{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T18:03:43Z","timestamp":1765994623187,"version":"build-2065373602"},"reference-count":50,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61976239","71401045","71571052","71871069"],"award-info":[{"award-number":["61976239","71401045","71571052","71871069"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013139","name":"Humanities and Social Science Fund of Ministry of Education of China","doi-asserted-by":"publisher","award":["18YJAZH137"],"award-info":[{"award-number":["18YJAZH137"]}],"id":[{"id":"10.13039\/501100013139","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100018976","name":"Guangzhou Office of Philosophy and Social Science","doi-asserted-by":"publisher","award":["2018GZGJ48"],"award-info":[{"award-number":["2018GZGJ48"]}],"id":[{"id":"10.13039\/100018976","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1016\/j.ins.2019.08.033","type":"journal-article","created":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T11:05:23Z","timestamp":1565607923000},"page":"313-338","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":22,"special_numbering":"C","title":["Evaluating the reliability of sources of evidence with a two-perspective approach in classification problems based on evidence theory"],"prefix":"10.1016","volume":"507","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3315-4447","authenticated-orcid":false,"given":"Jie","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Rui","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Zhenning","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Deyu","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Wenhong","family":"Wei","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.ins.2019.08.033_bib0001","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1214\/aoms\/1177698950","article-title":"Upper and lower probabilities induced by a multivalued mapping","volume":"38","author":"Dempster","year":"1967","journal-title":"Ann. Math. Stat."},{"key":"10.1016\/j.ins.2019.08.033_bib0002","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1016\/j.ins.2016.01.033","article-title":"An improved method to construct basic probability assignment based on the confusion matrix for classification problem","volume":"340\u2013341","author":"Deng","year":"2016","journal-title":"Inf. Sci."},{"issue":"2\u20133","key":"10.1016\/j.ins.2019.08.033_bib0003","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1016\/j.artint.2007.05.008","article-title":"Conjunctive and disjunctive combination of belief functions induced by nondistinct bodies of evidence","volume":"172","author":"Den\u0153ux","year":"2008","journal-title":"Artif. Intell."},{"key":"10.1016\/j.ins.2019.08.033_bib0004","first-page":"153","article-title":"Revisiting the notion of conflicting belief functions","author":"Destercke","year":"2012","journal-title":"Belief Funct."},{"issue":"07","key":"10.1016\/j.ins.2019.08.033_bib0005","doi-asserted-by":"crossref","first-page":"943","DOI":"10.1142\/S0218194010005018","article-title":"Reasoning under uncertainty for shill detection in online auctions using Dempster\u2013Shafer theory","volume":"20","author":"Dong","year":"2010","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"issue":"3","key":"10.1016\/j.ins.2019.08.033_bib0006","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1080\/03081078608934937","article-title":"A set-theoretic view of belief functions logical operations and approximations by fuzzy sets","volume":"12","author":"Dubois","year":"1986","journal-title":"Int. J. General Syst."},{"issue":"1","key":"10.1016\/j.ins.2019.08.033_bib0007","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1109\/TSMCB.2003.817056","article-title":"Assessing sensor reliability for multisensor data fusion within the transferable belief model","volume":"34","author":"Elouedi","year":"2004","journal-title":"IEEE Trans. Syst. Man Cybern. Part B"},{"issue":"5","key":"10.1016\/j.ins.2019.08.033_bib0008","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1016\/j.patrec.2005.08.025","article-title":"Fault diagnosis of machines based on D\u2013S evidence theory. Part 1: D\u2013S evidence theory and its improvement","volume":"27","author":"Fan","year":"2006","journal-title":"Pattern Recognit. Lett."