Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic generation of regular expressions from examples with genetic programming., , , , , and . GECCO (Companion), page 1477-1478. ACM, (2012)Detection of Obfuscation Techniques in Android Applications., , , , and . ARES, page 57:1-57:9. ACM, (2018)The DU map: a visualization to gain insights into genotype-phenotype mapping and diversity., and . GECCO (Companion), page 1705-1712. ACM, (2017)Visual-similarity-based phishing detection., , and . SecureComm, page 22. ACM, (2008)Open world classification of printed invoices., , , and . ACM Symposium on Document Engineering, page 187-190. ACM, (2010)Explainable Time Series Tree: An Explainable Top-Down Time Series Segmentation Framework., , , and . IEEE Access, (2023)Automatic Search-and-Replace From Examples With Coevolutionary Genetic Programming., , , and . IEEE Trans. Cybern., 51 (5): 2612-2624 (2021)Less is More: A Call to Focus on Simpler Models in Genetic Programming for Interpretable Machine Learning., , , and . CoRR, (2022)Automatic Integrity Checks for Remote Web Resources., and . IEEE Internet Comput., 10 (6): 56-62 (2006)Evolution of distributed neural controllers for voxel-based soft robots., , , and . GECCO, page 112-120. ACM, (2020)