{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T04:02:40Z","timestamp":1750910560610,"version":"3.41.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,8]],"date-time":"2025-06-08T00:00:00Z","timestamp":1749340800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,8]],"date-time":"2025-06-08T00:00:00Z","timestamp":1749340800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,8]]},"DOI":"10.1109\/cec65147.2025.11043124","type":"proceedings-article","created":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T17:32:32Z","timestamp":1750786352000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Knowledge Transfer in the EMTO with Manifold Learning and Reinforcement Learning"],"prefix":"10.1109","author":[{"given":"Zhaoqi","family":"Wang","sequence":"first","affiliation":[{"name":"Xi&#x2019;an University of Technology Xi&#x2019;an University of Technology,The Key Laboratory of Network Computing and Security Technology of Shaanxi Province,Xi&#x2019;an,China,710048"}]},{"given":"Lei","family":"Wang","sequence":"additional","affiliation":[{"name":"Xi&#x2019;an University of Technology Xi&#x2019;an University of Technology,The Key Laboratory of Network Computing and Security Technology of Shaanxi Province,Xi&#x2019;an,China,710048"}]},{"given":"Qiaoyong","family":"Jiang","sequence":"additional","affiliation":[{"name":"Xi&#x2019;an University of Technology Xi&#x2019;an University of Technology,The Key Laboratory of Network Computing and Security Technology of Shaanxi Province,Xi&#x2019;an,China,710048"}]},{"given":"Xinhui","family":"Duan","sequence":"additional","affiliation":[{"name":"Xi&#x2019;an University of Technology Xi&#x2019;an University of Technology,The Key Laboratory of Network Computing and Security Technology of Shaanxi Province,Xi&#x2019;an,China,710048"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2015.2458037"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2906927"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2023.3281876"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.3036393"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2023.3258491"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2023.3323877"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2962865"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.10.066"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.70735"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6247911"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/tsmc.2023.3322718"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.2989465"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107464"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2021.3101697"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2991050"},{"article-title":"Evolutionary multitasking for single-objective continuous optimization: Benchmark problems, performance metric, and baseline results[J]","year":"2017","author":"Da","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2019.01408"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2904696"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.10.099"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2021.3068157"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.2974100"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2023.3273625"}],"event":{"name":"2025 IEEE Congress on Evolutionary Computation (CEC)","start":{"date-parts":[[2025,6,8]]},"location":"Hangzhou, China","end":{"date-parts":[[2025,6,12]]}},"container-title":["2025 IEEE Congress on Evolutionary Computation (CEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11042929\/11042912\/11043124.pdf?arnumber=11043124","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T05:43:54Z","timestamp":1750830234000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11043124\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,8]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/cec65147.2025.11043124","relation":{},"subject":[],"published":{"date-parts":[[2025,6,8]]}}}