM Johnson","year":"2019","unstructured":"Johnson JM, Khoshgoftaar TM. Survey on deep learning with class imbalance. J Big Data. 2019;6(1):27. https:\/\/doi.org\/10.1186\/s40537-019-0192-5.","journal-title":"J. Big Data"},{"key":"1171_CR15","unstructured":"Andrychowicz M, Denil M, G\u00f3mez S, Hoffman MW, Pfau D, Schaul T, Shillingford B, de Freitas N. Learning to learn by gradient descent by gradient descent. In: Advances in neural information processing systems, vol. 29. https:\/\/proceedings.neurips.cc\/paper\/2016\/hash\/fb87582825f9d28a8d42c5e5e5e8b23d-Abstract.html (2016). Accessed 27 Jul 2024."},{"key":"1171_CR16","unstructured":"Finn C, Abbeel P, Levine S. Model-agnostic meta-learning for fast adaptation of deep networks. In: Proceedings of the 34th international conference on machine learning, pp. 1126\u20131135. https:\/\/proceedings.mlr.press\/v70\/finn17a.html (2017). Accessed 11 Jun 2023."},{"key":"1171_CR17","doi-asserted-by":"publisher","unstructured":"Chen T, Guestrin C. XGBoost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining. KDD \u201916, pp. 785\u20134. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/2939672.2939785 (2016). Accessed 20 Jul 2024.","DOI":"10.1145\/2939672.2939785"},{"key":"1171_CR18","unstructured":"Snell J, Swersky K, Zemel R. Prototypical networks for few-shot learning. In: Advances in neural information processing systems, vol. 30. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2017\/hash\/cb8da6767461f2812ae4290eac7cbc42-Abstract.html (2017). Accessed 30 Jun 2023."},{"key":"1171_CR19","doi-asserted-by":"publisher","unstructured":"Samuel D, Atzmon Y, Chechik G. From generalized zero-shot learning to long-tail with class descriptors. In: Proceedings of the IEEE\/CVF winter conference on applications of computer vision, 2021; pp. 286\u20135. https:\/\/doi.org\/10.1109\/wacv48630.2021.00033.","DOI":"10.1109\/wacv48630.2021.00033"},{"issue":"2","key":"1171_CR20","doi-asserted-by":"publisher","first-page":"1341","DOI":"10.1007\/s10664-019-09779-6","volume":"25","author":"S Patil","year":"2020","unstructured":"Patil S, Ravindran B. Predicting software defect type using concept-based classification. Empir Softw Eng. 2020;25(2):1341\u201378. https:\/\/doi.org\/10.1007\/s10664-019-09779-6.","journal-title":"Empir. Softw. Eng."},{"key":"1171_CR21","unstructured":"Nam J, Song W, Park SH, Tack J, Yun S, Kim J, Shin J. Semi-supervised tabular classification via in-context learning of large language models. https:\/\/openreview.net\/forum?id=r77CeOBO0L (2023). Accessed 27 Mar 2025."},{"key":"1171_CR22","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1007\/s10489-020-01886-y","volume":"51","author":"P Bedi","year":"2021","unstructured":"Bedi P, Gupta N, Jindal V. I-SiamIDS: an improved Siam-IDS for handling class imbalance in network-based intrusion detection systems. Appl Intell. 2021;51:1133\u201351. https:\/\/doi.org\/10.1007\/s10489-020-01886-y.","journal-title":"Appl. Intell."},{"key":"1171_CR23","doi-asserted-by":"publisher","unstructured":"Gesi J, Li J, Ahmed I. An empirical examination of the impact of bias on just-in-time defect prediction. In: Proceedings of the 15th ACM\/IEEE international symposium on empirical software engineering and measurement (ESEM), 2021; pp. 1\u201312. https:\/\/doi.org\/10.1145\/3475716.3475791.","DOI":"10.1145\/3475716.3475791"},{"issue":"7","key":"1171_CR24","doi-asserted-by":"publisher","first-page":"936","DOI":"10.3390\/e24070936","volume":"24","author":"X Wu","year":"2022","unstructured":"Wu X, Wang N. Detecting errors with zero-shot learning. Entropy (Basel, Switzerland). 2022;24(7):936. https:\/\/doi.org\/10.3390\/e24070936.","journal-title":"Entropy (Basel, Switzerland)"},{"key":"1171_CR25","doi-asserted-by":"crossref","unstructured":"Li M, Zhang Y, Han D, Zhou M. Meta-IP: an imbalanced processing model based on meta-learning for IT project extension forecasts. Mathematical Problems in Engineering. 