Author of the publication

An Improved Binary Whale Optimization Algorithm for Feature Selection of Network Intrusion Detection.

, , , , , and . IDAACS-SWS, page 10-15. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Roadmapping an emerging technology in clean energy industry: A case study of dimethyl ether development in China., , , , and . IEEM, page 1048-1052. IEEE, (2011)A data-driven approach based on LDA for identifying duplicate bug report., , and . IEEE Conf. on Intelligent Systems, page 686-691. IEEE, (2016)A bibliometric study of China's science and technology policies: 1949-2010., , , , , , and . Scientometrics, 102 (2): 1521-1539 (2015)Managing knowledge sharing in distributed innovation from the perspective of developers: empirical study of open source software projects in China., , , and . Technol. Anal. Strateg. Manag., (2017)Identifying core policy instruments based on structural holes: A case study of China's nuclear energy policy., , and . J. Informetrics, 15 (2): 101145 (2021)Integration of Information Models for Industrial Intemet Based on Extenics., , , and . IDAACS-SWS, page 1-6. IEEE, (2020)Improved method of ant colonies to search independent data transmission routes in WSN., , , and . IDAACS-SWS, page 52-57. IEEE, (2012)Application of Elephant Herd Optimization Algorithm Based on Levy Flight Strategy in Intrusion Detection., , , , , , and . IDAACS-SWS, page 16-20. IEEE, (2018)Network Intrusion Detection Based on Hybrid Rice Algorithm Optimized Extreme Learning Machine., , , , and . IDAACS-SWS, page 149-153. IEEE, (2018)A Linear Chirped Microwave Waveform Generator with a Large Time-Bandwidth Product Based on Optical Heterodyne Detection., , , , , and . ICAIT, page 252-255. IEEE, (2022)