A Survey of artificial immune applications
暂无分享,去创建一个
[1] Hugues Bersini,et al. The Immune Learning Mechanisms: Recruitment Reinforcement and their applications , 1993 .
[2] Zhuhong Zhang,et al. Immune optimization algorithm for constrained nonlinear multiobjective optimization problems , 2007, Appl. Soft Comput..
[3] Leandro Nunes de Castro,et al. ARTIFICIAL IMMUNE SYSTEMS: PART II - A SURVEY OF APPLICATIONS , 2000 .
[4] Alan S. Perelson,et al. The immune system, adaptation, and machine learning , 1986 .
[5] P. Helman,et al. A formal framework for positive and negative detection schemes , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[6] Stephanie Forrest,et al. Computer immunology , 1997, CACM.
[7] Yoshiteru Ishida. Immunity-Based Systems: A Design Perspective , 2010 .
[8] Liangpei Zhang,et al. An unsupervised artificial immune classifier for multi/hyperspectral remote sensing imagery , 2006, IEEE Trans. Geosci. Remote. Sens..
[9] Jonathan Timmis,et al. Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .
[10] Leandro Nunes de Castro,et al. The Clonal Selection Algorithm with Engineering Applications 1 , 2000 .
[11] Stephanie Forrest,et al. An immunological model of distributed detection and its application to computer security , 1999 .
[12] Uwe Aickelin,et al. Cooperative Automated Worm Response and Detection ImmuNe ALgorithm(CARDINAL) Inspired by T-Cell Immunity and Tolerance , 2005, ICARIS.
[13] D. Wong,et al. Negative Selection Algorithm for Aircraft Fault Detection , 2004, ICARIS.
[14] Hugues Bersini,et al. Immune Network and Adaptive Control , 1991 .
[15] Peter Ross,et al. Studies on the Implications of Shape-Space Models for Idiotypic Networks , 2004, ICARIS.
[16] Simon M. Garrett,et al. How Do We Evaluate Artificial Immune Systems? , 2005, Evolutionary Computation.
[17] Henry Y. K. Lau,et al. Immunity-based autonomous guided vehicles control , 2007, Appl. Soft Comput..
[18] Julie Greensmith,et al. Introducing Dendritic Cells as a Novel Immune-Inspired Algorith for Anomoly Detection , 2005 .
[19] Jon Timmis,et al. Once More Unto the Breach: Towards Artificial Homeostasis? , 2005 .
[20] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[21] Jonathan Timmis,et al. Artificial immune systems - a new computational intelligence paradigm , 2002 .
[22] Claudia Eckert,et al. An Investigation of R-Chunk Detector Generation on Higher Alphabets , 2004, GECCO.
[23] Hyun-Kyo Jung,et al. Niching genetic algorithm with restricted competition selection for multimodal function optimization , 1999 .
[24] L. Segel,et al. Design Principles for the Immune System and Other Distributed Autonomous Systems , 2001 .
[25] Jonathan Timmis,et al. Immune Inspired Somatic Contiguous Hypermutation for Function Optimisation , 2003, GECCO.
[26] David E. Goldberg,et al. Genetic Algorithms with Sharing for Multimodalfunction Optimization , 1987, ICGA.
[27] Fabio A. González,et al. Anomaly Detection Using Real-Valued Negative Selection , 2003, Genetic Programming and Evolvable Machines.
[28] Guan-Chun Luh,et al. An immunological approach to mobile robot reactive navigation , 2008, Appl. Soft Comput..
[29] D. Dasgupta,et al. Advances in artificial immune systems , 2006, IEEE Computational Intelligence Magazine.
[30] Fernando José Von Zuben,et al. Learning and optimization using the clonal selection principle , 2002, IEEE Trans. Evol. Comput..
[31] G. Grimmett,et al. Probability and random processes , 2002 .
[32] Zulfiqur Ali,et al. Chemical Sensors for Electronic Nose Systems , 2005 .
