Author of the publication

The Recent Developments and Comparative Analysis of Neural Network and Evolutionary Algorithms for Solving Symbolic Regression.

, , , , and . ICIC (1), volume 9225 of Lecture Notes in Computer Science, page 703-714. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Brief Survey on Fuzzy Cognitive Maps Research., and . ICIC (3), volume 9227 of Lecture Notes in Computer Science, page 159-166. Springer, (2015)Research on Information Architecture Design of Online Creative Space., , and . HCI (4), volume 10274 of Lecture Notes in Computer Science, page 539-550. Springer, (2017)Emergency repositories network layout model and calculation., , , and . ICNC, page 2754-2758. IEEE, (2010)Scholarly Book Publishers and their Promotional Activity on Twitter., and . ISSI, page 1178-1183. ISSI Society, (2019)Grey system model with time lag and application to simulation of karst spring discharge., , , and . Grey Syst. Theory Appl., 1 (1): 47-56 (2011)Deep Fusion: Crafting Transferable Adversarial Examples and Improving Robustness of Industrial Artificial Intelligence of Things., , , , and . IEEE Trans. Ind. Informatics, 19 (6): 7480-7488 (June 2023)Exploring the Factors and Influence Mechanisms of User Loyalty for Generative AI., , and . DSC, page 397-400. IEEE, (2023)An adversarial attack on DNN-based black-box object detectors., , , , and . J. Netw. Comput. Appl., (2020)Friend-or-Foe Deep Deterministic Policy Gradient., , , , , and . SMC, page 3523-3530. IEEE, (2020)Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity., , , , , and . IJCAI, page 3125-3133. ijcai.org, (2021)