Author of the publication

Convergence analysis and application of the central force optimization algorithm.

, , , and . SCIENCE CHINA Information Sciences, 58 (5): 1-3 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Shadow attacks: automatically evading system-call-behavior based malware detection., , , , and . Journal in Computer Virology, 8 (1-2): 1-13 (2012)Convergence analysis and application of the central force optimization algorithm., , , and . SCIENCE CHINA Information Sciences, 58 (5): 1-3 (2015)A secure mechanism of group communication for pervasive grid., , , and . IJAHUC, 4 (6): 344-353 (2009)Enzyme structure dynamics of xylanase I from Trichoderma longibrachiatum., , , , , and . BMC Bioinformatics, 11 (S-6): S12 (2010)TCPBridge: A software approach to establish direct communications for NAT hosts., , , , and . AICCSA, page 247-252. IEEE Computer Society, (2008)Integration of shot-gun proteomics and bioinformatics analysis to explore plant hormone responses., , , and . BMC Bioinformatics, 13 (S-15): S8 (2012)HDX-Analyzer: a novel package for statistical analysis of protein structure dynamics., , , , , , , , and . BMC Bioinformatics, 12 (S-1): S43 (2011)Privacy-Preserving Matching Protocols for Attributes and Strings., , , , and . IACR Cryptology ePrint Archive, (2010)Modeling Modern Social-Network-Based Epidemics: A Case Study of Rose., , , and . ATC, volume 5060 of Lecture Notes in Computer Science, page 302-315. Springer, (2008)User Linkage Across Anonymizd Social Networks., , , and . CSoNet, volume 11280 of Lecture Notes in Computer Science, page 186-197. Springer, (2018)