
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Memetic Algorithm Based on Probability Learning for Solving the Multidimensional Knapsack Problem
Zuocheng Li, Lixin Tang, Jiyin Liu
IEEE Transactions on Cybernetics (2020) Vol. 52, Iss. 4, pp. 2284-2299
Open Access | Times Cited: 30
Zuocheng Li, Lixin Tang, Jiyin Liu
IEEE Transactions on Cybernetics (2020) Vol. 52, Iss. 4, pp. 2284-2299
Open Access | Times Cited: 30
Showing 1-25 of 30 citing articles:
A survey on binary metaheuristic algorithms and their engineering applications
Jeng‐Shyang Pan, Pei Hu, Václav Snåšel, et al.
Artificial Intelligence Review (2022) Vol. 56, Iss. 7, pp. 6101-6167
Open Access | Times Cited: 60
Jeng‐Shyang Pan, Pei Hu, Václav Snåšel, et al.
Artificial Intelligence Review (2022) Vol. 56, Iss. 7, pp. 6101-6167
Open Access | Times Cited: 60
An active-learning Pareto evolutionary algorithm for parcel locker network design considering accessibility of customers
Rong-juan Luo, Wang Jia, Yuanyuan Ji
Computers & Operations Research (2022) Vol. 141, pp. 105677-105677
Closed Access | Times Cited: 29
Rong-juan Luo, Wang Jia, Yuanyuan Ji
Computers & Operations Research (2022) Vol. 141, pp. 105677-105677
Closed Access | Times Cited: 29
Decomposition-based multi-objective evolutionary algorithm for virtual machine and task joint scheduling of cloud computing in data space
Xianpeng Wang, Hangyu Lou, Zhiming Dong, et al.
Swarm and Evolutionary Computation (2023) Vol. 77, pp. 101230-101230
Closed Access | Times Cited: 16
Xianpeng Wang, Hangyu Lou, Zhiming Dong, et al.
Swarm and Evolutionary Computation (2023) Vol. 77, pp. 101230-101230
Closed Access | Times Cited: 16
Dual learning based Pareto evolutionary algorithm for a kind of multi-objective task assignment problem
Zuocheng Li, Qinglong Du, Bin Qian, et al.
Expert Systems with Applications (2025) Vol. 276, pp. 127006-127006
Closed Access
Zuocheng Li, Qinglong Du, Bin Qian, et al.
Expert Systems with Applications (2025) Vol. 276, pp. 127006-127006
Closed Access
Two-Stream Graph Convolutional Network-Incorporated Latent Feature Analysis
Fanghui Bi, Tiantian He, Yuetong Xie, et al.
IEEE Transactions on Services Computing (2023) Vol. 16, Iss. 4, pp. 3027-3042
Closed Access | Times Cited: 15
Fanghui Bi, Tiantian He, Yuetong Xie, et al.
IEEE Transactions on Services Computing (2023) Vol. 16, Iss. 4, pp. 3027-3042
Closed Access | Times Cited: 15
An adaptive binary quantum-behaved particle swarm optimization algorithm for the multidimensional knapsack problem
Xiaotong Li, Wei Fang, Shuwei Zhu, et al.
Swarm and Evolutionary Computation (2024) Vol. 86, pp. 101494-101494
Closed Access | Times Cited: 4
Xiaotong Li, Wei Fang, Shuwei Zhu, et al.
Swarm and Evolutionary Computation (2024) Vol. 86, pp. 101494-101494
Closed Access | Times Cited: 4
Optimal scheduling of a cogeneration system via Q-learning-based memetic algorithm considering demand-side response
Xinfu Pang, Yibao Wang, Yang Yu, et al.
Energy (2024) Vol. 300, pp. 131513-131513
Closed Access | Times Cited: 4
Xinfu Pang, Yibao Wang, Yang Yu, et al.
Energy (2024) Vol. 300, pp. 131513-131513
Closed Access | Times Cited: 4
Privacy-preserving and truthful auction-based resource allocation mechanisms for task offloading in mobile edge computing
Dongkuo Wu, Xingwei Wang, Xueyi Wang, et al.
