{
"OpenAlex": { "id": "https://openalex.org/T11652", "display_name": "Handling Imbalanced Data in Classification Problems", "description": "This cluster of papers focuses on the challenges and techniques for handling imbalanced data in classification problems. It covers methods such as SMOTE, ROC analysis, cost-sensitive learning, ensemble methods, and their applications in fraud detection. The cluster also discusses the use of precision-recall and boosting algorithms, as well as the effectiveness of random forest in addressing imbalanced datasets.", "keywords": [ "Imbalanced Data", "Classification", "SMOTE", "ROC Analysis", "Cost-Sensitive Learning", "Ensemble Methods", "Fraud Detection", "Precision-Recall", "Boosting", "Random Forest" ], "ids": { "openalex": "https://openalex.org/T11652", "wikipedia": "https://en.wikipedia.org/wiki/Imbalanced_learning" }, "subfield": { "id": "https://openalex.org/subfields/1702", "display_name": "Artificial Intelligence" }, "field": { "id": "https://openalex.org/fields/17", "display_name": "Computer Science" }, "domain": { "id": "https://openalex.org/domains/3", "display_name": "Physical Sciences" }, "siblings": [ { "id": "https://openalex.org/T12072", "display_name": "Active Learning in Machine Learning Research" }, { "id": "https://openalex.org/T12761", "display_name": "Adaptation to Concept Drift in Data Streams" }, { "id": "https://openalex.org/T10237", "display_name": "Advanced Cryptographic Schemes and Protocols" }, { "id": "https://openalex.org/T11307", "display_name": "Advances in Transfer Learning and Domain Adaptation" }, { "id": "https://openalex.org/T11689", "display_name": "Adversarial Robustness in Deep Learning Models" }, { "id": "https://openalex.org/T11512", "display_name": "Anomaly Detection in High-Dimensional Data" }, { "id": "https://openalex.org/T12805", "display_name": "Application of Fuzzy Cognitive Maps in Modeling" }, { "id": "https://openalex.org/T11975", "display_name": "Application of Genetic Programming in Machine Learning" }, { "id": "https://openalex.org/T13734", "display_name": "Artificial Intelligence and Expert Systems" }, { "id": "https://openalex.org/T13904", "display_name": "Artificial Intelligence and Technology Innovation" }, { "id": "https://openalex.org/T12260", "display_name": "Artificial Intelligence in Education and Technology" }, { "id": "https://openalex.org/T12128", "display_name": "Artificial Intelligence in Service Industry" }, { "id": "https://openalex.org/T10906", "display_name": "Artificial Intelligence Planning and Reasoning" }, { "id": "https://openalex.org/T12380", "display_name": "Authorship Attribution and User Profiling in Text" }, { "id": "https://openalex.org/T12262", "display_name": "Automated Detection of Hate Speech and Offensive Language" }, { "id": "https://openalex.org/T13083", "display_name": "Automatic Keyword Extraction from Textual Data" }, { "id": "https://openalex.org/T13629", "display_name": "Automatic Text Simplification and Readability Assessment" }, { "id": "https://openalex.org/T10639", "display_name": "Autonomic Computing and Self-Adaptive Systems" }, { "id": "https://openalex.org/T13623", "display_name": "Compilation and Analysis of Spoken Language Corpora" }, { "id": "https://openalex.org/T10951", "display_name": "Cryptanalysis of Block Ciphers and Hash Functions" }, { "id": "https://openalex.org/T11130", "display_name": "Cryptography and Error-Correcting Codes" }, { "id": "https://openalex.org/T13851", "display_name": "Cyberbiosecurity and Legal Implications of AI Technology" }, { "id": "https://openalex.org/T13898", "display_name": "Cybernetics and Information Theory" }, { "id": "https://openalex.org/T10637", "display_name": "Data Clustering Techniques and Algorithms" }, { "id": "https://openalex.org/T13702", "display_name": "Deep Learning Applications in Healthcare" }, { "id": "https://openalex.org/T12131", "display_name": "Deep Learning for Wireless Signal Classification" }, { "id": "https://openalex.org/T10862", "display_name": "Deep Learning in Medical Image Analysis" }, { "id": "https://openalex.org/T13559", "display_name": "Development and Application of Expert Systems" }, { "id": "https://openalex.org/T12031", "display_name": "Dialogue Act Modeling for Spoken Language Systems" }, { "id": "https://openalex.org/T13674", "display_name": "Digital Image Processing and Artificial Neural Networks" }, { "id": "https://openalex.org/T11902", "display_name": "Effectiveness of Intelligent Tutoring Systems" }, { "id": "https://openalex.org/T14175", "display_name": "Enhancing E-Learning with Intelligent Agents and Analytics" }, { "id": "https://openalex.org/T13514", "display_name": "Experience-Based Knowledge