Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mutation with Local Searching and Elite Inheritance Mechanism in Multi-Objective Optimization Algorithm: A Case Study in Software Product Line., , , , , , and . International Journal of Software Engineering and Knowledge Engineering, 29 (9): 1347-1378 (2019)A Parallel Framework of Combining Satisfiability Modulo Theory with Indicator-Based Evolutionary Algorithm for Configuring Large and Real Software Product Lines., , , , , and . International Journal of Software Engineering and Knowledge Engineering, 29 (4): 489-513 (2019)Coordinated Control Strategy of Virtual Synchronous Generator Based on Adaptive Moment of Inertia and Virtual Impedance., , , , and . IEEE J. Emerg. Sel. Topics Circuits Syst., 11 (1): 99-110 (2021)Correlating Intrusion Detection with Attack Graph on Virtual Computer Networkings., , , , , and . ICISSP, page 651-658. SciTePress, (2023)The final security problem in IOT: Don't count on the canary!, , , , , and . DSC, page 599-604. IEEE, (2022)Loop Invariant Generation for Non-monotone Loop Structures., , , and . COMPSAC (1), page 304-309. IEEE Computer Society, (2018)Detailed experimental phase noise characterization of Y-branch lasers for use in coherent communication systems., , , and . OFC/NFOEC, page 1-3. IEEE, (2013)Research on Network Traffic Feature Map Generation and Evaluation Methods., , , and . ICBASE, page 429-433. IEEE, (2023)A cache replacement strategy based on content features in named data networking., , and . EITCE, page 1577-1581. ACM, (2021)To preserve or not to preserve invalid solutions in search-based software engineering: a case study in software product lines., and . ICSE, page 1027-1038. ACM, (2018)