29 Publications (Page 1 of 2)
2017
An artificial immunity approach to malware detection in a mobile platformBrown, James⋅Dozier, Gerry⋅Anwar, Mohd⋅Anwar, Mohd⋅Dozier, Gerry and Brown, JamesEURASIP Journal on Information Security, 20170301.
| Journal Article
2015
Facial Recognition Utilizing Patch Based Game TheoryAhmad, Foysal⋅Roy, Kaushik⋅O‟Connor, Brian⋅Shelton, Joseph⋅Arias, Pablo⋅Esterline, Albert and Dozier, GerryInternational Journal of Machine Learning and Computing, vol. 5, (no. 4), pp. 338, 2015-08-00.
| Journal Article
The Best Way to a Strong Defense is a Strong Offense: Mitigating Deanonymization Attacks via Iterative Language TranslationMack, Nathan⋅Bowers, Jasmine⋅Williams, Henry⋅Dozier, Gerry and Shelton, JosephInternational Journal of Machine Learning and Computing, vol. 5, (no. 5), pp. 413, 2015-10-00.
| Journal Article
2014
Applying machine learning techniques in detecting Bacterial VaginosisBaker, Yolanda S⋅Agrawal, Rajeev⋅Foster, James A⋅Beck, Daniel and Dozier, Gerry2014 International Conference on Machine Learning and Cybernetics, vol. 1, pp. 246, 2014-July.
| Journal Article
Detecting bacterial vaginosis using machine learningBaker, Yolanda S⋅Baker, Yolanda⋅Agrawal, Rajeev⋅Agrawal, Rajeev⋅Foster, James⋅Foster, James A⋅Beck, Daniel⋅Beck, Daniel⋅Dozier, Gerry and Dozier, GerryProceedings of the 2014 ACM Southeast Regional Conference, vol. 2014, pp. 4, 03-28-2014.
| Journal Article
Fly Wing Biometrics Using Modified Local Binary Pattern, SVMs and Random ForestAhmad, Foysal⋅Roy, Kaushik⋅O'Connor, Brian⋅Shelton, Joseph⋅Dozier, Gerry and Dworkin, IanInternational Journal of Machine Learning and Computing, vol. 4, (no. 3), pp. 285, 2014-06-00.
| Journal Article
GA-based selection of vaginal microbiome features associated with bacterial vaginosisCarter, Joi⋅Beck, Daniel⋅Williams, Henry⋅Dozier, Gerry and Foster, JamesProceedings of the 2014 Annual Conference on genetic and evolutionary computation, vol. 2014, pp. 268, 07-12-2014.
| Journal Article
Iris Recognition Using Fuzzy Level Set and GEFEO'Connor, Brian⋅Roy, Kaushik⋅Shelton, Joseph and Dozier, GerryInternational Journal of Machine Learning and Computing, vol. 4, (no. 3), pp. 231, 2014-06-00.
| Journal Article
Mitigating Iris-Based Replay AttacksShelton, Joseph⋅Roy, Kaushik⋅O’Connor, Brian and Dozier, Gerry VInternational Journal of Machine Learning and Computing, vol. 4, (no. 3), pp. 209, 2014-06-00.
| Journal Article
2013
Genetic and evolutionary biometricsAlford, Aniesha⋅Alford, Aniesha⋅Adams, Joshua⋅Adams, Joshua⋅Shelton, Joseph⋅Shelton, Joseph⋅Dozier, Gerry⋅Dozier, Gerry⋅Bryant, Kelvin⋅Bryant, Kelvin⋅Kelly, John and Kelly, JohnInternational Journal of Intelligent Computing and Cybernetics, vol. 6, (no. 1), pp. 20, 2013-03-22.
| Journal Article
2012
Aerospace design optimization using a steady state real-coded genetic algorithmDyer, John D⋅Dyer, John D⋅Hartfield, Roy J⋅Hartfield, Roy J⋅Dozier, Gerry V⋅Dozier, Gerry V⋅Burkhalter, John E and Burkhalter, John EApplied Mathematics and Computation, vol. 218, (no. 9), pp. 4730, 2012.
| Journal Article
Genetic and evolutionary methods for biometric feature reductionAlford, Aniesha⋅Bryant, Kelvin⋅Abegaz, Tamirat⋅Dozier, Gerry V⋅Kelly, John C⋅Shelton, Joseph⋅Small, Lasanio⋅Williams, Jared⋅Woodard, Damon L and Ricanek, KarlInternational Journal of Biometrics, vol. 4, (no. 3), pp. 220, 2012-00-00.
