Author of the publication

A Many-Objective Ensemble Optimization Algorithm for the Edge Cloud Resource Scheduling Problem.

, , , , , and . IEEE Trans. Mob. Comput., 23 (2): 1330-1346 (February 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Malicious Code Detection System Based on Convolutional Neural Networks., , , , , and . CSAI/ICIMT, page 86-89. ACM, (2018)Trusted connection architecture of Internet of Things oriented to perception layer., , , , , and . Int. J. Wirel. Mob. Comput., 12 (3): 224-231 (2017)Embedded Real-time System Trusted Protection Technology for Supply Chain Scenarios., , , and . ICCNS, page 64-68. ACM, (2022)Identity-based Linkable Blind Ring Signature Scheme on Lattice., , , , , , , and . ICCNS, page 51-57. ACM, (2022)Fast identification method of malicious code based on extreme learning machine., , , and . ICSCA, page 55-60. ACM, (2022)Character-level domain name generation algorithm based on ED-GAN., , , and . ICSCA, page 198-205. ACM, (2022)Detection of Malicious Domain Names Based on Hidden Markov Model., , , , , and . DSC, page 659-664. IEEE, (2018)Trusted connection architecture of electric IoT., , and . ICSCA, page 129-135. ACM, (2022)A method of core concept extraction based on semantic-weight ranking., , , and . Concurr. Comput. Pract. Exp., (2022)An Effective Data Balancing Strategy Based on Swarm Intelligence Algorithm for Malicious Code Detection and Classification., , , and . BIC-TA (1), volume 1565 of Communications in Computer and Information Science, page 160-173. Springer, (2021)