Author of the publication

An Improved Binary Whale Optimization Algorithm for Feature Selection of Network Intrusion Detection.

, , , , , and . IDAACS-SWS, page 10-15. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of Elephant Herd Optimization Algorithm Based on Levy Flight Strategy in Intrusion Detection., , , , , , and . IDAACS-SWS, page 16-20. IEEE, (2018)An Improved Binary Whale Optimization Algorithm for Feature Selection of Network Intrusion Detection., , , , , and . IDAACS-SWS, page 10-15. IEEE, (2018)SI-Net: Multi-Scale Context-Aware Convolutional Block for Speaker Verification., , , , and . ASRU, page 220-227. IEEE, (2021)Application of a Distance-weighted KNN Algorithm Improved by Moth-Flame Optimization in Network Intrusion Detection., , , , , and . IDAACS-SWS, page 166-170. IEEE, (2018)Research on credit-risk models via machine-learning algorithms and logistic regression for predicting CBA consumer behaviour., , and . CIPAE, page 344-350. IEEE, (2023)Time-sliced scalable source partition streaming for flexible power management in digital audio/video broadcasting., , , , and . WCNC, page 3007-3011. IEEE, (2009)Hardware encoder and decoder for 3-D stereo video streaming applications., , , , , and . VCIP, page 1. IEEE, (2011)Fast intra mode decision for HEVC based on direction energy distribution., , and . ISCE, page 61-62. IEEE, (2013)Time-Frequency Domain Fast Audio Transcoding., and . ISM, page 750-753. IEEE Computer Society, (2006)