Segui
Guofu Zhang
Guofu Zhang
School of Computer Science and Information Engineering, Hefei University of Technology
Email verificata su hfut.edu.cn - Home page
Titolo
Citata da
Citata da
Anno
Multiple emergency resource allocation for concurrent incidents in natural disasters
Z Su, G Zhang, Y Liu, F Yue, J Jiang
International journal of disaster risk reduction 17, 199-212, 2016
832016
Multimedia security: a survey of chaos-based encryption technology
Z Su, G Zhang, J Jiang
Multimedia-A Multidisciplinary Approach to Complex Issues. InTech, 99-124, 2012
782012
Population evolvability: Dynamic fitness landscape analysis for population-based metaheuristic algorithms
M Wang, B Li, G Zhang, X Yao
IEEE Transactions on Evolutionary Computation 22 (4), 550-563, 2017
572017
SNR-constrained heuristics for optimizing the scaling parameter of robust audio watermarking
Z Su, G Zhang, F Yue, L Chang, J Jiang, X Yao
IEEE Transactions on Multimedia 20 (10), 2631-2644, 2018
552018
Searching for overlapping coalitions in multiple virtual organizations
G Zhang, J Jiang, Z Su, M Qi, H Fang
Information Sciences 180 (17), 3140-3156, 2010
482010
An improved selective encryption for H. 264 video based on intra prediction mode scrambling
J Jiang, Y Liu, Z Su, G Zhang, S Xing
Journal of Multimedia 5 (5), 464, 2010
432010
Constraint handling in NSGA-II for solving optimal testing resource allocation problems
G Zhang, Z Su, M Li, F Yue, J Jiang, X Yao
IEEE Transactions on Reliability 66 (4), 1193-1212, 2017
392017
Path selection in disaster response management based on Q-learning
ZP Su, JG Jiang, CY Liang, GF Zhang
International Journal of Automation and Computing 8 (1), 100-106, 2011
392011
Enhanced constraint handling for reliability-constrained multiobjective testing resource allocation
Z Su, G Zhang, F Yue, D Zhan, M Li, B Li, X Yao
IEEE Transactions on Evolutionary Computation 25 (3), 537-551, 2021
382021
基于离散粒子群算法求解复杂联盟生成问题
张国富, 蒋建国, 夏娜, 苏兆品
电子学报 35 (2), 323-327, 2007
322007
M-sequences and sliding window based audio watermarking robust against large-scale cropping attacks
G Zhang, L Zheng, Z Su, Y Zeng, G Wang
IEEE Transactions on Information Forensics and Security 18, 1182-1195, 2023
272023
Solutions of complicated coalition generation based on discrete particle swarm optimization
G Zhang, J Jiang, N Xia, ZP Su
Dianzi Xuebao(Acta Electronica Sinica) 35 (2), 323-327, 2007
272007
Multi-task coalition parallel formation strategy based on reinforcement learning
JG Jiang, SU Zhao-Pin, QI Mei-Bin, GF ZHANG
Acta Automatica Sinica 34 (3), 349-352, 2008
232008
蚁群算法的几乎处处强收敛性分析
苏兆品, 蒋建国, 梁昌勇, 张国富, 夏娜
电子学报 37 (008), 1646-1650, 2009
212009
基于蚁群算法的敏捷供应链伙伴选择
蒋建国, 夏娜, 张国富, 尹翔
系统仿真学报 18 (012), 3377-3379, 2006
192006
Chaos-based video encryption algorithms
Z Su, S Lian, G Zhang, J Jiang
Chaos-Based Cryptography: Theory, Algorithms and Applications, 205-226, 2011
182011
Robust audio copy-move forgery detection using constant Q spectral Sketches and GA-SVM
Z Su, M Li, G Zhang, Q Wu, M Li, W Zhang, X Yao
IEEE Transactions on Dependable and Secure Computing 20 (5), 4016-4031, 2022
172022
Multi-software reliability allocation in multimedia systems with budget constraints using Dempster–Shafer theory and improved differential evolution
F Yue, G Zhang, Z Su, Y Lu, T Zhang
Neurocomputing 169, 13-22, 2015
162015
Comprehensive evaluation of software quality based on fuzzy soft sets
F Yue, Z Su, Y Lu, G Zhang
Systems engineering and electronics 35 (7), 1460-1466, 2013
162013
A revision algorithm for invalid encodings in concurrent formation of overlapping coalitions
G Zhang, J Jiang, C Lu, Z Su, H Fang, Y Liu
Applied Soft Computing 11 (2), 2164-2172, 2011
162011
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20