},{"key":"10.1016\/j.ins.2019.08.033_bib0009","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1016\/j.inffus.2013.04.010","article-title":"On the use of a multi-criteria approach for reliability estimation in belief function theory","volume":"18","author":"Frikha","year":"2014","journal-title":"Inf. Fusion"},{"issue":"5","key":"10.1016\/j.ins.2019.08.033_bib0010","doi-asserted-by":"crossref","first-page":"970","DOI":"10.1109\/TSMCB.2006.872269","article-title":"Evaluating sensor reliability in classification problems based on evidence theory","volume":"36","author":"Guo","year":"2006","journal-title":"IEEE Trans. Syst. Man Cybern. Part B"},{"issue":"3","key":"10.1016\/j.ins.2019.08.033_bib0011","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/S1566-2535(02)00076-3","article-title":"Are alternatives to dempster's rule of combination real alternatives?: Comments on \u201cAbout the belief function combination and the conflict management problem\u201d\u2014-Lefevre et\u00a0al.","volume":"3","author":"Haenni","year":"2002","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.ins.2019.08.033_bib0012","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1016\/j.engappai.2016.10.017","article-title":"Dempster\u2013Shafer evidence theory for multi-bearing faults diagnosis","volume":"57","author":"Hui","year":"2017","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"9","key":"10.1016\/j.ins.2019.08.033_bib0013","doi-asserted-by":"crossref","first-page":"1509","DOI":"10.3390\/s16091509","article-title":"Sensor data fusion with Z-numbers and its application in fault diagnosis","volume":"16","author":"Jiang","year":"2016","journal-title":"Sensors"},{"key":"10.1016\/j.ins.2019.08.033_bib0014","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/s10100-013-0334-3","article-title":"Combining sources of evidence with reliability and importance for decision making","volume":"24","author":"Jiao","year":"2013","journal-title":"Central Eur. J. Oper. Res."},{"issue":"2","key":"10.1016\/j.ins.2019.08.033_bib0015","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/S1566-2535(01)00026-4","article-title":"A new distance between two bodies of evidence","volume":"2","author":"Jousselme","year":"2001","journal-title":"Inf. Fusion"},{"issue":"2","key":"10.1016\/j.ins.2019.08.033_bib0016","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1016\/j.patcog.2014.08.010","article-title":"A Dempster\u2013Shafer theory based combination of handwriting recognition systems with multiple rejection strategies","volume":"48","author":"Kessentini","year":"2015","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.ins.2019.08.033_bib0017","series-title":"Proc. Workshop Theory of Belief Functions","first-page":"1","article-title":"Automatic discounting rate computation using a dissent criterion","author":"Klein","year":"2010"},{"key":"10.1016\/j.ins.2019.08.033_bib0018","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1016\/j.dss.2013.06.012","article-title":"How to preserve the conflict as an alarm in the combination of belief functions?","volume":"56","author":"Lef\u00e8vre","year":"2013","journal-title":"Decis. Support Syst."},{"issue":"4","key":"10.1016\/j.ins.2019.08.033_bib0019","doi-asserted-by":"crossref","first-page":"960","DOI":"10.1109\/TITS.2015.2494017","article-title":"ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks","volume":"17","author":"Li","year":"2016","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"2","key":"10.1016\/j.ins.2019.08.033_bib0020","doi-asserted-by":"crossref","first-page":"48","DOI":"10.4018\/IJTHI.2016040104","article-title":"Wang, ds evidence theory based trust detection scheme in wireless sensor networks","volume":"12","author":"K.","year":"2016","journal-title":"Int. J. Technol. Hum. Interact."},{"issue":"3","key":"10.1016\/j.ins.2019.08.033_bib0021","doi-asserted-by":"crossref","first-page":"1235","DOI":"10.1109\/TIP.2018.2875363","article-title":"Online data organizer: micro-video categorization by structure-guided multimodal dictionary learning","volume":"28","author":"Liu","year":"2018","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.ins.2019.08.033_bib0022","series-title":"Proc. 25th ACM International Conference on Multimedia","first-page":"970","article-title":"Towards micro-video understanding by joint sequential-sparse modeling","author":"Liu","year":"2017"},{"issue":"11","key":"10.1016\/j.ins.2019.08.033_bib0023","doi-asserted-by":"crossref","first-page":"909","DOI":"10.1016\/j.artint.2006.05.002","article-title":"Analyzing the degree of conflict among belief functions","volume":"170","author":"Liu","year":"2006","journal-title":"Artif. Intell."