Author of the publication

Dimension-by-dimension enhanced cuckoo search algorithm for global optimization.

, , , , and . Soft Comput., 23 (21): 11297-11312 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Probabilistic Approach Based on Area Grey Incidence Decision Making for Optimal Distributed Generation Planning., , , , , and . IEEE Access, (2019)Limited-angle CT Reconstruction with ℓp Regularization., , and . ISICDM, page 182-186. ACM, (2019)Extracting Seasonal Signals in GNSS Coordinate Time Series via Weighted Nuclear Norm Minimization., , , , and . Remote. Sens., 12 (12): 2027 (2020)Seismic Data Interpolation Based on Multi-Scale Transformer., , and . IEEE Geosci. Remote. Sens. Lett., (2023)Accurate Image-Based Pedestrian Detection With Privacy Preservation., , , , and . IEEE Trans. Veh. Technol., 69 (12): 14494-14509 (2020)On Variable-Universe Fuzzy Control for Drive Chain of Front-End Speed Regulated Wind Generator., , , and . Adv. Fuzzy Syst., (2019)Threshold Multi-Keyword Search for Cloud-Based Group Data Sharing., , , , and . IEEE Trans. Cloud Comput., 10 (3): 2146-2162 (2022)DNA Similarity Search With Access Control Over Encrypted Cloud Data., , , , and . IEEE Trans. Cloud Comput., 10 (2): 1233-1252 (2022)Verifiable Searchable Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage., , , , , and . IEEE Trans. Cloud Comput., 10 (2): 835-848 (2022)PROTECT: Efficient Password-Based Threshold Single-Sign-On Authentication for Mobile Users against Perpetual Leakage., , , , , and . IEEE Trans. Mob. Comput., 20 (6): 2297-2312 (2021)