Author of the publication

Generating Random SAT Instances: Multiple Solutions could be Predefined and Deeply Hidden.

, , , , , and . J. Artif. Intell. Res., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Straightforward Method to Judge the Completeness of a Polymorphic Gate Set., , , and . CoRR, (2017)Solving online dynamic time-linkage problems under unreliable prediction., , , and . Appl. Soft Comput., (2017)Detecting adversarial examples by positive and negative representations., , , , and . Appl. Soft Comput., (2022)One-time password authentication scheme based on the negative database., and . Eng. Appl. Artif. Intell., (2017)Evolutionary Algorithms with Heuristic Gradient-based Repair for Constrained Optimization., , , , and . SMC, page 1488-1493. IEEE, (2022)Multi-label Adversarial Defense Scheme Based on Negative Correlation Ensemble., , , and . ICSI (2), volume 13969 of Lecture Notes in Computer Science, page 284-294. Springer, (2023)Solving Dynamic 3-SAT Formula: An Empirical Study., , , and . ICDIS, page 134-140. IEEE, (2020)Data Leakage Attack via Backdoor Misclassification Triggers of Deep Learning Models., , , , and . ICDIS, page 61-66. IEEE, (2022)Capacity Abuse Attack of Deep Learning Models Without Need of Label Encodings., , , , , and . IEEE Trans. Artif. Intell., 5 (2): 814-826 (February 2024)An immune genetic algorithm based on immune regulation., , and . IEEE Congress on Evolutionary Computation, page 801-806. IEEE, (2002)