| Journal Article
Genetic & Evolutionary Biometric Security: Disposable Feature Extractors for Mitigating Biometric Replay AttacksShelton, Joseph⋅Bryant, Kelvin⋅Abrams, Sheldon⋅Small, Lasanio⋅Adams, Joshua⋅Leflore, Derrick⋅Alford, Aniesha⋅Ricanek, Karl and Dozier, GerryProcedia Computer Science, vol. 8, pp. 360, 2012.
| Journal Article
2009
An evolutionary approach for achieving scalability with general regression neural networksCasey, Kenan⋅Casey, Kenan⋅Casey, Kenan⋅Garrett, Aaron⋅Garrett, Aaron⋅Garrett, Aaron⋅Gay, Joseph⋅Gay, Joseph⋅Gay, Joseph⋅Montgomery, Lacey⋅Montgomery, Lacey⋅Montgomery, Lacey⋅Dozier, Gerry⋅Dozier, Gerry and Dozier, GerryNatural Computing, vol. 8, (no. 1), pp. 148, 20090300.
| Journal Article
Strategic bidding in electricity markets using particle swarm optimizationYucekaya, Ahmet D⋅Yucekaya, Ahmet D⋅Valenzuela, Jorge⋅Valenzuela, Jorge⋅Dozier, Gerry and Dozier, GerryElectric Power Systems Research, vol. 79, (no. 2), pp. 345, 2009.
| Journal Article
2008
A Sensor Network Architecture for Tsunami Detection and ResponseCasey, Kenan⋅Casey, Kenan⋅Lim, Alvin⋅Lim, Alvin S⋅Dozier, Gerry and Dozier, GerryInternational Journal of Distributed Sensor Networks, vol. 4, (no. 1), pp. 42, 2008.
| Journal Article
2007
Distributed constraint satisfaction, restricted recombination, and genetic protocolsDozier, Gerry⋅Dozier, Gerry⋅Cunningham, Hurley⋅Cunningham, Hurley⋅Britt, Winard⋅Britt, Winard⋅Wang, Yu⋅Wang, Yu⋅Seals, Cheryl⋅Seals, Cheryl⋅Zhang, Funing and Zhang, FuningApplied Soft Computing Journal, vol. 7, (no. 3), pp. 1011, 2007.
| Journal Article
Solving the semi-desirable facility location problem using bi-objective particle swarmYapicioglu, Haluk⋅Yapicioglu, Haluk⋅Smith, Alice E⋅Smith, Alice E⋅Dozier, Gerry and Dozier, GerryEuropean Journal of Operational Research, vol. 177, (no. 2), pp. 749, 2007.
| Journal Article
Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackersDozier, Gerry⋅Brown, Douglas⋅Hou, Haiyu and Hurley, JohnApplied Soft Computing Journal, vol. 7, (no. 2), pp. 553, 2007.
| Journal Article
2006
Evolutionary optimization of a geometrically refined trussHull, Patrick⋅Tinker, Michael and Dozier, GerryStructural and Multidisciplinary Optimization, vol. 31, (no. 4), pp. 319, 20060400.
| Journal Article
Modeling Displacement Properties of Immiscible Fluids in Porous MediaUnsal, Evren⋅Dane, Jacob H⋅Schwartz, Peter and Dozier, Gerry VSIMULATION, vol. 82, (no. 8), pp. 510, 20060800.
| Journal Article
2005
Distributed Asymmetric Constraint Satisfaction, the Phase Transition, and Evolutionary ProtocolsDozier, Gerry⋅Rupela, Varun and Fu, Ser-GeonIntelligent Automation & Soft Computing, vol. 11, (no. 4), pp. 275, 2005-01-00.
| Journal Article
Recurrent distributed constraint satisfaction, virtual constraints, and meta-evolutionary protocolsDozier, GerryInternational Journal of Knowledge-based and Intelligent Engineering Systems, vol. 9, (no. 1), pp. 31, 2005-01-29.
| Journal Article
2004
Using Genetic Algorithms to Aid in a Vulnerability Analysis of National Missile Defense Simulation SoftwareImsand, Eric S⋅Evans, Gordon⋅Dozier, Gerry and Hamilton, J. AThe Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, vol. 1, (no. 4), pp. 223, 20041000.
| Journal Article
2000
Commentary on: "A Nonlinear, GA-optimized, Fuzzy Logic System for the Evaluation of Multisource Biofunctional Intelligence"Dozier, GerryThe Journal of Mind and Behavior, vol. 21, (no. 1/2), pp. 151, 20000101.
| Journal Article