{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T10:08:46Z","timestamp":1776247726476,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,2,13]],"date-time":"2022-02-13T00:00:00Z","timestamp":1644710400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,13]],"date-time":"2022-02-13T00:00:00Z","timestamp":1644710400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,2,13]]},"DOI":"10.23919\/icact53585.2022.9728938","type":"proceedings-article","created":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T15:27:02Z","timestamp":1647012422000},"page":"447-452","source":"Crossref","is-referenced-by-count":3,"title":["Active constraints selection based on density peak"],"prefix":"10.23919","author":[{"given":"Viet-Vu","family":"Vu","sequence":"first","affiliation":[{"name":"VNU Information Technology Institute, Vietnam National University,Hanoi,Vietnam"}]},{"given":"Byeongnam","family":"Yoon","sequence":"additional","affiliation":[{"name":"Global IT Research Institute GIRI"}]},{"given":"Hong-Quan","family":"Do","sequence":"additional","affiliation":[{"name":"VNU Information Technology Institute, Vietnam National University,Hanoi,Vietnam"}]},{"given":"Hai-Minh","family":"Nguyen","sequence":"additional","affiliation":[{"name":"ICTU &#x2013; University of Information and Communication Technology, Thai Nguyen University,Vietnam"}]},{"given":"Tran-Chung","family":"Dao","sequence":"additional","affiliation":[{"name":"ICTU &#x2013; University of Information and Communication Technology, Thai Nguyen University,Vietnam"}]},{"given":"Cong-Mau","family":"Tran","sequence":"additional","affiliation":[{"name":"Ha Tinh University,Ha Tinh city,Vietnam"}]},{"given":"Doan-Vinh","family":"Tran","sequence":"additional","affiliation":[{"name":"University of Education, Vietnam National University,Hanoi,Vietnam"}]},{"given":"Thi-Nhuong","family":"Phi","sequence":"additional","affiliation":[{"name":"People&#x2019;s Security Academy,Hanoi,Vietnam"}]},{"given":"Viet-Thang","family":"Vu","sequence":"additional","affiliation":[{"name":"Hanoi University of Industry,Hanoi,Vietnam"}]},{"given":"Tien-Dung","family":"Duong","sequence":"additional","affiliation":[{"name":"Vietnam Academy of science and technology,Hanoi,Vietnam"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Active Learning Literature Survey","author":"settles","year":"2009","journal-title":"Computer Sciences Tech nical Report 1648 University of Wisconsin&#x2013;Madison"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1126\/science.1242072"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.01.102"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2016.05.001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.02.001"},{"key":"ref15","first-page":"333","article-title":"Mooney: Active Semi-Supervision for Pairwise Constrained Clustering","author":"basu","year":"2004","journal-title":"SDM"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.10.004"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.10.016"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113690"},{"key":"ref19","first-page":"167","article-title":"Graph-based Clustering with Background Knowledge","author":"viet-vu","year":"2017","journal-title":"SoICT"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014062"},{"key":"ref3","article-title":"Constrained Clustering: Advances in Algorithms, Theory, and Applications, Chapman and Hall\/CRC Data Mining and Knowledge Discovery Series","author":"basu","year":"2008"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-009-0157-y"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2005.1452508"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/400"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20847-8_5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s40745-015-0040-1"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1109\/TNN.2005.845141","article-title":"Survey of clustering algorithms","volume":"16","author":"rui","year":"2005","journal-title":"IEEE Trans Neural Netw"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-020-00734-4"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.2307\/2284239"}],"event":{"name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","location":"PyeongChang Kwangwoon_Do, Korea, Republic of","start":{"date-parts":[[2022,2,13]]},"end":{"date-parts":[[2022,2,16]]}},"container-title":["2022 24th International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9728250\/9728768\/09728938.pdf?arnumber=9728938","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T16:49:58Z","timestamp":1652719798000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9728938\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,13]]},"references-count":20,"URL":"https:\/\/doi.org\/10.23919\/icact53585.2022.9728938","relation":{},"subject":[],"published":{"date-parts":[[2022,2,13]]}}}