{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T05:50:46Z","timestamp":1762321846865,"version":"3.37.3"},"reference-count":169,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Marsden Fund of New Zealand"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Top. Comput. Intell."],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1109\/tetci.2019.2923426","type":"journal-article","created":{"date-parts":[[2020,6,22]],"date-time":"2020-06-22T21:54:16Z","timestamp":1592862856000},"page":"616-629","source":"Crossref","is-referenced-by-count":22,"title":["Computational Intelligence for Information Security: A Survey"],"prefix":"10.1109","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7117-2772","authenticated-orcid":false,"given":"Ruili","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2406-3156","authenticated-orcid":false,"given":"Wanting","family":"Ji","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref168","doi-asserted-by":"crossref","first-page":"22","DOI":"10.4304\/jcp.2.2.25-36","article-title":"Defending cyberspace with fake honeypots","volume":"2","author":"rowe","year":"2007","journal-title":"J Comput"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.269"},{"key":"ref39","first-page":"1","article-title":"What is computational intelligence?","author":"bezdek","year":"1994","journal-title":"Computational Intelligence Imitating Life"},{"key":"ref38","first-page":"3","article-title":"Computational intelligence: An introduction","author":"fulcher","year":"2008","journal-title":"Computational Intelligence"},{"key":"ref33","article-title":"Computational intelligence: Synergies of fuzzy logic","author":"siddique","year":"2013","journal-title":"Neural Networks and Evolutionary Computing"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1146598.1146618"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222310210"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0041"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-58930-0_2"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/0888-613X(92)90013-P"},{"key":"ref35","first-page":"737","article-title":"Intelligence: Computational versus artificial","volume":"4","author":"bezdek","year":"1993","journal-title":"IEEE Trans Neural Netw"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-2990-3.ch013"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WIMOB.2005.1512911"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2007.898832"},{"key":"ref29","first-page":"130","article-title":"Information-theoretic measures for anomaly detection","author":"lee","year":"0","journal-title":"Proc IEEE Int Symp Secur Privacy"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMR.433-440.5118"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1655925.1656163"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2012.181"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2010.91"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.12.009"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.11.004"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/380995.381030"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13681-8_47"},{"key":"ref100","first-page":"119","article-title":"A new handwritten signature verification system based on the histogram of templates feature and the joint use of the artificial immune system with SVM","author":"serdouk","year":"0","journal-title":"Proc IFIP Int Conf Comput Intell Appl"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/1740600.1740604"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1925101.1925106"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996831"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2762828"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.111"},{"key":"ref155","first-page":"1","article-title":"The red team toolbox, a method for penetration tests","author":"virta","year":"0","journal-title":"Proc Eur Inst Comput Antivirus Res Conf"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2015.7139074"},{"key":"ref152","first-page":"344","article-title":"Network intrusion detection based on semi-supervised variational auto-encoder","author":"osada","year":"0","journal-title":"Proc Euro Symp Res Computer Security"},{"key":"ref151","article-title":"Auto-encoding variational Bayes","author":"kingma","year":"2014","journal-title":"arXiv 1312 6114"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2779446"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2806741"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/78.650093"},{"key":"ref149","first-page":"611","article-title":"Recognizing functions in binaries with neural networks","author":"shin","year":"0","journal-title":"Proc Usenix Secur Symp"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3182165"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3206025.3206031"},{"key":"ref57","first-page":"127","article-title":"Malware analysis of imaged binary samples by convolutional neural network with attention mechanism","author":"yakura","year":"0","journal-title":"Proc ACM Conf Data Appl Secur Privacy"},{"key":"ref56","first-page":"1","article-title":"A review of soft computing techniques in biometrics","author":"goel","year":"0","journal-title":"Proc 2nd Int Conf Recent Adv Eng Comput Sci"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2017.2755000"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3125640"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2930669"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2089094.2089108"},{"key":"ref40","article-title":"Computational intelligence","author":"craenen","year":"2002","journal-title":"Encyclopedia Life Support Sciences"},{"key":"ref167","first-page":"203","article-title":"Counterplanning deceptions to foil cyber-attack plans","author":"rowe","year":"0","journal-title":"Proc IEEE Syst Man Cybern Soc Inf Assur