2022.","DOI":"10.1155\/2022\/3140301"},{"key":"1171_CR26","doi-asserted-by":"publisher","unstructured":"Ochal M, Patacchiola M, Storkey A, Vazquez J, Wang S. Few-shot learning with class imbalance. 2021. https:\/\/doi.org\/10.48550\/arxiv.2101.02523.","DOI":"10.48550\/arxiv.2101.02523"},{"issue":"20","key":"1171_CR27","doi-asserted-by":"publisher","first-page":"22511","DOI":"10.1609\/aaai.v38i20.30259","volume":"38","author":"R Zhang","year":"2024","unstructured":"Zhang R, Cheng D, Yang J, Ouyang Y, Wu X, Zheng Y, Jiang C. Pre-trained online contrastive learning for insurance Fraud detection. Proc AAAI Conf Artif Intell. 2024;38(20):22511\u20139. https:\/\/doi.org\/10.1609\/aaai.v38i20.30259.","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"1171_CR28","unstructured":"Shenkar T, Wolf L. Anomaly detection for tabular data with internal contrastive learning. https:\/\/openreview.net\/forum?id=_hszZbt46bT (2021). Accessed 12 Dec 2024."},{"key":"1171_CR29","doi-asserted-by":"publisher","unstructured":"Zhu M, Kobalczyk K, Petrovic A, Nikolic M, Schaar Mvd, Delibasic B, Lio P. Tabular few-shot generalization across heterogeneous feature spaces. 2023. . https:\/\/doi.org\/10.48550\/arXiv.2311.10051. Accessed 12 Dec 2024.","DOI":"10.48550\/arXiv.2311.10051"},{"key":"1171_CR30","unstructured":"Prokhorenkova L, Gusev G, Vorobev A, Dorogush AV, Gulin A. Catboost: unbiased boosting with categorical features. In: Bengio S, Wallach H, Larochelle H, Grauman K, Cesa-Bianchi N, Garnett R, editors. Advances in neural information processing systems; 2018. vol. 31. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2018\/file\/14491b756b3a51daac41c24863285549-Paper.pdf."},{"issue":"6","key":"1171_CR31","doi-asserted-by":"publisher","first-page":"305","DOI":"10.3390\/systems11060305","volume":"11","author":"S Jiang","year":"2023","unstructured":"Jiang S, Dong R, Wang J, Xia M. Credit card fraud detection based on unsupervised attentional anomaly detection network. Systems. 2023;11(6):305. https:\/\/doi.org\/10.3390\/systems11060305.","journal-title":"Systems"},{"issue":"1","key":"1171_CR32","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1186\/s40537-024-00897-7","volume":"11","author":"RKL Kennedy","year":"2024","unstructured":"Kennedy RKL, Villanustre F, Khoshgoftaar TM, Salekshahrezaee Z. Synthesizing class labels for highly imbalanced credit card Fraud detection data. J Big Data. 2024;11(1):38. https:\/\/doi.org\/10.1186\/s40537-024-00897-7.","journal-title":"J Big Data"},{"issue":"4","key":"1171_CR33","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/s42979-023-01809-x","volume":"4","author":"JM Johnson","year":"2023","unstructured":"Johnson JM, Khoshgoftaar TM. Data-centric AI for healthcare Fraud detection. SN Comput Sci. 2023;4(4):389. https:\/\/doi.org\/10.1007\/s42979-023-01809-x.","journal-title":"SN Comput Sci"},{"issue":"1","key":"1171_CR34","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1186\/s40537-019-0225-0","volume":"6","author":"JM Johnson","year":"2019","unstructured":"Johnson JM, Khoshgoftaar TM. Medicare fraud detection using neural networks. J Big Data. 2019;6(1):63. https:\/\/doi.org\/10.1186\/s40537-019-0225-0.","journal-title":"J Big Data"},{"key":"1171_CR35","doi-asserted-by":"publisher","unstructured":"Bauder RA, Khoshgoftaar TM. Medicare Fraud detection using machine learning methods. In: 2017 16th IEEE international conference on machine learning and applications (ICMLA); 2017. pp. 858\u20135. https:\/\/doi.org\/10.1109\/ICMLA.2017.00-48. https:\/\/ieeexplore.ieee.org\/document\/8260744 Accessed 31 Dec 2024.","DOI":"10.1109\/ICMLA.2017.00-48"},{"key":"1171_CR36","doi-asserted-by":"publisher","unstructured":"Hancock J, Khoshgoftaar TM, Johnson JM. The effects of random undersampling for big data medicare Fraud detection. In: 2022 IEEE international conference on Service-Oriented System Engineering (SOSE); 2022. pp. 141\u2013146. https:\/\/doi.org\/10.1109\/SOSE55356.2022.00023. https:\/\/ieeexplore.ieee.org\/abstract\/document\/9912615 Accessed 27 Mar 