Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An artificial immunity approach to malware detection in a mobile platform., , and . EURASIP J. Information Security, (2017)An artificial immune system for phishing detection., , , , and . IEEE Congress on Evolutionary Computation, page 1-7. IEEE, (2012)Hybrid approach for Pareto front expansion in heuristics., , , and . J. Oper. Res. Soc., 62 (2): 348-359 (2011)A comparison of adaptive virtual constraint identification strategies for recurrent dynamic constraint satisfaction.. IEEE Congress on Evolutionary Computation, page 552-557. IEEE, (2002)Genetic algorithms solution for unconstrained optimal crane control., , , and . CEC, page 2124-2130. IEEE, (1999)Vulnerability analysis of AIS-based intrusion detection systems via genetic and particle swarm red teams., , , and . IEEE Congress on Evolutionary Computation, page 111-116. IEEE, (2004)GESLIC: genetic and evolutionary-based short-length iris codes., , and . ACM Southeast Regional Conference, page 201-204. ACM, (2011)An evaluation of negative selection algorithm with constraint-based detectors., and . ACM Southeast Regional Conference, page 134-139. ACM, (2006)A Transformer-Based Language Model for Sentiment Classification and Cross-Linguistic Generalization: Empowering Low-Resource African Languages., , , , and . AIBThings, page 1-5. IEEE, (2023)OffLanDat: A Community Based Implicit Offensive Language Dataset Generated by Large Language Model Through Prompt Engineering., , , , , , , , , and . CoRR, (2024)