Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Evaluation Mechanism for Evolutionary Reinforcement Learning., , , , , and . ICIC (1), volume 13393 of Lecture Notes in Computer Science, page 41-50. Springer, (2022)A Clustering-Based Evolutionary Algorithm for Many-Objective Optimization Problems., , , , , , and . IEEE Trans. Evol. Comput., 23 (3): 391-405 (2019)Making Cloud Storage Integrity Checking Protocols Economically Smarter., , , , and . SmartCom, volume 10135 of Lecture Notes in Computer Science, page 297-306. Springer, (2016)Secret sharing scheme with dynamic size of shares for distributed storage system., , , , , and . Secur. Commun. Networks, 7 (8): 1245-1252 (2014)An adaptive immune-inspired multi-objective algorithm with multiple differential evolution strategies., , , , , , and . Inf. Sci., (2018)Integrate Depth Information to Enhance the Robustness of Object Level SLAM., and . CGI (3), volume 14497 of Lecture Notes in Computer Science, page 186-197. Springer, (2023)An End-to-End Structure with Novel Position Mechanism and Improved EMD for Stock Forecasting., and . ICONIP (11), volume 1965 of Communications in Computer and Information Science, page 526-537. Springer, (2023)An Architecture for Differentiated Security Service., , and . ISECS, page 301-304. IEEE Computer Society, (2008)A Novel Multiobjective Particle Swarm Optimization Algorithm with Dynamic Resource Allocation., , , , and . CEC, page 904-911. IEEE, (2019)A Semantic Hash Tree Based Verifiable Data Access Protocol on the Cloud., , , , , and . CBD, page 219-226. IEEE Computer Society, (2015)