{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:45:46Z","timestamp":1730267146125,"version":"3.28.0"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,1,4]],"date-time":"2021-01-04T00:00:00Z","timestamp":1609718400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,4]],"date-time":"2021-01-04T00:00:00Z","timestamp":1609718400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,4]],"date-time":"2021-01-04T00:00:00Z","timestamp":1609718400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,4]]},"DOI":"10.1109\/imcom51814.2021.9377426","type":"proceedings-article","created":{"date-parts":[[2021,3,17]],"date-time":"2021-03-17T20:18:40Z","timestamp":1616012320000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Evolutionary Algorithms and Efficient Data Analytics for Image Processing"],"prefix":"10.1109","author":[{"given":"Farid Ghareh","family":"Mohammadi","sequence":"first","affiliation":[]},{"given":"Farzan","family":"Shenavarmasouleh","sequence":"additional","affiliation":[]},{"given":"M. Hadi","family":"Amini","sequence":"additional","affiliation":[]},{"given":"Hamid R.","family":"Arabnia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.06.044"},{"key":"ref38","article-title":"Drdr: Automatic masking of exudates and microaneurysms caused by diabetic retinopathy using mask r-cnn and transfer learning","author":"shenavarmasouleh","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.10.004"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2286682"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2013.12.007"},{"key":"ref37","article-title":"A brief review of domain adaptation","author":"farahani","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref36","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"650503","DOI":"10.1117\/12.696774","article-title":"Merging markov and dct features for multi-class jpeg steganalysis","volume":"6505","author":"pevny","year":"2007","journal-title":"Security Steganography and Watermarking of Multimedia Contents IX"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2045842"},{"key":"ref10","article-title":"Evolutionary computation, optimization and learning algorithms for data science","author":"mohammadi","year":"2019","journal-title":"Optimization Learning and Control for Interdependent Complex Networks"},{"key":"ref40","article-title":"Deepmsrf: A novel deep multimodal speaker recognition framework with feature selection","author":"asali","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref11","article-title":"An idea based on honey bee swarm for numerical optimization","author":"karaboga","year":"2005","journal-title":"Technical Repor-Tr06t Erciyes University Engineering faculty"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2013.09.016"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.12.003"},{"key":"ref14","first-page":"1","article-title":"Artificial bee colony (abc) algorithm for engineering optimization problems","author":"gerhardt","year":"0","journal-title":"International Conference on Engineering Optimization"},{"key":"ref15","first-page":"593","author":"mohammadi","year":"2013","journal-title":"An improved image steganalysis using a novel feature selection algorithm based on artificial bee colony"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3233\/IFS-131111"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-015-0448-0"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-017-0989-x"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/RIOS.2016.7529499"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2008.4542096"},{"key":"ref4","article-title":"A survey of data mining techniques for steganalysis","author":"mohammadi","year":"2012","journal-title":"Recent advances in Steganography"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1995.488968"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2871749"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"78800","DOI":"10.1117\/12.872279","article-title":"Steganalysis in high dimensions: Fusing classifiers built on random subspaces","volume":"7880","author":"kodovsk\u00fd","year":"2011","journal-title":"Media Watermarking Security and Forensics"},{"journal-title":"Nature-Inspired Metaheuristic Algorithms","year":"2008","author":"yang","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1597817.1597830"},{"key":"ref8","article-title":"Applications of nature-inspired algorithms for dimension Reduction: Enabling efficient data analytics","author":"mohammadi","year":"2019","journal-title":"Optimization Learning and Control for Interdependent Complex Networks"},{"key":"ref7","first-page":"94090","article-title":"Phase-aware projection model for steganalysis of jpeg images","volume":"9409","author":"holub","year":"2015","journal-title":"Media Watermarking Security and Forensics 2015"},{"key":"ref2","first-page":"334","article-title":"Taming the curse of dimensionality: Discrete integration by hashing and optimization","author":"ermon","year":"0","journal-title":"International Conference on Machine Learning"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2020.100003"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/PCI.2011.45"},{"key":"ref46","article-title":"Leveraging decentralized artificial intelligence to enhance resilience of energy networks","author":"imteaj","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2017.8229953"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2950372"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-016-0610-3"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO.2018.8748522"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA40945.2020.9197393"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6155-6"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI49370.2019.00060"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96002-9_4"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI49370.2019.00055"},{"key":"ref26","first-page":"568","article-title":"Malware detection using artificial bee colony algorithm","author":"mohammadi","year":"0","journal-title":"Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers"},{"key":"ref43","article-title":"Curse of dimensionality on randomized smoothing for certifiable robustness","author":"kumar","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7168-5"}],"event":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","start":{"date-parts":[[2021,1,4]]},"location":"Seoul, Korea (South)","end":{"date-parts":[[2021,1,6]]}},"container-title":["2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9377321\/9377322\/09377426.pdf?arnumber=9377426","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:44:02Z","timestamp":1652197442000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9377426\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,4]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/imcom51814.2021.9377426","relation":{},"subject":[],"published":{"date-parts":[[2021,1,4]]}}}