{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:27:04Z","timestamp":1775143624314,"version":"3.50.1"},"reference-count":63,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Guangdong Natural Science Funds for Distinguished Young Scholars","award":["2022B1515020049"],"award-info":[{"award-number":["2022B1515020049"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61873095"],"award-info":[{"award-number":["61873095"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong Regional Joint Fund for Basic and Applied Research","award":["2021B1515120078"],"award-info":[{"award-number":["2021B1515120078"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Evol. Computat."],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1109\/tevc.2022.3170638","type":"journal-article","created":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T19:49:26Z","timestamp":1651088966000},"page":"370-384","source":"Crossref","is-referenced-by-count":27,"title":["Contrastive Learning: An Alternative Surrogate for Offline Data-Driven Evolutionary Computation"],"prefix":"10.1109","volume":"27","author":[{"given":"Hao-Gan","family":"Huang","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, South China University of Technology, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5648-1160","authenticated-orcid":false,"given":"Yue-Jiao","family":"Gong","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, South China University of Technology, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0967-0661(02)00081-3"},{"key":"ref2","volume-title":"Evolutionary Algorithms in Engineering Applications","author":"Dasgupta","year":"2013"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3103143"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2948596"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2939224"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.09.042"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1993.1.1.1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1115\/DETC2001\/DAC-21063"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37548-5_16"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2016.7850211"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2016.2555315"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/10426914.2016.1269923"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2011.05.001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2018.2869001"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI44817.2019.9002961"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2016.2622301"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2005.1555050"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2514\/6.2000-4776"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20282-7_43"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2002.800884"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2021.3060833"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2018.2834881"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.3008280"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2020.2979740"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2020.100800"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2925959"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2017.2785351"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2017.2783441"},{"issue":"3","key":"ref29","first-page":"193","article-title":"Genetic algorithms, tournament selection, and the effects of noise","volume":"9","author":"Miller","year":"1995","journal-title":"Complex Syst."},{"key":"ref30","first-page":"116","article-title":"The GENITOR algorithm and selection pressure: Why rank-based allocation of reproductive trials is best","volume-title":"Proc. 3rd Int. Conf. Genet. Algorithms","author":"Whitley"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2010.2059031"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2011.5949859"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-012-1282-4"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15844-5_37"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107747"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.2985081"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s00158-019-02391-8"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2710978"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2020.3017865"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2018.2802784"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775067"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2020.2986348"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2475174"},{"issue":"2","key":"ref44","first-page":"115","article-title":"Simulated binary crossover for continuous search space","volume":"9","author":"Deb","year":"1995","journal-title":"Complex Syst."},{"key":"ref45","first-page":"1597","article-title":"A simple framework for contrastive learning of visual representations","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Chen"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001493000339"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref48","article-title":"A sensitivity analysis of (and practitioners\u2019 guide to) convolutional neural networks for sentence classification","author":"Zhang","year":"2015","journal-title":"arXiv:1510.03820"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1038\/323533a0"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01261-8_28"},{"key":"ref51","first-page":"281","article-title":"Some methods for classification and analysis of multivariate observations","volume-title":"Proc. 5th Berkeley Symp. Math. Stat. Probab.","volume":"1","author":"MacQueen"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00131"},{"key":"ref53","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv:1412.6980"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-014-1283-z"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/368996.369025"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1987.10488205"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2011.02.002"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2526032"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3014296"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1049\/itr2.12049"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.29172\/ca680354e15b45baadd17f966f2c0ae2"},{"key":"ref62","article-title":"Conservative Q-learning for offline reinforcement learning","author":"Kumar","year":"2020","journal-title":"arXiv:2006.04779"},{"key":"ref63","first-page":"10358","article-title":"Conservative objective models for effective offline model-based optimization","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Trabucco"}],"container-title":["IEEE Transactions on Evolutionary Computation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4235\/10089199\/09763851.pdf?arnumber=9763851","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T21:57:11Z","timestamp":1705960631000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9763851\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4]]},"references-count":63,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tevc.2022.3170638","relation":{},"ISSN":["1089-778X","1089-778X","1941-0026"],"issn-type":[{"value":"1089-778X","type":"print"},{"value":"1089-778X","type":"print"},{"value":"1941-0026","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4]]}}}