Gerry V. Dozier

According to our database1, Gerry V. Dozier authored at least 103 papers between 1994 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
An artificial immunity approach to malware detection in a mobile platform.
EURASIP J. Information Security, 2017

2016
Detection of Mobile Malware: An Artificial Immunity Approach.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Towards the Development of a Cyber Analysis & Advisement Tool (CAAT) for Mitigating De-Anonymization Attacks.
Proceedings of the 27th Modern Artificial Intelligence and Cognitive Science Conference 2016, 2016

Intrusion Detection Using a Multiple-Detector Set Artificial Immune System.
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Adversarial Authorship, AuthorWebs, and Entropy-Based Evolutionary Clustering.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

An Evolutionary General Regression Neural Network Classifier for Intrusion Detection.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

2015
Iris Template Extraction Via Bit Inconsistency and GRIT.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

Multispectral Recognition Using Genetic and Evolutionary Feature Extraction.
Proceedings of the 26th Modern AI and Cognitive Science Conference 2015, 2015

Micro Genetic and Evolutionary Feature Extraction: An Exploratory Data Analysis Approach for Multispectral Iris Recognition.
Proceedings of the Image Analysis and Recognition - 12th International Conference, 2015

2014
A Formal Framework for Identity in Cyber and Other Universes.
Proceedings of the 25th Modern Artificial Intelligence and Cognitive Science Conference 2014, 2014

Applying machine learning techniques in detecting Bacterial Vaginosis.
Proceedings of the 2014 International Conference on Machine Learning and Cybernetics, 2014

GA-based selection of vaginal microbiome features associated with bacterial vaginosis.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

Detecting bacterial vaginosis using machine learning.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

2013
Genetic and evolutionary biometrics: Exploring value preference space for hybrid feature weighting and selection.
Int. J. Intelligent Computing and Cybernetics, 2013

Fly wing biometrics.
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management, 2013

Genetic Heuristic Development: Feature selection for author identification.
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management, 2013

2012
Genetic & Evolutionary Biometric Security: Disposable Feature Extractors for Mitigating Biometric Replay Attacks.
Proceedings of the Conference on Systems Engineering Research, 2012

Genetic and evolutionary methods for biometric feature reduction.
IJBM, 2012

Aerospace design optimization using a steady state real-coded genetic algorithm.
Applied Mathematics and Computation, 2012

Pixel Consistency, K-Tournament Selection, and Darwinian-Based Feature Extraction.
Proceedings of the 23rd Midwest Artificial Intelligence and Cognitive Science Conference 2012, 2012

Darwinian-Based Feature Extraction Using K-Means and Kohonen Clustering.
Proceedings of the 23rd Midwest Artificial Intelligence and Cognitive Science Conference 2012, 2012

Analyzing the cross-generalization ability of a hybrid genetic & evolutionary application for multibiometric feature weighting and selection.
Proceedings of the Genetic and Evolutionary Computation Conference, 2012

Mitigating replay attacks using Darwinian-based Feature Extraction.
Proceedings of the 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications, 2012

Permutation-based biometric authentication protocols for mitigating replay attacks.
Proceedings of the IEEE Congress on Evolutionary Computation, 2012

An artificial immune system for phishing detection.
Proceedings of the IEEE Congress on Evolutionary Computation, 2012

2011
Hybrid approach for Pareto front expansion in heuristics.
JORS, 2011

Comparison of Genetic-based Feature Extraction Methods for Facial Recognition.
Proceedings of The 22nd Midwest Artificial Intelligence and Cognitive Science Conference 2011, 2011

GEFeWS: A Hybrid Genetic-Based Feature Weighting and Selection Algorithm for Multi-Biometric Recognition.
Proceedings of The 22nd Midwest Artificial Intelligence and Cognitive Science Conference 2011, 2011

Genetic-Based Selection and Weighting for LBP, oLBP, and Eigenface Feature Extraction.
Proceedings of The 22nd Midwest Artificial Intelligence and Cognitive Science Conference 2011, 2011

GEFeS: Genetic & evolutionary feature selection for periocular biometric recognition.
Proceedings of the 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management, 2011

Hybrid GAs for Eigen-based facial recognition.
Proceedings of the 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management, 2011

A comparison of GEC-based feature selection and weighting for multimodal biometric recognition.
Proceedings of the IEEE Congress on Evolutionary Computation, 2011

