Gerry V. Dozier

Affiliations:
  • Auburn University, AL, USA


According to our database1, Gerry V. Dozier authored at least 133 papers between 1994 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
OffLanDat: A Community Based Implicit Offensive Language Dataset Generated by Large Language Model Through Prompt Engineering.
CoRR, 2024

2023
Seals_Lab at SemEval-2023 Task 12: Sentiment Analysis for Low-resource African Languages, Hausa and Igbo.
Proceedings of the The 17th International Workshop on Semantic Evaluation, 2023

AU_NLP at SemEval-2023 Task 10: Explainable Detection of Online Sexism Using Fine-tuned RoBERTa.
Proceedings of the The 17th International Workshop on Semantic Evaluation, 2023

Navigating the Fermi Multiverse: Assessing LLMs for Complex Multi-hop Queries.
Proceedings of the Seventh Workshop on Natural Language for Artificial Intelligence (NL4AI 2023) co-located with 22th International Conference of the Italian Association for Artificial Intelligence (AIxIA 2023), 2023

A Transformer-Based Language Model for Sentiment Classification and Cross-Linguistic Generalization: Empowering Low-Resource African Languages.
Proceedings of the IEEE International Conference on Artificial Intelligence, 2023

Online Sexism Detection and Classification by Injecting User Gender Information.
Proceedings of the IEEE International Conference on Artificial Intelligence, 2023

2022
Towards the Improvement of UI/UX of a Human-AI Adversarial Authorship System.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2022

Irony and Stereotype Spreading Author Profiling on Twitter using Machine Learning: A BERT-TFIDF based Approach.
Proceedings of the Working Notes of CLEF 2022 - Conference and Labs of the Evaluation Forum, Bologna, Italy, September 5th - to, 2022

2021
Automating Defense Against Adversarial Attacks: Discovery of Vulnerabilities and Application of Multi-INT Imagery to Protect Deployed Models.
CoRR, 2021

Local Translation Services for Neglected Languages.
CoRR, 2021

EMO-GAT: An Evolutionary Multi-Objective Method for Adversarial Training.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021

Adversarial UFP/UFN Attack Evolution.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021

Mitigating Attacks on Fake News Detection Systems using Genetic-Based Adversarial Training.
Proceedings of the IEEE Congress on Evolutionary Computation, 2021

2020
Systematic Attack Surface Reduction For Deployed Sentiment Analysis Models.
CoRR, 2020

A Study of the Impact of Evolutionary-Based Feature Selection for Fake News Detection.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

A Comparison of Genetic & Swarm Intelligence-Based Feature Selection Algorithms for Author Identification.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

The Adversarial UFP/UFN Attack: A New Threat to ML-based Fake News Detection Systems?
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

'Uh-oh Spaghetti-oh': When Successful Genetic and Evolutionary Feature Selection Makes You More Susceptible to Adversarial Authorship Attacks.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020

Author Identification of Micro-Messages via Multi-Channel Convolutional Neural Networks.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020

AARef: Exploiting Authorship Identifiers of Micro-Messages with Refinement Blocks.
Proceedings of the 19th IEEE International Conference on Machine Learning and Applications, 2020

Black Box to White Box: Discover Model Characteristics Based on Strategic Probing.
Proceedings of the Third International Conference on Artificial Intelligence for Industries, 2020

2018
Adversarial Authorship, Sentiment Analysis, and the AuthorWeb Zoo.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018

Authorship Attribution via Evolutionary Hybridization of Sentiment Analysis, LIWC, and Topic Modeling Features.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018

Authorship Attribution vs. Adversarial Authorship from a LIWC and Sentiment Analysis Perspective.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018

2017
An artificial immunity approach to malware detection in a mobile platform.
EURASIP J. Inf. Secur., 2017

Adversarial authorship, interactive evolutionary hill-climbing, and author CAAT-III.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

2016
Detection of Mobile Malware: An Artificial Immunity Approach.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Towards the Development of a Cyber Analysis & Advisement Tool (CAAT) for Mitigating De-Anonymization Attacks.
Proceedings of the 27th Modern Artificial Intelligence and Cognitive Science Conference 2016, 2016

Intrusion Detection Using a Multiple-Detector Set Artificial Immune System.
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Adversarial Authorship, AuthorWebs, and Entropy-Based Evolutionary Clustering.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

An Evolutionary General Regression Neural Network Classifier for Intrusion Detection.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

