Author of the publication

One-time password authentication scheme based on the negative database.

, and . Eng. Appl. Artif. Intell., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing the combinational logic circuits with hybrid of Generalized Disjunction Decomposition and Evolutionary Repair., and . HIS, page 390-395. IEEE, (2012)Evolutionary design of polymorphic circuits with the improved evolutionary repair., and . IEEE Congress on Evolutionary Computation, page 2192-2200. IEEE, (2013)A Straightforward Method to Judge the Completeness of a Polymorphic Gate Set., , , and . CoRR, (2017)Designing Combinational Circuits with an Evolutionary Algorithm Based on the Repair Technique., , , and . ICES, volume 6274 of Lecture Notes in Computer Science, page 193-201. Springer, (2010)Theoretical foundations of evolutionary computation., , and . Genet. Program. Evolvable Mach., 9 (2): 107-108 (2008)An immune genetic algorithm based on immune regulation., , and . IEEE Congress on Evolutionary Computation, page 801-806. IEEE, (2002)Combining multipopulation evolutionary algorithms with memory for dynamic optimization problems., , and . IEEE Congress on Evolutionary Computation, page 2047-2054. IEEE, (2014)Multi-label Adversarial Defense Scheme Based on Negative Correlation Ensemble., , , and . ICSI (2), volume 13969 of Lecture Notes in Computer Science, page 284-294. Springer, (2023)Capacity Abuse Attack of Deep Learning Models Without Need of Label Encodings., , , , , and . IEEE Trans. Artif. Intell., 5 (2): 814-826 (February 2024)Detecting adversarial examples by positive and negative representations., , , , and . Appl. Soft Comput., (2022)