{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:26:59Z","timestamp":1775143619500,"version":"3.50.1"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62176228"],"award-info":[{"award-number":["62176228"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61876164"],"award-info":[{"award-number":["61876164"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Foundation of Education Bureau of Hunan Province, China","award":["21A0444"],"award-info":[{"award-number":["21A0444"]}]},{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province, China","doi-asserted-by":"publisher","award":["2022JJ40452"],"award-info":[{"award-number":["2022JJ40452"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province, China","doi-asserted-by":"publisher","award":["2020JJ4590"],"award-info":[{"award-number":["2020JJ4590"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]},{"name":"General Project of Hunan Education Department","award":["21C0077"],"award-info":[{"award-number":["21C0077"]}]},{"DOI":"10.13039\/501100019081","name":"Science and Technology Program of Hunan Province","doi-asserted-by":"publisher","award":["2018TP1036"],"award-info":[{"award-number":["2018TP1036"]}],"id":[{"id":"10.13039\/501100019081","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Foundation of Education Bureau of Hunan Province, China","award":["22B0139"],"award-info":[{"award-number":["22B0139"]}]},{"name":"UKRI Future Leaders Fellowship","award":["MR\/S017062\/1"],"award-info":[{"award-number":["MR\/S017062\/1"]}]},{"name":"UKRI Future Leaders Fellowship","award":["MR\/X011135\/1"],"award-info":[{"award-number":["MR\/X011135\/1"]}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["62076056"],"award-info":[{"award-number":["62076056"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000288","name":"Royal Society","doi-asserted-by":"publisher","award":["IES\/R2\/212077"],"award-info":[{"award-number":["IES\/R2\/212077"]}],"id":[{"id":"10.13039\/501100000288","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"EPSRC","doi-asserted-by":"publisher","award":["2404317"],"award-info":[{"award-number":["2404317"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Amazon Research Award"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Evol. Computat."],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1109\/tevc.2023.3260306","type":"journal-article","created":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T17:56:43Z","timestamp":1679507803000},"page":"267-280","source":"Crossref","is-referenced-by-count":73,"title":["A Multipopulation Evolutionary Algorithm Using New Cooperative Mechanism for Solving Multiobjective Problems With Multiconstraint"],"prefix":"10.1109","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5115-4040","authenticated-orcid":false,"given":"Juan","family":"Zou","sequence":"first","affiliation":[{"name":"Hunan Engineering Research Center of Intelligent System Optimization and Security, Key Laboratory of Intelligent Computing and Information Processing, Ministry of Education of China, and the Key Laboratory of Hunan Province for Internet of Things and Information Security, Xiangtan University, Xiangtan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4863-6529","authenticated-orcid":false,"given":"Ruiqing","family":"Sun","sequence":"additional","affiliation":[{"name":"Hunan Engineering Research Center of Intelligent System Optimization and Security, Key Laboratory of Intelligent Computing and Information Processing, Ministry of Education of China, and the Key Laboratory of Hunan Province for Internet of Things and Information Security, Xiangtan University, Xiangtan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2576-7836","authenticated-orcid":false,"given":"Yuan","family":"Liu","sequence":"additional","affiliation":[{"name":"Hunan Engineering Research Center of Intelligent System Optimization and Security, Key Laboratory of Intelligent Computing and Information Processing, Ministry of Education of China, and the Key Laboratory of Hunan Province for Internet of Things and Information Security, Xiangtan University, Xiangtan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6442-3086","authenticated-orcid":false,"given":"Yaru","family":"Hu","sequence":"additional","affiliation":[{"name":"Hunan Engineering Research Center of Intelligent System Optimization and Security, Key Laboratory of Intelligent Computing and Information Processing, Ministry of Education of China, and the Key Laboratory of Hunan Province for Internet of Things and Information Security, Xiangtan University, Xiangtan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7222-4917","authenticated-orcid":false,"given":"Shengxiang","family":"Yang","sequence":"additional","affiliation":[{"name":"Hunan Engineering Research Center of Intelligent System Optimization and Security, Key Laboratory of Intelligent Computing and Information Processing, Ministry of Education of China, and the Key Laboratory of Hunan Province for Internet of Things and Information Security, Xiangtan University, Xiangtan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1989-5150","authenticated-orcid":false,"given":"Jinhua","family":"Zheng","sequence":"additional","affiliation":[{"name":"Hunan Engineering Research Center of Intelligent System Optimization and Security, Key Laboratory of Intelligent Computing and Information Processing, Ministry of Education of China, and the Key Laboratory of Hunan Province for Internet of Things and Information Security, Xiangtan University, Xiangtan, China"}]},{"given":"Ke","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Exeter, Exeter, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2021.3069814"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2514\/6.1992-4758"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.07.110"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2021.3089155"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S1474-0346(02)00011-3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2018.2855411"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2020.3004012"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2021.3066301"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2022.3145582"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-05880-5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-03794-x"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.07.078"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1162\/evco_a_00259"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2896967"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2006.1688283"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/cec.2010.5586545"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISAI.2016.0115"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/11903697_43"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2858843"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2013.2281533"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2007.4424864"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2016.7743830"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/4235.585893"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.3021138"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2894743"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2018.08.017"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2007.892759"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2021.100978"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.01.029"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2021.3056176"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/tcyb.2022.3163759"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2017.2742868"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/tevc.2022.3186667"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2010.2059031"},{"key":"ref36","first-page":"115","article-title":"Simulated binary crossover for continuous search space","volume":"9","author":"Agrawal","year":"2000","journal-title":"Complex Syst."},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2003.810761"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2005.851275"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108732"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/0098-1354(89)85053-7"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2016.2586678"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ECCE.2010.5618413"}],"container-title":["IEEE Transactions on Evolutionary Computation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4235\/10416818\/10078268.pdf?arnumber=10078268","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T17:38:13Z","timestamp":1728409093000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10078268\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2]]},"references-count":42,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tevc.2023.3260306","relation":{},"ISSN":["1089-778X","1089-778X","1941-0026"],"issn-type":[{"value":"1089-778X","type":"print"},{"value":"1089-778X","type":"print"},{"value":"1941-0026","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2]]}}}