Author of the publication

Artificial immune system application for solving dynamic optimization problems.

, , , and . IJCNN, page 2906-2911. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Full Recognition of Massive Products Based on Property Set., , , and . BigData Congress, page 294-301. IEEE Computer Society, (2013)An Approach to Reducing Implicit Privacy Disclosure in Spatial-Temporal Big Data Publishing., , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1112-1117. IEEE, (2018)Features that Matter: Feature Selection for On-line Stalling Prediction in Encrypted Video Streaming, , , , and . 2nd International Workshop on Network Intelligence (NI), Paris, France, (April 2019)ViCrypt to the Rescue: Real-time, Machine-Learning-driven Video-QoE Monitoring for Encrypted Streaming Traffic, , , , and . IEEE Transactions on Network and Service Management, 17 (4): 2007 - 2023 (December 2020)Routing in optical transport networks with deep reinforcement learning., , , , , , and . JOCN, 11 (11): 547-558 (2019)KG2Code: Correct Code Examples Mining Service Based on Knowledge Graph for Fixing API Misuses., , , , and . ICSOC, volume 13121 of Lecture Notes in Computer Science, page 875-882. Springer, (2021)Keywords Guided Method Name Generation., and . ICPC, page 196-206. IEEE, (2021)CSRS: code search with relevance matching and semantic matching., and . ICPC, page 533-542. ACM, (2022)MisuseHint: A Service for API Misuse Detection Based on Building Knowledge Graph from Documentation and Codebase., , , , , and . ICWS, page 246-255. IEEE, (2022)Retrieve-Guided Commit Message Generation with Semantic Similarity And Disparity., , , , and . APSEC, page 357-366. IEEE, (2022)