Weibiao Qiao & Zhe Yang. (2019) Solving Large-Scale Function Optimization Problem by Using a New Metaheuristic Algorithm Based on Quantum Dolphin Swarm Algorithm. IEEE Access 7, pages 138972-138989.
Crossref
Chun Hua & Chun Ying Cheng. 2018. Advances in Neural Networks – ISNN 2018. Advances in Neural Networks – ISNN 2018
273
278
.
Soroor Sarafrazi, Hossein Nezamabadi-pour & Saeid R. Seydnejad. (2015) A novel hybrid algorithm of GSA with Kepler algorithm for numerical optimization. Journal of King Saud University - Computer and Information Sciences 27:3, pages 288-296.
Crossref
Dedi Liu, Shenglian Guo, Xiaohong Chen, Quanxi Shao, Qihua Ran, Xingyuan Song & Zhaoli Wang. (2011) A macro-evolutionary multi-objective immune algorithm with application to optimal allocation of water resources in Dongjiang River basins, South China. Stochastic Environmental Research and Risk Assessment 26:4, pages 491-507.
Crossref
Feixian Sun. (2011) Artificial Immune Danger Theory Based Model for Network Security Evaluation. Journal of Networks 6:2.
Crossref
Hang YU, Li-Cheng JIAO, Mao-Guo GONG & Dong-Dong YANG. (2010) Clonal Selection Function Optimization Based on Orthogonal Experiment Design. Journal of Software 21:5, pages 950-967.
Crossref
Hao Yuan. (2010) A Network Security Risk Assessment Method Based on Immunity Algorithm. Advanced Materials Research 108-111, pages 948-953.
Crossref
Feixian Sun, Mengrong Kong & Jianhong Wang. (2010) An Immune Danger Theory Inspired Model for Network Security Threat Awareness. An Immune Danger Theory Inspired Model for Network Security Threat Awareness.
Feixian Sun, Xinchao Han & Jianhong Wang. (2010) An Immune Danger Theory Inspired Model for Network Security Monitoring. An Immune Danger Theory Inspired Model for Network Security Monitoring.
Feixian Sun & Zhigang Wu. (2009) A New Risk Assessment Model for E-Government Network Security Based on Antibody Concentration. A New Risk Assessment Model for E-Government Network Security Based on Antibody Concentration.
Fei-xian Sun & Shen-wu Zhang. (2009) Immunity-Inspired Risk Assessment Approach for Network Security. Immunity-Inspired Risk Assessment Approach for Network Security.
Qiuyi Wu, Licheng Jiao & Yangyang Li. (2009) Design RF diplexer by directional immune clonal selection algorithm. Design RF diplexer by directional immune clonal selection algorithm.
Ali Rıza Yıldız. (2009) A new design optimization framework based on immune algorithm and Taguchi's method. Computers in Industry 60:8, pages 613-620.
Crossref
Zhi-Hua Hu, Yong-Sheng Ding, Xiao-Kun Yu, Wen-Bin Zhang & Qiao Yan. (2009) A Hybrid Neural Network and Immune Algorithm Approach for Fit Garment Design. Textile Research Journal 79:14, pages 1319-1330.
Crossref
Yu-Cai Zhang & Fu-Gen Song. (2009) An Immune Evolutionary Algorithm for Teacher/Class Timetabling Problem. An Immune Evolutionary Algorithm for Teacher/Class Timetabling Problem.
Li-Ning Xing, Ying-Wu Chen & Ke-Wei Yang. (2009) A novel mutation operator based on the immunity operation. European Journal of Operational Research 197:2, pages 830-833.
Crossref
Chen Xiaoyun, Yue Min, Mu Jinchao, He Yanshan & Chen Yi. (2009) Multi-factors time series prediction based on PCV-SVM. Multi-factors time series prediction based on PCV-SVM.
Feixian Sun & Feng Xu. (2009) Antibody Concentration Based Method for Network Security Situation Awareness. Antibody Concentration Based Method for Network Security Situation Awareness.
Feixian Sun & Shihui Cheng. (2009) A Gene Technology Inspired Paradigm for User Authentication. A Gene Technology Inspired Paradigm for User Authentication.
Junling Zhang, Changyong Liang, Yongqing Huang, Jian Wu & Shanlin Yang. (2009) An effective multiagent evolutionary algorithm integrating a novel roulette inversion operator for engineering optimization. Applied Mathematics and Computation 211:2, pages 392-416.
Crossref
Li lan & Rong Qiao-mei. (2009) Implementation of Clustering Algorithm Using Artificial Immune System. Implementation of Clustering Algorithm Using Artificial Immune System.
Ali Rıza Yıldız. (2009) A novel hybrid immune algorithm for global optimization in design and manufacturing. Robotics and Computer-Integrated Manufacturing 25:2, pages 261-270.
Crossref
Maoguo Gong, Licheng Jiao, Lining Zhang & Haifeng Du. (2009) Immune secondary response and clonal selection inspired optimizers. Progress in Natural Science 19:2, pages 237-253.
Crossref
Maoguo Gong, Licheng Jiao & Xiangrong Zhang. (2008) A population-based artificial immune system for numerical optimization. Neurocomputing 72:1-3, pages 149-161.
Crossref
Zhi-Hua Hu, Yong-Sheng Ding, Wen-Bin Zhang & Qiao Yan. (2008) An interactive co-evolutionary CAD system for garment pattern design. Computer-Aided Design 40:12, pages 1094-1104.
Crossref
Lining Zhang, Maoguo Gong, Licheng Jiao & Jie Yang. (2008) Improved Clonal Selection Algorithm based on Baldwinian Learning. Improved Clonal Selection Algorithm based on Baldwinian Learning.
Wei ZHANG. (2008) Modeling Algorithm Based on String-coding Clone Selection and Reliability Forecasting. Acta Automatica Sinica 34:1.
Crossref
Feixian Sun, Lei Pan, Tao Li & Jinquan Zeng. (2008) Gene-Certificate Based Method for Network Trust. Gene-Certificate Based Method for Network Trust.
Feixian Sun, Qiusheng Zheng & Tao Li. (2008) Immunity-Based Dynamic Anomaly Detection Method. Immunity-Based Dynamic Anomaly Detection Method.
Jin Zhu, Xingsheng Gu & Bin Jiao. (2008) Efficient short-term scheduling of multiproduct batch plants under demand uncertainty. Progress in Natural Science 18:4, pages 487-493.
Crossref
Maoguo Gong, Haifeng Du & Licheng Jiao. (2006) Optimal approximation of linear systems by artificial immune response. Science in China Series F 49:1, pages 63-79.
Crossref
Maoguo Gong, Licheng Jiao, Fang Liu & Haifeng Du. 2005. Artificial Immune Systems. Artificial Immune Systems
207
219
.