1. Multi‐objective evolutionary approach to select security solutions. Issue 2 (25th April 2019) Authors: Lee, Yunghee; Choi, Tae Jong; Ahn, Chang Wook Journal: CAAI transactions on intelligence technology Issue: Volume 2:Issue 2(2017) Page Start: 64 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Automated test data generation based on particle swarm optimisation with convergence speed controller. Issue 2 (26th April 2019) Authors: Liu, Fangqing; Huang, Han; Li, Xueqiang; Hao, Zhifeng Journal: CAAI transactions on intelligence technology Issue: Volume 2:Issue 2(2017) Page Start: 73 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Common strategy to improve community detection performance based on the nodes' property. Issue 2 (25th April 2019) Authors: Du, Wei; He, Xiaochen Journal: CAAI transactions on intelligence technology Issue: Volume 2:Issue 2(2017) Page Start: 68 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Second‐order DE algorithm. Issue 2 (25th April 2019) Authors: Zhao, Xinchao; Xu, Guangzhi; Liu, Dongyue; Zuo, Xingquan Journal: CAAI transactions on intelligence technology Issue: Volume 2:Issue 2(2017) Page Start: 80 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Preface. Issue 2 (25th April 2019) Authors: Gong, Maoguo Journal: CAAI transactions on intelligence technology Issue: Volume 2:Issue 2(2017) Page Start: 63 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