},{"issue":"1","key":"10.1016\/j.ins.2019.08.033_bib0024","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.dss.2011.06.002","article-title":"Combination of sources of evidence with different discounting factors based on a new dissimilarity measure","volume":"52","author":"Liu","year":"2011","journal-title":"Decis. Support Syst."},{"issue":"5","key":"10.1016\/j.ins.2019.08.033_bib0025","doi-asserted-by":"crossref","first-page":"1093","DOI":"10.1016\/j.ijar.2014.02.007","article-title":"New distances between bodies of evidence based on dempsterian specialization matrices and their consistency with the conjunctive combination rule","volume":"55","author":"Loudahi","year":"2014","journal-title":"Int. J. Approx. Reason."},{"key":"10.1016\/j.ins.2019.08.033_bib0026","series-title":"Proc. Web Congress, 2009. LA-WEB'09","first-page":"185","article-title":"Feature extraction for fraud detection in electronic marketplaces","author":"Maranzato","year":"2009"},{"key":"10.1016\/j.ins.2019.08.033_bib0027","series-title":"Proc. 25th ACM International Conference on Multimedia","first-page":"1192","article-title":"Enhancing micro-video understanding by harnessing external sounds","author":"Nie","year":"2017"},{"issue":"4","key":"10.1016\/j.ins.2019.08.033_bib0028","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1016\/j.inffus.2008.04.001","article-title":"Credit card fraud detection: a fusion approach using Dempster\u2013Shafer theory and Bayesian learning","volume":"10","author":"Panigrahi","year":"2009","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.ins.2019.08.033_bib0029","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.ins.2019.01.053","article-title":"A novel method for classification of BCI multi-class motor imagery task based on Dempster\u2013Shafer theory","volume":"484","author":"Razi","year":"2019","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2019.08.033_bib0030","series-title":"Proc. Seventh International Conference on Information Fusion","first-page":"1158","article-title":"Reliability in information fusion: literature survey","author":"Rogova","year":"2004"},{"key":"10.1016\/j.ins.2019.08.033_bib0031","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/j.ins.2018.03.001","article-title":"How to decide when the sources of evidence are unreliable: a multi-criteria discounting approach in the Dempster\u2013Shafer theory","volume":"448\u2013449","author":"Sarabi-Jamab","year":"2018","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2019.08.033_bib0032","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.knosys.2013.08.030","article-title":"Information-based dissimilarity assessment in Dempster\u2013Shafer theory","volume":"54","author":"Sarabi-Jamab","year":"2013","journal-title":"Knowl. Based Syst."},{"issue":"3","key":"10.1016\/j.ins.2019.08.033_bib0033","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1016\/j.ijar.2010.10.004","article-title":"Conflict management in dempster\u2013shafer theory using the degree of falsity","volume":"52","author":"Schubert","year":"2011","journal-title":"Int. J. Approx. Reason."},{"year":"1976","series-title":"A Mathematical Theory of Evidence","author":"Shafer","key":"10.1016\/j.ins.2019.08.033_bib0034"},{"key":"10.1016\/j.ins.2019.08.033_bib0035","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1016\/j.ins.2016.01.080","article-title":"A multicriteria approach for analysis of conflicts in evidence theory","volume":"346\u2013347","author":"Silva","year":"2016","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2019.08.033_bib0036","unstructured":"F. Smarandache, J. Dezert, Advances and applications of DSMT for information fusion (Collected works), second volume: cCollected works (Infinite study, 2006)."},{"key":"10.1016\/j.ins.2019.08.033_bib0037","series-title":"Proc. Information Fusion (FUSION) 2010 13th Conference on","first-page":"1","article-title":"Fusion of sources of evidence with different importances and reliabilities","author":"Smarandache","year":"2010"},{"issue":"5","key":"10.1016\/j.ins.2019.08.033_bib0038","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1109\/34.55104","article-title":"The combination of evidence in the transferable belief model","volume":"12","author":"Smets","year":"1990","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"2","key":"10.1016\/j.ins.2019.08.033_bib0039","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/0004-3702(94)90026-4","article-title":"The transferable belief model","volume":"66","author":"Smets","year":"1994","journal-title":"Artif. Intell."