29 Publications (Page 1 of 2)
2017
An artificial immunity approach to malware detection in a mobile platform
Brown, JamesDozier, GerryAnwar, MohdAnwar, MohdDozier, Gerry and Brown, James
EURASIP Journal on Information Security, 20170301. | Journal Article
2015
Facial Recognition Utilizing Patch Based Game Theory
Ahmad, FoysalRoy, KaushikO‟Connor, BrianShelton, JosephArias, PabloEsterline, Albert and Dozier, Gerry
International Journal of Machine Learning and Computing, vol. 5, (no. 4), pp. 338, 2015-08-00. | Journal Article
 
The Best Way to a Strong Defense is a Strong Offense: Mitigating Deanonymization Attacks via Iterative Language Translation
Mack, NathanBowers, JasmineWilliams, HenryDozier, Gerry and Shelton, Joseph
International Journal of Machine Learning and Computing, vol. 5, (no. 5), pp. 413, 2015-10-00. | Journal Article
2014
Applying machine learning techniques in detecting Bacterial Vaginosis
Baker, Yolanda SAgrawal, RajeevFoster, James ABeck, Daniel and Dozier, Gerry
2014 International Conference on Machine Learning and Cybernetics, vol. 1, pp. 246, 2014-July. | Journal Article
 
Detecting bacterial vaginosis using machine learning
Baker, Yolanda SBaker, YolandaAgrawal, RajeevAgrawal, RajeevFoster, JamesFoster, James ABeck, DanielBeck, DanielDozier, Gerry and Dozier, Gerry
Proceedings of the 2014 ACM Southeast Regional Conference, vol. 2014, pp. 4, 03-28-2014. | Journal Article
 
Fly Wing Biometrics Using Modified Local Binary Pattern, SVMs and Random Forest
Ahmad, FoysalRoy, KaushikO'Connor, BrianShelton, JosephDozier, Gerry and Dworkin, Ian
International Journal of Machine Learning and Computing, vol. 4, (no. 3), pp. 285, 2014-06-00. | Journal Article
 
GA-based selection of vaginal microbiome features associated with bacterial vaginosis
Carter, JoiBeck, DanielWilliams, HenryDozier, Gerry and Foster, James
Proceedings of the 2014 Annual Conference on genetic and evolutionary computation, vol. 2014, pp. 268, 07-12-2014. | Journal Article
 
Iris Recognition Using Fuzzy Level Set and GEFE
O'Connor, BrianRoy, KaushikShelton, Joseph and Dozier, Gerry
International Journal of Machine Learning and Computing, vol. 4, (no. 3), pp. 231, 2014-06-00. | Journal Article
 
Mitigating Iris-Based Replay Attacks
Shelton, JosephRoy, KaushikO’Connor, Brian and Dozier, Gerry V
International Journal of Machine Learning and Computing, vol. 4, (no. 3), pp. 209, 2014-06-00. | Journal Article
2013
Genetic and evolutionary biometrics
Alford, AnieshaAlford, AnieshaAdams, JoshuaAdams, JoshuaShelton, JosephShelton, JosephDozier, GerryDozier, GerryBryant, KelvinBryant, KelvinKelly, John and Kelly, John
International Journal of Intelligent Computing and Cybernetics, vol. 6, (no. 1), pp. 20, 2013-03-22. | Journal Article
2012
Aerospace design optimization using a steady state real-coded genetic algorithm
Dyer, John DDyer, John DHartfield, Roy JHartfield, Roy JDozier, Gerry VDozier, Gerry VBurkhalter, John E and Burkhalter, John E
Applied Mathematics and Computation, vol. 218, (no. 9), pp. 4730, 2012. | Journal Article
 
Genetic and evolutionary methods for biometric feature reduction
Alford, AnieshaBryant, KelvinAbegaz, TamiratDozier, Gerry VKelly, John CShelton, JosephSmall, LasanioWilliams, JaredWoodard, Damon L and Ricanek, Karl
International Journal of Biometrics, vol. 4, (no. 3), pp. 220, 2012-00-00. | Journal Article
 
