Author of the publication

Improved Approach of Genetic Programming and Applications for Data Mining.

, and . ICNC (1), volume 4221 of Lecture Notes in Computer Science, page 816-819. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Strategy Selection for Cyber Deception via Deep Reinforcement Learning., , and . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, page 1841-1847. IEEE, (2022)Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity., , and . IEEE Trans. Dependable Secur. Comput., 19 (6): 3804-3821 (2022)Optimal strategy selection for attack graph games using deep reinforcement learning., , and . HPCC/DSS/SmartCity/DependSys, page 823-830. IEEE, (2022)AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection., , , , , , , and . SciSec, volume 14299 of Lecture Notes in Computer Science, page 207-224. Springer, (2023)Keeping Your Enemies Closer: Shedding Light on the Attacker's Optimal Strategy., , and . SciSec, volume 14299 of Lecture Notes in Computer Science, page 42-59. Springer, (2023)Optimal Defense Strategy for Multi-agents Using Value Decomposition Networks., , , and . ICIC (2), volume 14863 of Lecture Notes in Computer Science, page 504-516. Springer, (2024)Stories behind decisions: Towards interpretable malware family classification with hierarchical attention., , , , , , , and . Comput. Secur., (2024)Theoretical Convergence Guaranteed Resource-Adaptive Federated Learning with Mixed Heterogeneity., , , , , , , and . KDD, page 2444-2455. ACM, (2023)Simulations of Event-Based Cyber Dynamics via Adversarial Machine Learning., , , and . SciSec, volume 13005 of Lecture Notes in Computer Science, page 187-201. Springer, (2021)Improved Approach of Genetic Programming and Applications for Data Mining., and . ICNC (1), volume 4221 of Lecture Notes in Computer Science, page 816-819. Springer, (2006)