From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

IDS Vulnerability Analysis Using Genertia Red Teams.. Security and Management, стр. 171-176. CSREA Press, (2003)Solving Constraint Satisfaction Problems Using a Genetic/Systematic Search Hybrid That Realizes When to Quit., и . ICGA, стр. 122-129. Morgan Kaufmann, (1995)Distributed Steady-State Neuro-Evolutionary Path Planning in Non-Stationary Environments Using Adaptive Replacement.. GECCO, стр. 58-65. Morgan Kaufmann, (2000)Solving Distributed Asymmetric CSPs via a Society of Hill-Climbers., и . IC-AI, стр. 949-953. CSREA Press, (2002)An artificial immunity approach to malware detection in a mobile platform., , и . EURASIP J. Information Security, (2017)The Adversarial UFP/UFN Attack: A New Threat to ML-based Fake News Detection Systems?, , , , и . SSCI, стр. 1523-1527. IEEE, (2020)A Comparison of Genetic & Swarm Intelligence-Based Feature Selection Algorithms for Author Identification., и . SSCI, стр. 1731-1738. IEEE, (2020)An artificial immune system for phishing detection., , , , и . IEEE Congress on Evolutionary Computation, стр. 1-7. IEEE, (2012)OffLanDat: A Community Based Implicit Offensive Language Dataset Generated by Large Language Model Through Prompt Engineering., , , , , , , , , и . CoRR, (2024)GESLIC: genetic and evolutionary-based short-length iris codes., , и . ACM Southeast Regional Conference, стр. 201-204. ACM, (2011)