From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

IDS Vulnerability Analysis Using Genertia Red Teams.. Security and Management, стр. 171-176. CSREA Press, (2003)Distributed Steady-State Neuro-Evolutionary Path Planning in Non-Stationary Environments Using Adaptive Replacement.. GECCO, стр. 58-65. Morgan Kaufmann, (2000)Solving Constraint Satisfaction Problems Using a Genetic/Systematic Search Hybrid That Realizes When to Quit., и . ICGA, стр. 122-129. Morgan Kaufmann, (1995)Solving Distributed Asymmetric CSPs via a Society of Hill-Climbers., и . IC-AI, стр. 949-953. CSREA Press, (2002)OffLanDat: A Community Based Implicit Offensive Language Dataset Generated by Large Language Model Through Prompt Engineering., , , , , , , , , и . CoRR, (2024)A Transformer-Based Language Model for Sentiment Classification and Cross-Linguistic Generalization: Empowering Low-Resource African Languages., , , , и . AIBThings, стр. 1-5. IEEE, (2023)GESLIC: genetic and evolutionary-based short-length iris codes., , и . ACM Southeast Regional Conference, стр. 201-204. ACM, (2011)An evaluation of negative selection algorithm with constraint-based detectors., и . ACM Southeast Regional Conference, стр. 134-139. ACM, (2006)An artificial immunity approach to malware detection in a mobile platform., , и . EURASIP J. Information Security, (2017)An artificial immune system for phishing detection., , , , и . IEEE Congress on Evolutionary Computation, стр. 1-7. IEEE, (2012)