Genetic & Evolutionary Biometric Security: Disposable Feature Extractors for Mitigating Biometric Replay Attacks
Shelton, JosephBryant, KelvinAbrams, SheldonSmall, LasanioAdams, JoshuaLeflore, DerrickAlford, AnieshaRicanek, Karl and Dozier, Gerry
Procedia Computer Science, vol. 8, pp. 360, 2012. | Journal Article
2009
An evolutionary approach for achieving scalability with general regression neural networks
Casey, KenanCasey, KenanCasey, KenanGarrett, AaronGarrett, AaronGarrett, AaronGay, JosephGay, JosephGay, JosephMontgomery, LaceyMontgomery, LaceyMontgomery, LaceyDozier, GerryDozier, Gerry and Dozier, Gerry
Natural Computing, vol. 8, (no. 1), pp. 148, 20090300. | Journal Article
 
Strategic bidding in electricity markets using particle swarm optimization
Yucekaya, Ahmet DYucekaya, Ahmet DValenzuela, JorgeValenzuela, JorgeDozier, Gerry and Dozier, Gerry
Electric Power Systems Research, vol. 79, (no. 2), pp. 345, 2009. | Journal Article
2008
A Sensor Network Architecture for Tsunami Detection and Response
Casey, KenanCasey, KenanLim, AlvinLim, Alvin SDozier, Gerry and Dozier, Gerry
International Journal of Distributed Sensor Networks, vol. 4, (no. 1), pp. 42, 2008. | Journal Article
2007
Distributed constraint satisfaction, restricted recombination, and genetic protocols
Dozier, GerryDozier, GerryCunningham, HurleyCunningham, HurleyBritt, WinardBritt, WinardWang, YuWang, YuSeals, CherylSeals, CherylZhang, Funing and Zhang, Funing
Applied Soft Computing Journal, vol. 7, (no. 3), pp. 1011, 2007. | Journal Article
 
Solving the semi-desirable facility location problem using bi-objective particle swarm
Yapicioglu, HalukYapicioglu, HalukSmith, Alice ESmith, Alice EDozier, Gerry and Dozier, Gerry
European Journal of Operational Research, vol. 177, (no. 2), pp. 749, 2007. | Journal Article
 
Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers
Dozier, GerryBrown, DouglasHou, Haiyu and Hurley, John
Applied Soft Computing Journal, vol. 7, (no. 2), pp. 553, 2007. | Journal Article
2006
Evolutionary optimization of a geometrically refined truss
Hull, PatrickTinker, Michael and Dozier, Gerry
Structural and Multidisciplinary Optimization, vol. 31, (no. 4), pp. 319, 20060400. | Journal Article
 
Modeling Displacement Properties of Immiscible Fluids in Porous Media
Unsal, EvrenDane, Jacob HSchwartz, Peter and Dozier, Gerry V
SIMULATION, vol. 82, (no. 8), pp. 510, 20060800. | Journal Article
2005
Distributed Asymmetric Constraint Satisfaction, the Phase Transition, and Evolutionary Protocols
Dozier, GerryRupela, Varun and Fu, Ser-Geon
Intelligent Automation & Soft Computing, vol. 11, (no. 4), pp. 275, 2005-01-00. | Journal Article
 
Recurrent distributed constraint satisfaction, virtual constraints, and meta-evolutionary protocols
Dozier, Gerry
International Journal of Knowledge-based and Intelligent Engineering Systems, vol. 9, (no. 1), pp. 31, 2005-01-29. | Journal Article
2004
Using Genetic Algorithms to Aid in a Vulnerability Analysis of National Missile Defense Simulation Software
Imsand, Eric SEvans, GordonDozier, Gerry and Hamilton, J. A
The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, vol. 1, (no. 4), pp. 223, 20041000. | Journal Article
2000
Commentary on: "A Nonlinear, GA-optimized, Fuzzy Logic System for the Evaluation of Multisource Biofunctional Intelligence"
Dozier, Gerry
The Journal of Mind and Behavior, vol. 21, (no. 1/2), pp. 151, 20000101. | Journal Article