Author of the publication

An Adversarial Attack Based on Multi-objective Optimization in the Black-Box Scenario: MOEA-APGA II.

, , , , and . ICICS, volume 11999 of Lecture Notes in Computer Science, page 603-612. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ADMBIFA: Accurate Detection and Mitigation of Blended Interest Flooding Attacks in NDNs., , and . HPSR, page 56-61. IEEE, (2023)Multi-antenna compressed wideband spectrum sensing for cognitive radio., , , , and . WCNC, page 1903-1908. IEEE, (2011)Application of fixed point method to obtain semi-analytical solution to Blasius flow and its variation., and . Appl. Math. Comput., (2013)Impulse Control of Multidimensional Jump Diffusions in Finite Time Horizon., and . SIAM J. Control and Optimization, 51 (3): 2638-2663 (2013)Development of Consistent Equivalent Models by Mixed-Model Search., , , and . Modelling and Simulation, page 626-631. IASTED/ACTA Press, (2003)Parallel Software Testing Sequence Generation Method Based on State Pruning., , and . ISPA/IUCC/BDCloud/SocialCom/SustainCom, page 446-453. IEEE, (2018)Connections between Singular Control and Optimal Switching., and . SIAM J. Control and Optimization, 47 (1): 421-443 (2008)SAUR: A Service Aided UWB Routing for Wireless Mesh Networks., , , , and . ICC, page 1-6. IEEE, (2010)Develop a wearable ankle robot for in-bed acute stroke rehabilitation., , , , , , and . EMBC, page 7483-7486. IEEE, (2011)Irreversible investment with regime shifts., , and . J. Econ. Theory, 122 (1): 37-59 (2005)