Author of the publication

Machine Learning Methods for Industrial Protocol Security Analysis: Issues, Taxonomy, and Directions.

, , , , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The genome sequence of drosophila melanogaster, , , , , , , , , and 185 other author(s). Science, 287 (5461): 2185--2195 (2000)Joint modeling of preventive maintenance and quality improvement for deteriorating single-machine manufacturing systems., , and . Comput. Ind. Eng., (2016)Modeling and optimizing maintenance schedule for energy systems subject to degradation., , , and . Comput. Ind. Eng., 63 (3): 607-614 (2012)Optimal Design of Water Distribution Networks by Discrete State Transition Algorithm. CoRR, (2013)Improved Canonical Dual Algorithms for the Maxcut Problem. CoRR, (2012)Global solutions to a class of CEC benchmark constrained optimization problems., , and . Optim. Lett., 10 (3): 457-472 (2016)Soft actor-critic DRL algorithm for interval optimal dispatch of integrated energy systems with uncertainty in demand response and renewable energy., , , and . Eng. Appl. Artif. Intell., 127 (Part A): 107230 (January 2024)An interactive feature selection method based on multi-step state transition algorithm for high-dimensional data., , , and . Knowl. Based Syst., (December 2023)Functional deep echo state network improved by a bi-level optimization approach for multivariate time series classification., , , , , , and . Appl. Soft Comput., (2021)Dynamic multi-objective optimization and fuzzy AHP for copper removal process of zinc hydrometallurgy., , , , and . Appl. Soft Comput., (2022)