From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detection of Obfuscation Techniques in Android Applications., , , , и . ARES, стр. 57:1-57:9. ACM, (2018)Automatic generation of regular expressions from examples with genetic programming., , , , , и . GECCO (Companion), стр. 1477-1478. ACM, (2012)Visual-similarity-based phishing detection., , и . SecureComm, стр. 22. ACM, (2008)The DU map: a visualization to gain insights into genotype-phenotype mapping and diversity., и . GECCO (Companion), стр. 1705-1712. ACM, (2017)Open world classification of printed invoices., , , и . ACM Symposium on Document Engineering, стр. 187-190. ACM, (2010)Evolution of distributed neural controllers for voxel-based soft robots., , , и . GECCO, стр. 112-120. ACM, (2020)Evolving Modularity in Soft Robots Through an Embodied and Self-Organizing Neural Controller., и . Artif. Life, 28 (3): 322-347 (2022)Less is More: A Call to Focus on Simpler Models in Genetic Programming for Interpretable Machine Learning., , , и . CoRR, (2022)2D-VSR-Sim: A simulation tool for the optimization of 2-D voxel-based soft robots., , , и . SoftwareX, (2020)Explainable Time Series Tree: An Explainable Top-Down Time Series Segmentation Framework., , , и . IEEE Access, (2023)