2015
Iris Template Extraction Via Bit Inconsistency and GRIT.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

Multispectral Recognition Using Genetic and Evolutionary Feature Extraction.
Proceedings of the 26th Modern AI and Cognitive Science Conference 2015, 2015

Micro Genetic and Evolutionary Feature Extraction: An Exploratory Data Analysis Approach for Multispectral Iris Recognition.
Proceedings of the Image Analysis and Recognition - 12th International Conference, 2015

2014
A Formal Framework for Identity in Cyber and Other Universes.
Proceedings of the 25th Modern Artificial Intelligence and Cognitive Science Conference 2014, 2014

Applying machine learning techniques in detecting Bacterial Vaginosis.
Proceedings of the 2014 International Conference on Machine Learning and Cybernetics, 2014

GA-based selection of vaginal microbiome features associated with bacterial vaginosis.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

Detecting bacterial vaginosis using machine learning.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

2013
Genetic and evolutionary biometrics: Exploring value preference space for hybrid feature weighting and selection.
Int. J. Intell. Comput. Cybern., 2013

Fly wing biometrics.
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management, 2013

Genetic Heuristic Development: Feature selection for author identification.
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management, 2013

2012
Genetic & Evolutionary Biometric Security: Disposable Feature Extractors for Mitigating Biometric Replay Attacks.
Proceedings of the Conference on Systems Engineering Research, 2012

Genetic and evolutionary methods for biometric feature reduction.
Int. J. Biom., 2012

Aerospace design optimization using a steady state real-coded genetic algorithm.
Appl. Math. Comput., 2012

Pixel Consistency, K-Tournament Selection, and Darwinian-Based Feature Extraction.
Proceedings of the 23rd Midwest Artificial Intelligence and Cognitive Science Conference 2012, 2012

Darwinian-Based Feature Extraction Using K-Means and Kohonen Clustering.
Proceedings of the 23rd Midwest Artificial Intelligence and Cognitive Science Conference 2012, 2012

Analyzing the cross-generalization ability of a hybrid genetic & evolutionary application for multibiometric feature weighting and selection.
Proceedings of the Genetic and Evolutionary Computation Conference, 2012

Mitigating replay attacks using Darwinian-based Feature Extraction.
Proceedings of the 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications, 2012

Permutation-based biometric authentication protocols for mitigating replay attacks.
Proceedings of the IEEE Congress on Evolutionary Computation, 2012

An artificial immune system for phishing detection.
Proceedings of the IEEE Congress on Evolutionary Computation, 2012

2011
Hybrid approach for Pareto front expansion in heuristics.
J. Oper. Res. Soc., 2011

Comparison of Genetic-based Feature Extraction Methods for Facial Recognition.
Proceedings of The 22nd Midwest Artificial Intelligence and Cognitive Science Conference 2011, 2011

GEFeWS: A Hybrid Genetic-Based Feature Weighting and Selection Algorithm for Multi-Biometric Recognition.
Proceedings of The 22nd Midwest Artificial Intelligence and Cognitive Science Conference 2011, 2011

Genetic-Based Selection and Weighting for LBP, oLBP, and Eigenface Feature Extraction.
Proceedings of The 22nd Midwest Artificial Intelligence and Cognitive Science Conference 2011, 2011

GEFeS: Genetic & evolutionary feature selection for periocular biometric recognition.
Proceedings of the 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management, 2011

Hybrid GAs for Eigen-based facial recognition.
Proceedings of the 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management, 2011

A comparison of GEC-based feature selection and weighting for multimodal biometric recognition.
Proceedings of the IEEE Congress on Evolutionary Computation, 2011

GEC-based multi-biometric fusion.
Proceedings of the IEEE Congress on Evolutionary Computation, 2011

SSGA & EDA based feature selection and weighting for face recognition.
Proceedings of the IEEE Congress on Evolutionary Computation, 2011

Genetic based LBP feature extraction and selection for facial recognition.
Proceedings of the 49th Annual Southeast Regional Conference, 2011

A comparison of genetic feature selection and weighting techniques for multi-biometric recognition.
Proceedings of the 49th Annual Southeast Regional Conference, 2011

GESLIC: genetic and evolutionary-based short-length iris codes.
Proceedings of the 49th Annual Southeast Regional Conference, 2011

2010
Unconstrained Biometric Identification: Emerging Technologies.
Computer, 2010

Genetic-Based Type II Feature Extraction for Periocular Biometric Recognition: Less is More.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

