{"id":"https://openalex.org/W2030977848","doi":"https://doi.org/10.1109/grc.2012.6468566","title":"Tackle three practical classification problems via Ensemble Learning","display_name":"Tackle three practical classification problems via Ensemble Learning","publication_year":2012,"publication_date":"2012-08-01","ids":{"openalex":"https://openalex.org/W2030977848","doi":"https://doi.org/10.1109/grc.2012.6468566","mag":"2030977848"},"language":"en","primary_location":{"id":"doi:10.1109/grc.2012.6468566","is_oa":false,"landing_page_url":"https://doi.org/10.1109/grc.2012.6468566","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Granular Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080213086","display_name":"Xuzhou Li","orcid":"https://orcid.org/0000-0003-0266-4014"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]},{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xuzhou Li","raw_affiliation_strings":["School of Computer Science & Technology, Shandong University","School of Computer Science and Technology, Shandong University, Jinan, China#TAB#"],"affiliations":[{"raw_affiliation_string":"School of Computer Science & Technology, Shandong University","institution_ids":["https://openalex.org/I80143920"]},{"raw_affiliation_string":"School of Computer Science and Technology, Shandong University, Jinan, China#TAB#","institution_ids":["https://openalex.org/I154099455"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5080213086"],"corresponding_institution_ids":["https://openalex.org/I154099455","https://openalex.org/I80143920"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13358124,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"11","issue":null,"first_page":"248","last_page":"252"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adaboost","display_name":"AdaBoost","score":0.8211125135421753},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.8078659772872925},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7844393253326416},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.663611650466919},{"id":"https://openalex.org/keywords/categorization","display_name":"Categorization","score":0.6374425888061523},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6271222233772278},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.5934171676635742},{"id":"https://openalex.org/keywords/string","display_name":"String (physics)","score":0.5512625575065613},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5410318374633789},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.49932050704956055},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4718991219997406},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36165952682495117},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.34264349937438965},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07349461317062378}],"concepts":[{"id":"https://openalex.org/C141404830","wikidata":"https://www.wikidata.org/wiki/Q2823869","display_name":"AdaBoost","level":3,"score":0.8211125135421753},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.8078659772872925},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7844393253326416},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.663611650466919},{"id":"https://openalex.org/C94124525","wikidata":"https://www.wikidata.org/wiki/Q912550","display_name":"Categorization","level":2,"score":0.6374425888061523},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6271222233772278},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.5934171676635742},{"id":"https://openalex.org/C157486923","wikidata":"https://www.wikidata.org/wiki/Q1376436","display_name":"String (physics)","level":2,"score":0.5512625575065613},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5410318374633789},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.49932050704956055},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4718991219997406},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36165952682495117},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.34264349937438965},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07349461317062378},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C37914503","wikidata":"https://www.wikidata.org/wiki/Q156495","display_name":"Mathematical physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/grc.2012.6468566","is_oa":false,"landing_page_url":"https://doi.org/10.1109/grc.2012.6468566","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Granular Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1930624869","https://openalex.org/W1988790447","https://openalex.org/W2020816856","https://openalex.org/W2087347434","https://openalex.org/W2100805904","https://openalex.org/W2107386336","https://openalex.org/W2115629999","https://openalex.org/W2124225821","https://openalex.org/W2145001882","https://openalex.org/W2149206465","https://openalex.org/W2153635508","https://openalex.org/W2155806188","https://openalex.org/W2158441306","https://openalex.org/W2167055186","https://openalex.org/W2167917621","https://openalex.org/W2624452117","https://openalex.org/W4214926090","https://openalex.org/W4230674625","https://openalex.org/W4237791300","https://openalex.org/W4239808474","https://openalex.org/W4248437541","https://openalex.org/W6640462745","https://openalex.org/W6678167290","https://openalex.org/W6682163256","https://openalex.org/W6683036876"],"related_works":["https://openalex.org/W2327035729","https://openalex.org/W2348748958","https://openalex.org/W3039673966","https://openalex.org/W1538046993","https://openalex.org/W2884325279","https://openalex.org/W1570592793","https://openalex.org/W1525436954","https://openalex.org/W2385662756","https://openalex.org/W2585372724","https://openalex.org/W2241444561"],"abstract_inverted_index":{"News":[0],"Categorization,":[1],"Intrusion":[2],"Detection":[3,6],"and":[4,15,40,80,114,120],"Spam":[5],"are":[7],"three":[8,46,55,61],"practical":[9],"problems":[10,50],"I":[11],"in":[12],"Data":[13],"Mining":[14],"Cybersecurity.":[16],"Their":[17],"focus":[18],"is":[19,75],"on":[20],"string":[21,47],"sequences":[22,48],"analysis":[23,49],"towards":[24],"application":[25],"of":[26,37,72,101],"knowledge":[27],"discovery":[28],"techniques":[29],"for":[30],"protecting":[31],"personal":[32],"computer":[33],"information":[34],"by":[35],"means":[36],"detection,":[38],"prevention,":[39],"response":[41],"to":[42,76,90],"various":[43],"attacks.":[44],"These":[45,84],"could":[51,96],"be":[52,97],"treated":[53],"as":[54,116],"classification":[56,131],"problems.":[57],"To":[58],"tackle":[59],"these":[60],"classifications":[62],"problems,":[63],"we":[64,110],"propose":[65],"a":[66],"Ensemble":[67],"Learning":[68],"method.":[69],"The":[70],"idea":[71],"ensemble":[73,85,125],"learning":[74,126],"employ":[77],"multiple":[78,88],"learners":[79],"combine":[81],"their":[82],"predictions.":[83],"methods":[86],"utilize":[87,111],"models":[89],"obtain":[91],"better":[92],"predictive":[93],"performance":[94,132],"than":[95],"obtained":[98],"from":[99],"any":[100],"the":[102,108,117,121,130],"constituent":[103],"models[13],":[104],"[14],":[105],"[16].":[106],"In":[107],"tasks,":[109],"(LDA-,SK-)SVM,":[112],"(LDA-,SK)GP":[113],"(LDA-,SK-)AdaBoost":[115],"weak":[118],"classifiers,":[119],"experiments":[122],"shows":[123],"that":[124],"method":[127],"can":[128],"improve":[129],"significantly.":[133]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
