Author of the publication

Adaptive multiple-elites-guided composite differential evolution algorithm with a shift mechanism.

, , , , , , , and . Inf. Sci., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimization between security and delay of quality-of-service., , , and . J. Network and Computer Applications, 34 (2): 603-608 (2011)A Novel Model for Evaluating Optimal Parameters of Security and Quality of Service., , and . JCP, 5 (6): 973-978 (2010)An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing., , , , , and . IEEE Trans. Information Forensics and Security, 11 (6): 1265-1277 (2016)An Effective Ensemble Framework for Multiobjective Optimization., , , , , , and . IEEE Trans. Evolutionary Computation, 23 (4): 645-659 (2019)A ranking-based adaptive artificial bee colony algorithm for global numerical optimization., , , , , , and . Inf. Sci., (2017)Evolutionary Search with Multiple Utopian Reference Points in Decomposition-Based Multiobjective Optimization., , , , , and . Complexity, (2019)On Stability of Multi-Valued Nonlinear Feedback Shift Registers., , , , , , , and . Complexity, (2019)Artificial Bee Colony Algorithm Based on Neighboring Information Learning., , , , , and . ICONIP (3), volume 9949 of Lecture Notes in Computer Science, page 279-289. (2016)Secure interoperation of identity managements among different circles of trust., , and . Computer Standards & Interfaces, 33 (6): 533-540 (2011)Secret sharing scheme with dynamic size of shares for distributed storage system., , , , , and . Security and Communication Networks, 7 (8): 1245-1252 (2014)