{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T06:10:01Z","timestamp":1750831801567,"version":"3.41.0"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,8]],"date-time":"2025-06-08T00:00:00Z","timestamp":1749340800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,8]],"date-time":"2025-06-08T00:00:00Z","timestamp":1749340800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100003536","name":"Youth Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100003536","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,8]]},"DOI":"10.1109\/cec65147.2025.11043074","type":"proceedings-article","created":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T17:32:32Z","timestamp":1750786352000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["Surrogate Models are not Necessary for Black-Box Expensive Optimization"],"prefix":"10.1109","author":[{"given":"Hongxiang","family":"Geng","sequence":"first","affiliation":[{"name":"Anhui University,Institutes of Physical Science and Information Technology,Hefei,China"}]},{"given":"Ye","family":"Tian","sequence":"additional","affiliation":[{"name":"Anhui University,School of Computer Science and Technology,Hefei,China"}]},{"given":"Shangshang","family":"Yang","sequence":"additional","affiliation":[{"name":"Anhui University,School of Computer Science and Technology,Hefei,China"}]},{"given":"Xingyi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Anhui University,School of Computer Science and Technology,Hefei,China"}]},{"given":"Cheng","family":"He","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology,School of Electrical and Electronic Engineering,Wuhan,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.enbuild.2016.02.034"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2514\/1.J056603"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2018.2869001"},{"issue":"6","key":"ref4","first-page":"119","article-title":"A statistical approach to some basic mine valuation problems on the Witwatersrand","volume":"52","author":"Krige","year":"1951","journal-title":"Journal of the Southern African Institute of Mining and Metallurgy"},{"key":"ref5","first-page":"143","volume-title":"Algorithms for approximation","author":"Powell","year":"1987"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008306431147"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2016.2622301"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09584-4_29"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2018.2802784"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2022.3152582"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2023.101323"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.23919\/cje.2022.00.100"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-022-00579-0"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-017-2965-0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15844-5_37"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2015.7257247"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s41965-024-00165-w"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2023.3291614"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-024-01465-5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/1090.001.0001"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008202821328"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MHS.1995.494215"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106512"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.2985081"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s41965-024-00172-x"},{"article-title":"The evolutionary computation methods no one should use","year":"2023","author":"Kudela","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1111\/itor.12001"},{"key":"ref28","article-title":"A universal framework for automatically generating single- and multi-objective evolutionary algorithms","author":"Tian","year":"2025","journal-title":"Under review"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2019.8790114"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2022.3226837"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.petrol.2019.106633"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/tevc.2023.3319640"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/4235.771163"},{"key":"ref34","article-title":"Benchmark functions for the CEC\u20192010 special session and competition on large-scale global optimization","volume-title":"Nature inspired computation and applications laboratory","author":"Tang","year":"2007"},{"key":"ref35","article-title":"Problem definitions and evaluation criteria for the CEC 2020 special session and competition on single objective bound constrained numerical optimization","volume-title":"Tech. Rep, Tech. Rep","author":"Yue","year":"2019"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.10.075"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/4235.585893"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2022.3146882"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2021.3060811"}],"event":{"name":"2025 IEEE Congress on Evolutionary Computation (CEC)","start":{"date-parts":[[2025,6,8]]},"location":"Hangzhou, China","end":{"date-parts":[[2025,6,12]]}},"container-title":["2025 IEEE Congress on Evolutionary Computation (CEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11042929\/11042912\/11043074.pdf?arnumber=11043074","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T05:28:22Z","timestamp":1750829302000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11043074\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,8]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/cec65147.2025.11043074","relation":{},"subject":[],"published":{"date-parts":[[2025,6,8]]}}}