Author of the publication

Local Boundary Fuzzified Rough K-Means-Based Information Granulation Algorithm Under the Principle of Justifiable Granularity.

, , , , , and . IEEE Trans. Cybern., 54 (1): 519-532 (January 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compressed binary discernibility matrix based incremental attribute reduction algorithm for group dynamic data., , , and . Neurocomputing, (2019)A quasi-transport integral variational nodal method for homogeneous nodes based on the 2D/1D method., , , and . Comput. Phys. Commun., (2022)Single-step Monte Carlo criticality algorithm., , , , , , and . Comput. Phys. Commun., (2022)A photovoltaic power forecasting model based on dendritic neuron networks with the aid of wavelet transform., , , , , and . Neurocomputing, (2020)Ship Synchronous Generator Modeling Based on RST and RBF Neural Networks., , and . ISNN (2), volume 3972 of Lecture Notes in Computer Science, page 1363-1369. Springer, (2006)Observer-based adaptive secure control with nonlinear gain recursive sliding-mode for networked non-affine nonlinear systems under DoS attacks., , , , , and . Kybernetika, 56 (2): 298-322 (2020)A survey of deep domain adaptation based on label set classification., , , and . Multim. Tools Appl., 81 (27): 39545-39576 (November 2022)Interaction-Oriented Service Entity Placement in Edge Computing., , , , , , and . IEEE Trans. Mob. Comput., 20 (3): 1064-1075 (2021)A novel trust-based false data detection method for power systems under false data injection attacks., , , , and . J. Frankl. Inst., 358 (1): 56-73 (2021)Few-Shot SAR Target Classification via Metalearning., , , , and . IEEE Trans. Geosci. Remote. Sens., (2022)