2025.","DOI":"10.1109\/SOSE55356.2022.00023"},{"issue":"4","key":"1171_CR37","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/s42979-021-00656-y","volume":"2","author":"JM Johnson","year":"2021","unstructured":"Johnson JM, Khoshgoftaar TM. Medical provider embeddings for healthcare Fraud detection. SN Comput Sci. 2021;2(4):276. https:\/\/doi.org\/10.1007\/s42979-021-00656-y.","journal-title":"SN Comput Sci"},{"issue":"6","key":"1171_CR38","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1109\/TSMC.1976.4309523","volume":"SMC\u20136","author":"I Tomek","year":"1976","unstructured":"Tomek I. An experiment with the edited nearest-neighbor rule. IEEE Trans Syst Man Cybern. 1976;SMC\u20136(6):448\u201352. https:\/\/doi.org\/10.1109\/TSMC.1976.4309523.","journal-title":"IEEE Trans Syst Man Cybern."},{"key":"1171_CR39","unstructured":"Mani I, Zhang I. KNN approach to unbalanced data distributions: a case study involving information extraction. In: Proceedings of workshop on learning from imbalanced datasets, 2003; vol. 126(1), pp. 1\u20137."},{"key":"1171_CR40","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.ins.2017.05.008","volume":"409\u2013410","author":"W-C Lin","year":"2017","unstructured":"Lin W-C, Tsai C-F, Hu Y-H, Jhang J-S. Clustering-based undersampling in class-imbalanced data. Inf Sci. 2017;409\u2013410:17\u201326. https:\/\/doi.org\/10.1016\/j.ins.2017.05.008.","journal-title":"Inf Sci"},{"key":"1171_CR41","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP. SMOTE: synthetic minority over-sampling technique. J Artif Intell Res. 2002;16:321\u201357. https:\/\/doi.org\/10.1613\/jair.953.","journal-title":"J Artif Intell Res."},{"issue":"3","key":"1171_CR42","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1109\/TSMC.1972.4309137","volume":"SMC\u20132","author":"DL Wilson","year":"1972","unstructured":"Wilson DL. Asymptotic properties of nearest neighbor rules using edited data. IEEE Trans Syst Man Cybern. 1972;SMC\u20132(3):408\u201321. https:\/\/doi.org\/10.1109\/TSMC.1972.4309137.","journal-title":"IEEE Trans Syst Man Cybern."},{"issue":"1","key":"1171_CR43","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1186\/s40537-023-00869-3","volume":"11","author":"JT Hancock","year":"2024","unstructured":"Hancock JT, Wang H, Khoshgoftaar TM, Liang Q. Data reduction techniques for highly imbalanced medicare Big Data. J Big Data. 2024;11(1):8. https:\/\/doi.org\/10.1186\/s40537-023-00869-3.","journal-title":"J Big Data"},{"issue":"1","key":"1171_CR44","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10994-006-6226-1","volume":"63","author":"P Geurts","year":"2006","unstructured":"Geurts P, Ernst D, Wehenkel L. Extremely randomized trees. Mach Learn. 2006;63(1):3\u201342. https:\/\/doi.org\/10.1007\/s10994-006-6226-1.","journal-title":"Mach Learn"},{"key":"1171_CR45","unstructured":"Ke G, Meng Q, Finley T, Wang T, Chen W, Ma W, Ye Q, Liu T-Y. LightGBM: a highly efficient gradient boosting decision tree. In: Advances in neural information processing systems, 2017; vol. 30. https:\/\/proceedings.neurips.cc\/paper\/2017\/hash\/6449f44a102fde848669bdd9eb6b76fa-Abstract.html Accessed 28 July 2024."},{"issue":"1","key":"1171_CR46","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L. Random forests. Mach Learn. 2001;45(1):5\u201332. https:\/\/doi.org\/10.1023\/A:1010933404324.","journal-title":"Mach Learn"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01171-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-025-01171-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01171-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T17:12:00Z","timestamp":1746292320000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-025-01171-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,3]]},"references-count":46,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1171"],"URL":"https:\/\/doi.org\/10.1186\/s40537-025-01171-0","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,3]]},"assertion":[{"value":"17 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"110"}}