Author of the publication

Hybrid Particle Swarm Optimization Applied to Recovery Scheduling of Large-Scale Flight Delays.

, , and . ICNC (7), page 634-639. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-performance approximate half and full adder cells using NAND logic gate., , and . IEICE Electron. Express, 16 (6): 20190043 (2019)Defeating Untrustworthy Testing Parties: A Novel Hybrid Clustering Ensemble Based Golden Models-Free Hardware Trojan Detection Method., , , and . IEEE Access, (2019)A Hardware/Software Co-Design Methodology for Adaptive Approximate Computing in clustering and ANN Learning., , , , and . IEEE Open J. Comput. Soc., (2021)Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks., , , , , , , and . IEEE Trans. Emerg. Top. Comput., 11 (1): 153-169 (January 2023)Guest Editorial: Introduction to the Special Issue on Emerging Technologies and Designs for Application-Specific Computing., , and . IEEE Trans. Emerg. Top. Comput., 5 (2): 148-150 (2017)AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption., , , , and . IEEE Trans. Emerg. Top. Comput., 11 (3): 664-678 (July 2023)Optimized Schoolbook Polynomial Multiplication for Compact Lattice-Based Cryptography on FPGA., , , , and . IEEE Trans. Very Large Scale Integr. Syst., 27 (10): 2459-2463 (2019)Deep learning based sferics recognition for AMT data processing in the dead band., , , , , and . CoRR, (2022)3D Invisible Cloak., , , , , and . CoRR, (2020)PTB: Robust physical backdoor attacks against deep neural networks in real world., , , , , , and . Comput. Secur., (2022)