A Comparison of Two Genetic & Evolutionary Feature Selection Strategies for Periocular-Based Biometric Recognition via X-TOOLSS.
Proceedings of the 2010 International Conference on Genetic and Evolutionary Methods, 2010

Genetic & Evolutionary Type II feature extraction for periocular-based biometric recognition.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010

A class-specific ensemble feature selection approach for classification problems.
Proceedings of the 48th Annual Southeast Regional Conference, 2010

A two-phased approach to reducing the false accept rate of spoofed iris codes.
Proceedings of the 48th Annual Southeast Regional Conference, 2010

GEFE: genetic & evolutionary feature extraction for periocular-based biometric recognition.
Proceedings of the 48th Annual Southeast Regional Conference, 2010

2009
Iris Template Extraction Via Bit Inconsistency and GRIT.
Proceedings of the Encyclopedia of Biometrics, 2009

An evolutionary approach for achieving scalability with general regression neural networks.
Nat. Comput., 2009

Minimizing the number of bits needed for iris recognition via Bit Inconsistency and GRIT.
Proceedings of the 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, 2009

2008
A Sensor Network Architecture for Tsunami Detection and Response.
Int. J. Distributed Sens. Networks, 2008

Automated modeling of the guidance of a K-9.
Proceedings of the American Control Conference, 2008

Optimization of the multiple retailer supply chain management problem.
Proceedings of the 46th Annual Southeast Regional Conference, 2008

Training approaches in neural enhancement for multiobjective optimization.
Proceedings of the 46th Annual Southeast Regional Conference, 2008

Building diversity in the undergraduate computer science research pipeline.
Proceedings of the 46th Annual Southeast Regional Conference, 2008

2007
A Novel Optimization Process for Prediction of Complex Pore Geometry Via Genetic Search.
Intell. Autom. Soft Comput., 2007

Solving the semi-desirable facility location problem using bi-objective particle swarm.
Eur. J. Oper. Res., 2007

Distributed constraint satisfaction, restricted recombination, and genetic protocols.
Appl. Soft Comput., 2007

Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers.
Appl. Soft Comput., 2007

Bowl championship series vulnerability analysis.
Proceedings of the Richard Tapia Celebration of Diversity in Computing Conference 2007, 2007

Computer defense using artificial intelligence.
Proceedings of the 2007 Spring Simulation Multiconference, 2007

NEMO: neural enhancement for multiobjective optimization.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

2006
Modeling Displacement Properties of Immiscible Fluids in Porous Media.
Simul., 2006

The Application of Evolutionary Computation in Evacuation Planning.
Proceedings of the IEEE Intelligent Transportation Systems Conference, 2006

Neural Network Enhancement of Multiobjective Evolutionary Search.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

A Two-Population Evolutionary Algorithm for Constrained Optimization Problems.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

An Anomaly Detection-Based Classification System.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

Evacuation Planning via Evolutionary Computation.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

Evolving High-Performance Evolutionary Computations for Space Vehicle Design.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

Evolving General Regression Neural Networks for Tsunami Detection and Response.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

A Comparison of Evolutionary Protocols for Solving Distributed Constraint Satisfaction Problems.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

An evaluation of negative selection algorithm with constraint-based detectors.
Proceedings of the 44st Annual Southeast Regional Conference, 2006

2005
Recurrent distributed constraint satisfaction, virtual constraints, and meta-evolutionary protocols.
Int. J. Knowl. Based Intell. Eng. Syst., 2005

Distributed Asymmetric Constraint Satisfaction, the Phase Transition, and Evolutionary Protocols.
Intell. Autom. Soft Comput., 2005

An interactive distributed evolutionary algorithm (IDEA) for design.
Proceedings of the IEEE International Conference on Systems, 2005

Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA's genetic arms race.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

2004
Distributed Constraint Satisfaction, Restricted Recombination, and Hybrid Genetic Search.
Proceedings of the Genetic and Evolutionary Computation, 2004

Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers.
Proceedings of the Genetic and Evolutionary Computation, 2004

A comparison of distributed restricted recombination operators for genetic and evolutionary societies of hill-climbers: a DisACSP perspective.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

Bi-criteria model for locating a semi-desirable facility on a plane using particle swarm optimization.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

Constrained optimization problem solving using estimation of distribution algorithms.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

Comparing performance of binary-coded detectors and constraint-based detectors.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

