Author of the publication

Three Branches of Negative Representation of Information: A Survey.

, , , , and . IEEE Trans. Emerging Topics in Comput. Intellig., 2 (6): 411-425 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Luo, Wenjian
add a person with the name Luo, Wenjian
 

Other publications of authors with the same name

Immune genetic programming based on register-stack structure., , and . IEEE Congress on Evolutionary Computation, page 3751-3758. IEEE, (2007)Evolutionary repair for evolutionary design of combinational logic circuits., and . IEEE Congress on Evolutionary Computation, page 1-8. IEEE, (2012)A Study of the Private Set Intersection Protocol Based on Negative Databases., and . DASC, page 58-64. IEEE Computer Society, (2013)Random Directional Attack for Fooling Deep Neural Networks., , , and . CoRR, (2019)Design Methods for Polymorphic Combinational Logic Circuits based on the Bi_Decomposition Approach., , , and . CoRR, (2017)An Adaptive Self-tolerant Algorithm for Hardware Immune System., , , , and . ICES, volume 3637 of Lecture Notes in Computer Science, page 1-11. Springer, (2005)Extending CDFR for Overlapping Community Detection., , , , and . ICDIS, page 200-206. IEEE, (2018)Improved CFDP Algorithms Based on Shared Nearest Neighbors and Transitive Closure., , , and . PAKDD (Workshops), volume 10526 of Lecture Notes in Computer Science, page 79-93. Springer, (2017)On average time complexity of evolutionary negative selection algorithms for anomaly detection., , , , and . GEC Summit, page 631-638. ACM, (2009)Mining the Local Dependency Itemset in a Products Network., , , and . ACM Trans. Manag. Inf. Syst., 11 (1): 3:1-3:31 (2020)