2020
DOI: 10.1007/978-3-030-47436-2_7
|View full text |Cite
|
Sign up to set email alerts
|

On the Performance of Oversampling Techniques for Class Imbalance Problems

Abstract: Although over 90 oversampling approaches have been developed in the imbalance learning domain, most of the empirical study and application work are still based on the "classical" resampling techniques. In this paper, several experiments on 19 benchmark datasets are set up to study the efficiency of six powerful oversampling approaches, including both "classical" and new ones. According to our experimental results, oversampling techniques that consider the minority class distribution (new ones) perform better i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…Stateful authentication is particularly beneficial for ensuring secure access to servers through firewalls, enhancing efficiency by using tokens or similar methods for continuous authentication. It finds its application in various advanced fields, such as Ad hoc networks, Blockchain technology, and 5G networks [12], [28], [29], [30], [31]. Beyond its conventional use in logical security, No efforts were taken to extend stateful authentication to physical security measures, such as smart gates, aiming to boost efficiency without compromising safety.…”
Section: Efficient Authenticationmentioning
confidence: 99%
“…Stateful authentication is particularly beneficial for ensuring secure access to servers through firewalls, enhancing efficiency by using tokens or similar methods for continuous authentication. It finds its application in various advanced fields, such as Ad hoc networks, Blockchain technology, and 5G networks [12], [28], [29], [30], [31]. Beyond its conventional use in logical security, No efforts were taken to extend stateful authentication to physical security measures, such as smart gates, aiming to boost efficiency without compromising safety.…”
Section: Efficient Authenticationmentioning
confidence: 99%
“…As future work, other anomaly detection techniques, such as the clustering-based local outlier score (CBLOF) [8] and histogrambased outlier score (HBOS) [6] could be included in the analysis. Future work could also consider an extension of this research for engineering datasets [10], especially for the design optimization problems mentioned in our Introduction. Detailed analysis of the feature importance and how the proposed method affects the classification performance in the overlapping region would also be worth studying.…”
Section: Conclusion and Future Researchmentioning
confidence: 99%
“…In this scenario, oversampling techniques are used to generate synthetic samples that represent the original data distribution. Some of the commonly used oversampling techniques are described below SMOTE is one of the widely used oversampling techniques [38].…”
Section: Oversamplingmentioning
confidence: 99%