Vulnerability analysis of AIS-based intrusion detection systems via genetic and particle swarm red teams.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

Recurrent distributed constraint satisfaction via genetic and evolutionary societies of hill-climbers.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

Non-deterministic decoding with memory to enhance precision in binary-coded genetic algorithms.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

2003
Solving Distributed Constraint Satisfaction Problems with an Ant-Like Society of Hill-Climbers.
Proceedings of the International Conference on Artificial Intelligence, 2003

Recurrent Distributed Constraint Satisfaction, Virtual Constraints and .Meta Evolutionary Societies of Hill-Climbers.
Proceedings of the International Conference on Artificial Intelligence, 2003

Solving Distributed Asymmetric Constraint Satisfaction Problems Using an Evolutionary Society of Hill-Climbers.
Proceedings of the Genetic and Evolutionary Computation, 2003

IDS Vulnerability Analysis Using Genertia Red Teams.
Proceedings of the International Conference on Security and Management, 2003

2002
Solving Multimodal Function Optimization Problems Using an Improved Parallel EC.
Proceedings of the International Conference on Artificial Intelligence, 2002

Solving Distributed Asymmetric CSPs via a Society of Hill-Climbers.
Proceedings of the International Conference on Artificial Intelligence, 2002

A comparison of adaptive virtual constraint identification strategies for recurrent dynamic constraint satisfaction.
Proceedings of the 2002 Congress on Evolutionary Computation, 2002

2001
Evolving robot behavior via interactive evolutionary computation: from real-world to simulation.
Proceedings of the 2001 ACM Symposium on Applied Computing (SAC), 2001

2000
Steady-State Evolutionary Path Planning, Adaptive Replacement, and Hyper-Diversity.
Proceedings of the Parallel Problem Solving from Nature, 2000

A Comparison of Operators for Solving Time dependent Traveling Salesman Problems Using Genetic Algorithms.
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO '00), 2000

Distributed Steady-State Neuro-Evolutionary Path Planning in Non-Stationary Environments Using Adaptive Replacement.
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO '00), 2000

Multiobjective particle swarm optimization.
Proceedings of the 38th Annual Southeast Regional Conference, 2000

1999
Odor detection using pulse coupled neural networks.
Proceedings of the International Joint Conference Neural Networks, 1999

Genetic Programming of Full Knowledge Bases for Fuzzy Logic Controllers.
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 1999), 1999

Evolutionary computation enhancement of olfactory system model.
Proceedings of the 1999 Congress on Evolutionary Computation, 1999

Genetic algorithms solution for unconstrained optimal crane control.
Proceedings of the 1999 Congress on Evolutionary Computation, 1999

1998
Solving constraint satisfaction problems using hybrid evolutionary search.
IEEE Trans. Evol. Comput., 1998

Artificial Potential Field-Based Motion Planning/Navigation, Dynamic Constrained Optimization and Simple Genetic Hill Climbing.
Simul., 1998

1997
Solving Randomly Generated Static and Dynamic Fuzzy Constraint Networks using Microevolutionary Hill-Climbing.
Intell. Autom. Soft Comput., 1997

Solving Static and Dynamic Fuzzy Constraint Networks Using Evolutionary Hill-Climbing.
Proceedings of the Evolutionary Programming VI, 6th International Conference, 1997

Fuzzy spatial relations.
Proceedings of the 35th Annual Southeast Regional Conference, 1997

Fuzzzy constraint network topology and evolutionary hill-climbing.
Proceedings of the 35th Annual Southeast Regional Conference, 1997

Hybrid evolutionary path planning via visibility-based repair.
Proceedings of the 35th Annual Southeast Regional Conference, 1997

1996
Constraint Satisfaction Using A Hybrid Evolutionary Hill-Climbing Algorithm That Performs Opportunistic Arc and Path Revision.
Proceedings of the Thirteenth National Conference on Artificial Intelligence and Eighth Innovative Applications of Artificial Intelligence Conference, 1996

1995
Solving Constraint Satisfaction Problems Using a Genetic/Systematic Search Hybrid That Realizes When to Quit.
Proceedings of the 6th International Conference on Genetic Algorithms, 1995

1994
Solbing Small and Large Scale Constraint Satisfaction Problems Using a Heuristic-Based Microgenetic Algorithm.
Proceedings of the First IEEE Conference on Evolutionary Computation, 1994


  Loading...