GEC-based multi-biometric fusion.
Proceedings of the IEEE Congress on Evolutionary Computation, 2011

SSGA & EDA based feature selection and weighting for face recognition.
Proceedings of the IEEE Congress on Evolutionary Computation, 2011

Genetic based LBP feature extraction and selection for facial recognition.
Proceedings of the 49th Annual Southeast Regional Conference, 2011

A comparison of genetic feature selection and weighting techniques for multi-biometric recognition.
Proceedings of the 49th Annual Southeast Regional Conference, 2011

GESLIC: genetic and evolutionary-based short-length iris codes.
Proceedings of the 49th Annual Southeast Regional Conference, 2011

2010
Unconstrained Biometric Identification: Emerging Technologies.
IEEE Computer, 2010

Genetic-Based Type II Feature Extraction for Periocular Biometric Recognition: Less is More.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

A Comparison of Two Genetic & Evolutionary Feature Selection Strategies for Periocular-Based Biometric Recognition via X-TOOLSS.
Proceedings of the 2010 International Conference on Genetic and Evolutionary Methods, 2010

Genetic & Evolutionary Type II feature extraction for periocular-based biometric recognition.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010

A class-specific ensemble feature selection approach for classification problems.
Proceedings of the 48th Annual Southeast Regional Conference, 2010

A two-phased approach to reducing the false accept rate of spoofed iris codes.
Proceedings of the 48th Annual Southeast Regional Conference, 2010

GEFE: genetic & evolutionary feature extraction for periocular-based biometric recognition.
Proceedings of the 48th Annual Southeast Regional Conference, 2010

2009
Iris Template Extraction Via Bit Inconsistency and GRIT.
Proceedings of the Encyclopedia of Biometrics, 2009

An evolutionary approach for achieving scalability with general regression neural networks.
Natural Computing, 2009

Minimizing the number of bits needed for iris recognition via Bit Inconsistency and GRIT.
Proceedings of the 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, 2009

2008
A Sensor Network Architecture for Tsunami Detection and Response.
IJDSN, 2008

Optimization of the multiple retailer supply chain management problem.
Proceedings of the 46th Annual Southeast Regional Conference, 2008

Training approaches in neural enhancement for multiobjective optimization.
Proceedings of the 46th Annual Southeast Regional Conference, 2008

Building diversity in the undergraduate computer science research pipeline.
Proceedings of the 46th Annual Southeast Regional Conference, 2008

2007
A Novel Optimization Process for Prediction of Complex Pore Geometry Via Genetic Search.
Intelligent Automation & Soft Computing, 2007

Solving the semi-desirable facility location problem using bi-objective particle swarm.
European Journal of Operational Research, 2007

Distributed constraint satisfaction, restricted recombination, and genetic protocols.
Appl. Soft Comput., 2007

Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers.
Appl. Soft Comput., 2007

Bowl championship series vulnerability analysis.
Proceedings of the Richard Tapia Celebration of Diversity in Computing Conference 2007, 2007

Computer defense using artificial intelligence.
Proceedings of the 2007 Spring Simulation Multiconference, 2007

NEMO: neural enhancement for multiobjective optimization.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

2006
Modeling Displacement Properties of Immiscible Fluids in Porous Media.
Simulation, 2006

The Application of Evolutionary Computation in Evacuation Planning.
Proceedings of the IEEE Intelligent Transportation Systems Conference, 2006

Neural Network Enhancement of Multiobjective Evolutionary Search.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

A Two-Population Evolutionary Algorithm for Constrained Optimization Problems.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

An Anomaly Detection-Based Classification System.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

Evacuation Planning via Evolutionary Computation.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

Evolving High-Performance Evolutionary Computations for Space Vehicle Design.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

Evolving General Regression Neural Networks for Tsunami Detection and Response.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

A Comparison of Evolutionary Protocols for Solving Distributed Constraint Satisfaction Problems.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

An evaluation of negative selection algorithm with constraint-based detectors.
Proceedings of the 44st Annual Southeast Regional Conference, 2006

2005
Recurrent distributed constraint satisfaction, virtual constraints, and meta-evolutionary protocols.
KES Journal, 2005

Distributed Asymmetric Constraint Satisfaction, the Phase Transition, and Evolutionary Protocols.
Intelligent Automation & Soft Computing, 2005

An interactive distributed evolutionary algorithm (IDEA) for design.
Proceedings of the IEEE International Conference on Systems, 2005

Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA's genetic arms race.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