[33] Jerne Nk. Towards a network theory of the immune system. , 1974 .
[34] Carlos A. Coello Coello,et al. Convergence Analysis of a Multiobjective Artificial Immune System Algorithm , 2004, ICARIS.
[35] Sadık Kara,et al. Medical application of information gain-based artificial immune recognition system (IG-AIRS): Classification of microorganism species , 2009, Expert Syst. Appl..
[36] Dipankar Dasgupta,et al. Novelty detection in time series data using ideas from immunology , 1996 .
[37] Alex Alves Freitas,et al. Revisiting the Foundations of Artificial Immune Systems: A Problem-Oriented Perspective , 2003, ICARIS.
[38] Jonatan Gómez,et al. Self adaptation of operator rates for multimodal optimization , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[39] Alex Alves Freitas,et al. AISEC: an artificial immune system for e-mail classification , 2003, IEEE Congress on Evolutionary Computation.
[40] Carlos A. Coello Coello,et al. Handling Constraints in Global Optimization Using an Artificial Immune System , 2005, ICARIS.
[41] Alex Alves Freitas,et al. Revisiting the Foundations of Artificial Immune Systems for Data Mining , 2007, IEEE Transactions on Evolutionary Computation.
[42] Jonathan Timmis,et al. Exploiting Parallelism Inherent in AIRS, an Artificial Immune Classifier , 2004, ICARIS.
[43] Jonathan Timmis,et al. Application Areas of AIS: The Past, The Present and The Future , 2005, ICARIS.
[44] Andrew Hone,et al. Optima, Extrema, and Artificial Immune Systems , 2004, ICARIS.
[45] Claudia Eckert,et al. Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.
[46] Alan S. Perelson,et al. The Evolution of Emergent Organization in Immune System Gene Libraries , 1995, ICGA.
[47] Jia Chen,et al. Definition of Danger Signal in Artificial Immune System with Cloud Method , 2008, 2008 Fourth International Conference on Natural Computation.
[48] F. Burnet. The clonal selection theory of acquired immunity , 1959 .
[49] Vincenzo Cutello,et al. Exploring the Capability of Immune Algorithms: A Characterization of Hypermutation Operators , 2004, ICARIS.
[50] Chou-Yuan Lee,et al. An immunity-based ant colony optimization algorithm for solving weapon-target assignment problem , 2002, Appl. Soft Comput..
[51] A. Pavlou,et al. Recognition of anaerobic bacterial isolates in vitro using electronic nose technology , 2002, Letters in applied microbiology.
[52] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[53] Jonathan Timmis,et al. Inspiration for the Next Generation of Artificial Immune Systems , 2005, ICARIS.
[54] Uwe Aickelin,et al. Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.
[55] Stephanie Forrest,et al. Architecture for an Artificial Immune System , 2000, Evolutionary Computation.
[56] D. Dasgupta,et al. Immunity-based systems: a survey , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.
[57] L.N. de Castro,et al. An artificial immune network for multimodal function optimization , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[58] Ralph R. Martin,et al. A Sequential Niche Technique for Multimodal Function Optimization , 1993, Evolutionary Computation.
[59] Peter Ross,et al. A Role for Immunology in "Next Generation" Robot Controllers , 2003, ICARIS.
[60] D. Dasgupta. Artificial Immune Systems and Their Applications , 1998, Springer Berlin Heidelberg.
[61] H. Abbass,et al. aiNet : An Artificial Immune Network for Data Analysis , 2022 .
[62] Jonathan Timmis,et al. Artificial immune systems—today and tomorrow , 2007, Natural Computing.
[63] Yoshiteru Ishida,et al. Immunity-Based Systems , 2004, Advanced Information Processing.
[64] Tao Li,et al. An immunity based network security risk estimation , 2005, Science in China Series F: Information Sciences.
[65] Guan-Chun Luh,et al. An Immunological Approach to Mobile Robot Navigation , 2008 .