Author of the publication

Replicator Dynamic Inspired Differential Evolution Algorithm for Global Optimization.

, , , and . IJCCI, page 133-143. SciTePress, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrity Verification for Outsourcing Uncertain Frequent Itemset Mining., , , and . CoRR, (2013)A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET., , , , and . TrustCom, page 656-665. IEEE Computer Society, (2012)Fine-Grained Refinement on TPM-Based Protocol Applications., , , , , , and . IEEE Trans. Information Forensics and Security, 8 (6): 1013-1026 (2013)Analysis of Maximum Load Unbalancing Limits of Cascaded H-Bridge Rectifier Under Unity Power Factor., , , , , and . IEEE Access, (2019)Collaborative Outsourced Data Mining for Secure Cloud Computing., , and . JNW, 9 (10): 2655-2664 (2014)A new series arc fault identification method based on wavelet transform., , , , and . IECON, page 4817-4822. IEEE, (2017)A Secure Distributed Authentication scheme based on CRT-VSS and Trusted Computing in MANET., , , , , and . CoRR, (2013)Replicator Dynamic Inspired Differential Evolution Algorithm for Global Optimization., , , and . IJCCI, page 133-143. SciTePress, (2012)TARS: Trusted Adaptive Routing Strategy with Back-Off Observing Mechanism., , , , , and . TrustCom/ISPA/IUCC, page 1729-1734. IEEE Computer Society, (2013)Secure Collaborative Outsourced Data Mining with Multi-owner in Cloud Computing., , , and . TrustCom, page 100-108. IEEE Computer Society, (2012)