Author of the publication

Benefit-Cost Analysis of Security Systems for Multiple Protected Assets Based on Information Entropy.

, , , and . Entropy, 14 (3): 571-580 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Negative Feedback: The Forsaken Nature Available for Re-ranking., , , , and . COLING (Posters), page 436-444. Chinese Information Processing Society of China, (2010)A Multi-Agent Approach for Reactionary Delay Prediction of Flights., , , and . IEEE Access, (2019)On the Robustness of Complex Systems With Multipartitivity Structures Under Node Attacks., , and . IEEE Trans. Control. Netw. Syst., 7 (1): 106-117 (2020)A Smart Path Recommendation Method for Metro Systems With Passenger Preferences., , and . IEEE Access, (2020)A survey on network community detection based on evolutionary computation., , , and . Int. J. Bio Inspired Comput., 8 (2): 84-98 (2016)Distributed Cache and Recovery Method for Strong Real-Time Applications., , and . Trans. Edutainment, (2020)Critical Links Detection in Spatial-Temporal Airway Networks Using Complex Network Theories., , , and . IEEE Access, (2022)Mutual-Information-Based Incremental Relaying Communications for Wireless Biomedical Implant Systems., , , , and . Sensors, 18 (2): 515 (2018)When to transfer: a dynamic domain adaptation method for effective knowledge transfer., , , , , and . Int. J. Mach. Learn. Cybern., 13 (11): 3491-3508 (2022)Multi-level learning based memetic algorithm for community detection., , , , and . Appl. Soft Comput., (2014)