Author of the publication

Genetic Algorithm with Multiple Fitness Functions for Generating Adversarial Examples.

, , , , and . CEC, page 1792-1799. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Theoretical foundations of evolutionary computation., , and . Genet. Program. Evolvable Mach., 9 (2): 107-108 (2008)A Straightforward Method to Judge the Completeness of a Polymorphic Gate Set., , , and . CoRR, (2017)Multi-label Adversarial Defense Scheme Based on Negative Correlation Ensemble., , , and . ICSI (2), volume 13969 of Lecture Notes in Computer Science, page 284-294. Springer, (2023)Evolutionary Algorithms with Heuristic Gradient-based Repair for Constrained Optimization., , , , and . SMC, page 1488-1493. IEEE, (2022)Detecting adversarial examples by positive and negative representations., , , , and . Appl. Soft Comput., (2022)Solving online dynamic time-linkage problems under unreliable prediction., , , and . Appl. Soft Comput., (2017)Capacity Abuse Attack of Deep Learning Models Without Need of Label Encodings., , , , , and . IEEE Trans. Artif. Intell., 5 (2): 814-826 (February 2024)One-time password authentication scheme based on the negative database., and . Eng. Appl. Artif. Intell., (2017)An immune genetic algorithm based on immune regulation., , and . IEEE Congress on Evolutionary Computation, page 801-806. IEEE, (2002)Combining multipopulation evolutionary algorithms with memory for dynamic optimization problems., , and . IEEE Congress on Evolutionary Computation, page 2047-2054. IEEE, (2014)