Author of the publication

Learnability and robustness of shallow neural networks learned by a performance-driven BP and a variant of PSO for edge decision-making.

, , , , and . Neural Comput. Appl., 33 (20): 13809-13830 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improved Neural Network Model for the Two-Page Crossing Number Problem., , and . IEEE Trans. Neural Networks, 17 (6): 1642-1646 (2006)Genetic algorithms for the 2-page book drawing problem of graphs., , and . J. Heuristics, 13 (1): 77-93 (2007)A Novel Approach for Detecting Cyberattacks in Embedded Systems Based on Anomalous Patterns of Resource Utilization-Part I., , , , and . IEEE Access, (2021)Learn to Recognize Unknown SAR Targets From Reflection Similarity., , , and . IEEE Geosci. Remote. Sens. Lett., (2022)A Novel Navigation System for an Autonomous Mobile Robot in an Uncertain Environment., , and . CoRR, (2020)A heuristically self-organised Linguistic Attribute Deep Learning for edge intelligence., and . Int. J. Mach. Learn. Cybern., 13 (9): 2559-2579 (2022)A Comprehensive Obstacle Avoidance System of Mobile Robots Using an Adaptive Threshold Clustering and the Morphin Algorithm., , and . UKCI, volume 840 of Advances in Intelligent Systems and Computing, page 312-324. Springer, (2018)The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence., , , , , , and . CEC, page 1015-1021. IEEE, (2016)Online Anomaly Detection of Time Series at Scale., , , , and . CyberSA, page 1-8. IEEE, (2019)Bisociation networks analysis for business process., and . Int. J. Machine Learning & Cybernetics, 4 (5): 419-426 (2013)