2004
Distributed Constraint Satisfaction, Restricted Recombination, and Hybrid Genetic Search.
Proceedings of the Genetic and Evolutionary Computation, 2004

Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers.
Proceedings of the Genetic and Evolutionary Computation, 2004

A comparison of distributed restricted recombination operators for genetic and evolutionary societies of hill-climbers: a DisACSP perspective.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

Bi-criteria model for locating a semi-desirable facility on a plane using particle swarm optimization.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

Constrained optimization problem solving using estimation of distribution algorithms.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

Comparing performance of binary-coded detectors and constraint-based detectors.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

Vulnerability analysis of AIS-based intrusion detection systems via genetic and particle swarm red teams.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

Recurrent distributed constraint satisfaction via genetic and evolutionary societies of hill-climbers.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

Non-deterministic decoding with memory to enhance precision in binary-coded genetic algorithms.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

2003
Solving Distributed Constraint Satisfaction Problems with an Ant-Like Society of Hill-Climbers.
Proceedings of the International Conference on Artificial Intelligence, 2003

Recurrent Distributed Constraint Satisfaction, Virtual Constraints and .Meta Evolutionary Societies of Hill-Climbers.
Proceedings of the International Conference on Artificial Intelligence, 2003

Solving Distributed Asymmetric Constraint Satisfaction Problems Using an Evolutionary Society of Hill-Climbers.
Proceedings of the Genetic and Evolutionary Computation, 2003

IDS Vulnerability Analysis Using Genertia Red Teams.
Proceedings of the International Conference on Security and Management, 2003

2002
Solving Multimodal Function Optimization Problems Using an Improved Parallel EC.
Proceedings of the International Conference on Artificial Intelligence, 2002

Solving Distributed Asymmetric CSPs via a Society of Hill-Climbers.
Proceedings of the International Conference on Artificial Intelligence, 2002

2001
Evolving robot behavior via interactive evolutionary computation: from real-world to simulation.
Proceedings of the 2001 ACM Symposium on Applied Computing (SAC), 2001

2000
Steady-State Evolutionary Path Planning, Adaptive Replacement, and Hyper-Diversity.
Proceedings of the Parallel Problem Solving from Nature, 2000

A Comparison of Operators for Solving Time dependent Traveling Salesman Problems Using Genetic Algorithms.
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO '00), 2000

Distributed Steady-State Neuro-Evolutionary Path Planning in Non-Stationary Environments Using Adaptive Replacement.
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO '00), 2000

Multiobjective particle swarm optimization.
Proceedings of the 38th Annual Southeast Regional Conference, 2000

1999
Genetic Programming of Full Knowledge Bases for Fuzzy Logic Controllers.
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 1999), 1999

1998
Solving constraint satisfaction problems using hybrid evolutionary search.
IEEE Trans. Evolutionary Computation, 1998

Artificial Potential Field-Based Motion Planning/Navigation, Dynamic Constrained Optimization and Simple Genetic Hill Climbing.
Simulation, 1998

1997
Solving Randomly Generated Static and Dynamic Fuzzy Constraint Networks using Microevolutionary Hill-Climbing.
Intelligent Automation & Soft Computing, 1997

Solving Static and Dynamic Fuzzy Constraint Networks Using Evolutionary Hill-Climbing.
Proceedings of the Evolutionary Programming VI, 6th International Conference, 1997

Fuzzy spatial relations.
Proceedings of the 35th Annual Southeast Regional Conference, 1997

Fuzzzy constraint network topology and evolutionary hill-climbing.
Proceedings of the 35th Annual Southeast Regional Conference, 1997

Hybrid evolutionary path planning via visibility-based repair.
Proceedings of the 35th Annual Southeast Regional Conference, 1997

1996
Constraint Satisfaction Using A Hybrid Evolutionary Hill-Climbing Algorithm That Performs Opportunistic Arc and Path Revision.
Proceedings of the Thirteenth National Conference on Artificial Intelligence and Eighth Innovative Applications of Artificial Intelligence Conference, 1996

1995
Solving Constraint Satisfaction Problems Using a Genetic/Systematic Search Hybrid That Realizes When to Quit.
Proceedings of the 6th International Conference on Genetic Algorithms, 1995

1994
Solbing Small and Large Scale Constraint Satisfaction Problems Using a Heuristic-Based Microgenetic Algorithm.
Proceedings of the First IEEE Conference on Evolutionary Computation, 1994


  Loading...