Workshop"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1002\/cplx.20005"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1145\/971617.971645"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1002\/cplx.20011"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1007\/BF03219929"},{"key":"ref162","first-page":"1","article-title":"MINDS: A new approach to the information security process","author":"eilertson","year":"2004","journal-title":"Bull Army High Performance Comput Res Center"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1264860"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-0140-8_1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/6294.952979"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-012-0683-0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-014-1539-7"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2791941"},{"key":"ref159","article-title":"Recommended practices: Improving industrial control systems cybersecurity with defense-in-depth strategies","author":"stouffer","year":"2009","journal-title":"Dept Homeland Secur Control Syst Secur Program Nat Cyber Secur Division"},{"key":"ref8","first-page":"37","article-title":"Intruder detection using a wireless sensor network with an intelligent mobile robot response","author":"li","year":"0","journal-title":"Proc Int Conf Southeastcon"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1740600.1740603"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99007-1_52"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.17"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4481348"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/sec.75"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/91.493904"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.26"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/GRC.2005.1547300"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2009.02.023"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2009.06.019"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71984-7_1"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1326561.1326569"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1142\/9789814261302_0040"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134619"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.02.006"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.234"},{"key":"ref72","first-page":"1","article-title":"Focused web crawling using decay concept and genetic programming","volume":"1","author":"bazarganigilani","year":"2011","journal-title":"International Journal of Data Mining &amp; Knowledge Management Process"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04091-7_16"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098186"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070536"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref76","first-page":"42","article-title":"Genetic programming and K-nearest neighbor classifier based intrusion detection model","author":"malhotra","year":"0","journal-title":"Proc 7th Int Conf Cloud Comput Data Sci Eng"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC.2011.6022065"},{"key":"ref130","first-page":"595","article-title":"Meerkat: Detecting website defacements through image-based object recognition","author":"borgolte","year":"0","journal-title":"Proc 24th USENIX Conf Security Symp"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16549-3_5"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/2908961.2931682"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2668221"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.11.050"},{"key":"ref131","first-page":"1988","article-title":"Deep learning face representation by joint identification-verification","author":"sun","year":"0","journal-title":"Proc 27th Int Conf Neural Inf Process Syst"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2008.2002171"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390294"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2771230"},{"key":"ref135","first-page":"349","article-title":"Latent orientation field estimation via convolutional neural network","author":"cao","year":"0","journal-title":"Proc Int Conf Biometrics"},{"key":"ref138","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2014","journal-title":"arXiv 1409 1556"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2636093"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943535"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2520880"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/1380422.1380425"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30265-2_1"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2012.26"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.06.023"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.04.022"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2692722"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/s10462-016-9459-9","article-title":"A new data hiding method based on chaos embedded genetic algorithm for color image","volume":"46","author":"do?an","year":"2016","journal-title":"Artif Intell Rev"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2016.7550082"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2012.4208"},{"key":"ref142","article-title":"Deep face recognition","volume":"1","author":"parkhi","year":"0","journal-title":"Proc Brit Mach Vis Conf"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI.2015.7218109"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2807791"},{"key":"ref69","first-page":"13","article-title":"Anomaly based intrusion detection system using genetic algorithm and k-centroid clustering","volume":"163","author":"chakrabarty","year":"2017","journal-title":"Int J Comput Appl"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2710946"},{"key":"ref2","article-title":"Deep learning in information security","author":"thaler","year":"2018","journal-title":"arXiv 1809 04332"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2548421"},{"journal-title":"The Basics of Information Security Understanding the Fundamentals of InfoSec in Theory and Practice","year":"2014","author":"andress","key":"ref1"},{"key":"ref95","first-page":"420","article-title":"Feature