Multiple emergency resource allocation for concurrent incidents in natural disasters Z Su, G Zhang, Y Liu, F Yue, J Jiang International journal of disaster risk reduction 17, 199-212, 2016 | 83 | 2016 |
Multimedia security: a survey of chaos-based encryption technology Z Su, G Zhang, J Jiang Multimedia-A Multidisciplinary Approach to Complex Issues. InTech, 99-124, 2012 | 78 | 2012 |
Population evolvability: Dynamic fitness landscape analysis for population-based metaheuristic algorithms M Wang, B Li, G Zhang, X Yao IEEE Transactions on Evolutionary Computation 22 (4), 550-563, 2017 | 57 | 2017 |
SNR-constrained heuristics for optimizing the scaling parameter of robust audio watermarking Z Su, G Zhang, F Yue, L Chang, J Jiang, X Yao IEEE Transactions on Multimedia 20 (10), 2631-2644, 2018 | 55 | 2018 |
Searching for overlapping coalitions in multiple virtual organizations G Zhang, J Jiang, Z Su, M Qi, H Fang Information Sciences 180 (17), 3140-3156, 2010 | 48 | 2010 |
An improved selective encryption for H. 264 video based on intra prediction mode scrambling J Jiang, Y Liu, Z Su, G Zhang, S Xing Journal of Multimedia 5 (5), 464, 2010 | 43 | 2010 |
Constraint handling in NSGA-II for solving optimal testing resource allocation problems G Zhang, Z Su, M Li, F Yue, J Jiang, X Yao IEEE Transactions on Reliability 66 (4), 1193-1212, 2017 | 39 | 2017 |
Path selection in disaster response management based on Q-learning ZP Su, JG Jiang, CY Liang, GF Zhang International Journal of Automation and Computing 8 (1), 100-106, 2011 | 39 | 2011 |
Enhanced constraint handling for reliability-constrained multiobjective testing resource allocation Z Su, G Zhang, F Yue, D Zhan, M Li, B Li, X Yao IEEE Transactions on Evolutionary Computation 25 (3), 537-551, 2021 | 38 | 2021 |
基于离散粒子群算法求解复杂联盟生成问题 张国富, 蒋建国, 夏娜, 苏兆品 电子学报 35 (2), 323-327, 2007 | 32 | 2007 |
M-sequences and sliding window based audio watermarking robust against large-scale cropping attacks G Zhang, L Zheng, Z Su, Y Zeng, G Wang IEEE Transactions on Information Forensics and Security 18, 1182-1195, 2023 | 27 | 2023 |
Solutions of complicated coalition generation based on discrete particle swarm optimization G Zhang, J Jiang, N Xia, ZP Su Dianzi Xuebao(Acta Electronica Sinica) 35 (2), 323-327, 2007 | 27 | 2007 |
Multi-task coalition parallel formation strategy based on reinforcement learning JG Jiang, SU Zhao-Pin, QI Mei-Bin, GF ZHANG Acta Automatica Sinica 34 (3), 349-352, 2008 | 23 | 2008 |
蚁群算法的几乎处处强收敛性分析 苏兆品, 蒋建国, 梁昌勇, 张国富, 夏娜 电子学报 37 (008), 1646-1650, 2009 | 21 | 2009 |
基于蚁群算法的敏捷供应链伙伴选择 蒋建国, 夏娜, 张国富, 尹翔 系统仿真学报 18 (012), 3377-3379, 2006 | 19 | 2006 |
Chaos-based video encryption algorithms Z Su, S Lian, G Zhang, J Jiang Chaos-Based Cryptography: Theory, Algorithms and Applications, 205-226, 2011 | 18 | 2011 |
Robust audio copy-move forgery detection using constant Q spectral Sketches and GA-SVM Z Su, M Li, G Zhang, Q Wu, M Li, W Zhang, X Yao IEEE Transactions on Dependable and Secure Computing 20 (5), 4016-4031, 2022 | 17 | 2022 |
Multi-software reliability allocation in multimedia systems with budget constraints using Dempster–Shafer theory and improved differential evolution F Yue, G Zhang, Z Su, Y Lu, T Zhang Neurocomputing 169, 13-22, 2015 | 16 | 2015 |
Comprehensive evaluation of software quality based on fuzzy soft sets F Yue, Z Su, Y Lu, G Zhang Systems engineering and electronics 35 (7), 1460-1466, 2013 | 16 | 2013 |
A revision algorithm for invalid encodings in concurrent formation of overlapping coalitions G Zhang, J Jiang, C Lu, Z Su, H Fang, Y Liu Applied Soft Computing 11 (2), 2164-2172, 2011 | 16 | 2011 |