},{"key":"10.1016\/j.ins.2019.08.033_bib0040","series-title":"Proc. 38th International ACM SIGIR Conference on Research and Development in Information Retrieval","first-page":"213","article-title":"Multiple social network learning and its application in volunteerism tendency prediction","author":"Song","year":"2015"},{"key":"10.1016\/j.ins.2019.08.033_bib0041","series-title":"Proc. 24th International Joint Conference on Artificial Intelligence","article-title":"Interest inference via structure-constrained multi-source multi-task learning","author":"Song","year":"2015"},{"key":"10.1016\/j.ins.2019.08.033_bib0042","doi-asserted-by":"crossref","first-page":"542","DOI":"10.1016\/j.ins.2018.07.051","article-title":"Fuzzy integrated Bayesian Dempster\u2013Shafer theory to defend cross-layer heterogeneity attacks in communication network of smart grid","volume":"478","author":"Velusamy","year":"2019","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2019.08.033_bib0043","series-title":"Proc. European Conference on Computer Vision (ECCV)","first-page":"451","article-title":"Dividing and aggregating network for multi-view action recognition","author":"Wang","year":"2018"},{"issue":"2","key":"10.1016\/j.ins.2019.08.033_bib0044","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/0020-0255(87)90007-7","article-title":"On the Dempster\u2013Shafer framework and new combination rules","volume":"41","author":"Yager","year":"1987","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2019.08.033_bib0045","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.artint.2013.09.003","article-title":"Evidential reasoning rule for evidence combination","volume":"205","author":"Yang","year":"2013","journal-title":"Artif. Intell."},{"issue":"8","key":"10.1016\/j.ins.2019.08.033_bib0046","doi-asserted-by":"crossref","first-page":"1197","DOI":"10.1016\/j.ijar.2013.04.002","article-title":"Discounted combination of unreliable evidence using degree of disagreement","volume":"54","author":"Yang","year":"2013","journal-title":"Int. J. Approx. Reason."},{"issue":"1","key":"10.1016\/j.ins.2019.08.033_bib0047","doi-asserted-by":"crossref","first-page":"113","DOI":"10.3390\/s16010113","article-title":"Modeling sensor reliability in fault diagnosis based on evidence theory","volume":"16","author":"Yuan","year":"2016","journal-title":"Sensors"},{"issue":"3","key":"10.1016\/j.ins.2019.08.033_bib0048","first-page":"81","article-title":"Review of a mathematical theory of evidence","volume":"5","author":"Zadeh","year":"1984","journal-title":"AI Mag."},{"key":"10.1016\/j.ins.2019.08.033_bib0049","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.dss.2016.04.003","article-title":"Extracting and reasoning about implicit behavioral evidences for detecting fraudulent online transactions in e-Commerce","volume":"86","author":"Zhao","year":"2016","journal-title":"Decis. Support Syst."},{"key":"10.1016\/j.ins.2019.08.033_bib0050","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/j.ins.2016.05.039","article-title":"A novel combination method for conflicting evidence based on inconsistent measurements","volume":"367\u2013368","author":"Zhao","year":"2016","journal-title":"Inf. Sci."}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S002002551930773X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S002002551930773X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T13:40:54Z","timestamp":1762177254000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S002002551930773X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1]]},"references-count":50,"alternative-id":["S002002551930773X"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2019.08.033","relation":{},"ISSN":["0020-0255"],"issn-type":[{"type":"print","value":"0020-0255"}],"subject":[],"published":{"date-parts":[[2020,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Evaluating the reliability of sources of evidence with a two-perspective approach in classification problems based on evidence theory","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2019.08.033","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2019 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}