Author of the publication

Differential evolution using mutation strategy with adaptive greediness degree control.

, , , and . GECCO, page 73-80. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Target Detection and Matching for a Pedestrian Tracking System., and . SMC, page 5173-5178. IEEE, (2006)Identifying Video Forgery Process Using Optical Flow., , , , and . IWDW, volume 8389 of Lecture Notes in Computer Science, page 244-257. Springer, (2013)Multi-channel features based automated segmentation of diffusion tensor imaging using an improved FCM with spatial constraints., , , and . Neurocomputing, (2014)Convolutional Neural Network for Resting State EEG Signal Analysis., , , , , and . ICNSC, page 138-143. IEEE, (2019)Secure Shell Remote Access for Virtualized Computing Environment., , , , , , , and . SmartCom, volume 13202 of Lecture Notes in Computer Science, page 123-132. Springer, (2021)Defects Detection System of Medical Gloves Based on Deep Learning., , , , , , , , and . SmartCom, volume 13202 of Lecture Notes in Computer Science, page 101-111. Springer, (2021)Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption., , , and . IEEE Trans. Inf. Forensics Secur., 10 (1): 190-199 (2015)VenusAI: An artificial intelligence platform for scientific discovery on supercomputers., , , , , , , and . J. Syst. Archit., (2022)Fractal nature of highway traffic data., , and . Comput. Math. Appl., 54 (1): 107-116 (2007)Understanding the Health Information Sharing Behavior of Social Media Users: An Empirical Study on WeChat., , and . J. Organ. End User Comput., 33 (5): 180-203 (2021)