selection for intrusion detection system using ant colony optimization","volume":"18","author":"aghdam","year":"2016","journal-title":"Int J Netw Security"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2016.7532518"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6380-z"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2542258"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.05.040"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2013.08.004"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.08.015"},{"key":"ref106","first-page":"1224","article-title":"Security issues and attacks in wireless sensor network","volume":"30","author":"anwar","year":"2014","journal-title":"World Appl Sci J"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2375-8"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/I2MTC.2013.6555372"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2018.01.013"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600267CM"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45110-2_125"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/11589990_146"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5308-3"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.12.006"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.050113.00191"},{"key":"ref98","first-page":"1","article-title":"Artificial immune system based intrusion detection: innate immunity using an unsupervised learning approach","volume":"8","author":"hosseinpour","year":"2014","journal-title":"Int J Digital Content Technol Appl"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/CCOMS.2018.8463274"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.03.042"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.11.028"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"225","DOI":"10.3923\/jse.2014.225.238","article-title":"Intrusion detection system based on integration of neural network for wireless sensor network","volume":"8","author":"lu","year":"2014","journal-title":"J Softw Eng"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2014.2380816"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2016.7732298"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.04.016"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.07.042"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3199478.3199504"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2012.12.021"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30483-8_27"},{"key":"ref16","first-page":"1","article-title":"Big data analytics: Computational intelligence techniques and application areas","author":"iqbal","year":"2018","journal-title":"Technol Forecasting Social Change"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.5120\/8727-2602"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39787-5_32"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.040310.00002"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.05.037"},{"key":"ref18","first-page":"1","article-title":"Computational intelligence paradigms: An overview","author":"el-alfy","year":"0","journal-title":"Proc Improving Inf Secur Pract Through Comput Intell"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.06.012"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.05.010"},{"key":"ref19","first-page":"100","article-title":"A high performance steganographic method using JPEG and PSO algorithm","author":"fazli","year":"0","journal-title":"Proc Int Multitopic Conf"},{"key":"ref114","first-page":"920","article-title":"Image steganography using non embedding and average technique in transform domain","volume":"6","author":"sathisha","year":"2015","journal-title":"Int J Sci Eng Res"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22720-2_26"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/AISP.2012.6313773"},{"key":"ref116","first-page":"1","article-title":"A review of artificial intelligence in the internet of things","volume":"5","author":"gonz\u00e1lez garc\u00eda","year":"2019","journal-title":"Int J Artif Intell Interact Multimedia"},{"key":"ref115","doi-asserted-by":"crossref","first-page":"708","DOI":"10.1016\/j.asoc.2015.01.066","article-title":"Fuzzy decision method to improve the information exchange in a vehicle sensor tracking system","volume":"35","author":"cueva-fernandez","year":"2015","journal-title":"Appl Soft Comput"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.02.036"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17563-3_28"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/IASP.2010.5476056"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:20059022"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref85","first-page":"36","article-title":"Ant colony optimization","author":"dorigo","year":"2011","journal-title":"Encyclopedia of Machine Learning"},{"key":"ref86","first-page":"179","article-title":"Digital watermarking using ant colony optimization in fractional Fourier domain","volume":"1","author":"al-qaheri","year":"2010","journal-title":"J Inf Hiding Multimed Signal Process"},{"key":"ref87","first-page":"303","article-title":"Optimal image watermarking algorithm based on LWT-SVD via multi-objective ant colony optimization","volume":"2","author":"loukhaoukha","year":"2011","journal-title":"J Inf Hiding Multimed Signal Process"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/921270"}],"container-title":["IEEE Transactions on Emerging Topics in Computational Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7433297\/9204568\/09122043.pdf?arnumber=9122043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T12:43:15Z","timestamp":1651063395000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9122043\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10]]},"references-count":169,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tetci.2019.2923426","relation":{},"ISSN":["2471-285X"],"issn-type":[{"type":"electronic","value":"2471-285X"}],"subject":[],"published":{"date-parts":[[2020,10]]}}}