Representation and Management" }, { "id": "https://openalex.org/T12026", "display_name": "Explainable Artificial Intelligence" }, { "id": "https://openalex.org/T13935", "display_name": "Fuzzy Computing and Intelligent Systems" }, { "id": "https://openalex.org/T11574", "display_name": "Game Artificial Intelligence Research" }, { "id": "https://openalex.org/T12814", "display_name": "Gaussian Processes in Machine Learning" }, { "id": "https://openalex.org/T11273", "display_name": "Graph Neural Network Models and Applications" }, { "id": "https://openalex.org/T14351", "display_name": "Inductive Modeling in Scientific Research" }, { "id": "https://openalex.org/T14413", "display_name": "Knowledge Base Graph Embedding for Visual Question Answering" }, { "id": "https://openalex.org/T11424", "display_name": "Language-based Information Flow Security" }, { "id": "https://openalex.org/T11303", "display_name": "Learning and Inference in Bayesian Networks" }, { "id": "https://openalex.org/T12535", "display_name": "Learning with Noisy Labels in Machine Learning" }, { "id": "https://openalex.org/T11010", "display_name": "Logic Programming and Knowledge Representation" }, { "id": "https://openalex.org/T13018", "display_name": "Machine Learning for Earthquake Early Warning Systems" }, { "id": "https://openalex.org/T11598", "display_name": "Machine Learning for Internet Traffic Classification" }, { "id": "https://openalex.org/T12157", "display_name": "Machine Learning for Mineral Prospectivity Mapping" }, { "id": "https://openalex.org/T14064", "display_name": "Machine Learning in Smart Healthcare" }, { "id": "https://openalex.org/T11276", "display_name": "Machine Learning Methods for Solar Radiation Forecasting" }, { "id": "https://openalex.org/T10456", "display_name": "Methods and Techniques for Agent-Based Modeling" }, { "id": "https://openalex.org/T11901", "display_name": "Model-Based Clustering with Mixture Models" }, { "id": "https://openalex.org/T11550", "display_name": "Multi-label Text Classification in Machine Learning" }, { "id": "https://openalex.org/T10028", "display_name": "Natural Language Processing" }, { "id": "https://openalex.org/T10320", "display_name": "Neural Network Fundamentals and Applications" }, { "id": "https://openalex.org/T14381", "display_name": "Neuro-Symbolic Networks in Automation and Robotics" }, { "id": "https://openalex.org/T11612", "display_name": "Optimization Methods in Machine Learning" }, { "id": "https://openalex.org/T13567", "display_name": "Optimization of Big Data Processing and Analysis" }, { "id": "https://openalex.org/T10711", "display_name": "Particle Filtering and Nonlinear Estimation Methods" }, { "id": "https://openalex.org/T12611", "display_name": "Photonic Reservoir Computing for Neural Computation" }, { "id": "https://openalex.org/T10764", "display_name": "Privacy-Preserving Techniques for Data Analysis and Machine Learning" }, { "id": "https://openalex.org/T10126", "display_name": "Program Analysis and Verification Techniques" }, { "id": "https://openalex.org/T10682", "display_name": "Quantum Computing and Simulation" }, { "id": "https://openalex.org/T10020", "display_name": "Quantum Information and Computation" }, { "id": "https://openalex.org/T10462", "display_name": "Reinforcement Learning Algorithms" }, { "id": "https://openalex.org/T14335", "display_name": "Robotics Programming Education for Students" }, { "id": "https://openalex.org/T13650", "display_name": "Scientific Computing and Data Analysis with Python" }, { "id": "https://openalex.org/T10215", "display_name": "Semantic Web and Ontology Development" }, { "id": "https://openalex.org/T10664", "display_name": "Sentiment Analysis and Opinion Mining" }, { "id": "https://openalex.org/T10201", "display_name": "Speech Recognition Technology" }, { "id": "https://openalex.org/T13398", "display_name": "Statistical Computing and Data Analysis in R" }, { "id": "https://openalex.org/T10181", "display_name": "Statistical Machine Translation and Natural Language Processing" }, { "id": "https://openalex.org/T10100", "display_name": "Swarm Intelligence Optimization Algorithms" }, { "id": "https://openalex.org/T11269", "display_name": "Text Compression and Indexing Algorithms" }, { "id": "https://openalex.org/T13062", "display_name": "Theoretical Framework of Cognitive Informatics and Computational Intelligence" }, { "id": "https://openalex.org/T12676", "display_name": "Theory and Applications of Extreme Learning Machines" }, { "id": "https://openalex.org/T10820", "display_name": "Type-2 Fuzzy Logic Systems and Applications" } ], "works_count": 19539, "cited_by_count": 431454, "updated_date": "2024-08-26T05:42:37.938093", "created_date": "2024-01-23" }
}