Computer Networks (2025), pp. 111079-111079
Closed Access
Dongkuo Wu, Xingwei Wang, Xueyi Wang, et al.
Computer Networks (2025), pp. 111079-111079
Closed Access
An efficient binary spider wasp optimizer for multi-dimensional knapsack instances: experimental validation and analysis
Mohamed Abdel-Basset, Reda Mohamed, Karam M. Sallam, et al.
Journal Of Big Data (2025) Vol. 12, Iss. 1
Open Access
Mohamed Abdel-Basset, Reda Mohamed, Karam M. Sallam, et al.
Journal Of Big Data (2025) Vol. 12, Iss. 1
Open Access
Learning to Solve 3-D Bin Packing Problem via Deep Reinforcement Learning and Constraint Programming
Yuan Jiang, Zhiguang Cao, Jie Zhang
IEEE Transactions on Cybernetics (2021) Vol. 53, Iss. 5, pp. 2864-2875
Closed Access | Times Cited: 30
Yuan Jiang, Zhiguang Cao, Jie Zhang
IEEE Transactions on Cybernetics (2021) Vol. 53, Iss. 5, pp. 2864-2875
Closed Access | Times Cited: 30
Partition Independent Set and Reduction-Based Approach for Partition Coloring Problem
Enqiang Zhu, Fei Jiang, Chanjuan Liu, et al.
IEEE Transactions on Cybernetics (2020) Vol. 52, Iss. 6, pp. 4960-4969
Closed Access | Times Cited: 28
Enqiang Zhu, Fei Jiang, Chanjuan Liu, et al.
IEEE Transactions on Cybernetics (2020) Vol. 52, Iss. 6, pp. 4960-4969
Closed Access | Times Cited: 28
Active learning based hyper-heuristic for the integration of production and Transportation: A third-party logistics perspective
Zuocheng Li, Ling Bai, Bin Qian, et al.
Computers & Industrial Engineering (2024) Vol. 194, pp. 110381-110381
Closed Access | Times Cited: 3
Zuocheng Li, Ling Bai, Bin Qian, et al.
Computers & Industrial Engineering (2024) Vol. 194, pp. 110381-110381
Closed Access | Times Cited: 3
Hybrid Learning Moth Search Algorithm for Solving Multidimensional Knapsack Problems
Yanhong Feng, Hongmei Wang, Zhaoquan Cai, et al.
Mathematics (2023) Vol. 11, Iss. 8, pp. 1811-1811
Open Access | Times Cited: 8
Yanhong Feng, Hongmei Wang, Zhaoquan Cai, et al.
Mathematics (2023) Vol. 11, Iss. 8, pp. 1811-1811
Open Access | Times Cited: 8
Finding and exploring promising search space for The 0–1 Multidimensional Knapsack Problem
Jitao Xu, Hongbo Li, Minghao Yin
Applied Soft Computing (2024) Vol. 164, pp. 111934-111934
Open Access | Times Cited: 2
Jitao Xu, Hongbo Li, Minghao Yin
Applied Soft Computing (2024) Vol. 164, pp. 111934-111934
Open Access | Times Cited: 2
A Memetic Algorithm for Cooperative Complex Task Offloading in Heterogeneous Vehicular Networks
Hualing Ren, Kai Liu, Guozhi Yan, et al.
IEEE Transactions on Network Science and Engineering (2022) Vol. 10, Iss. 1, pp. 189-204
Closed Access | Times Cited: 10
Hualing Ren, Kai Liu, Guozhi Yan, et al.
IEEE Transactions on Network Science and Engineering (2022) Vol. 10, Iss. 1, pp. 189-204
Closed Access | Times Cited: 10
Tensor-Based Least-Squares Solutions for Multirelational Signals and Applications
Shih Yu Chang, Hsiao‐Chun Wu
IEEE Transactions on Cybernetics (2023) Vol. 54, Iss. 5, pp. 2852-2865
Closed Access | Times Cited: 4
Shih Yu Chang, Hsiao‐Chun Wu
IEEE Transactions on Cybernetics (2023) Vol. 54, Iss. 5, pp. 2852-2865
Closed Access | Times Cited: 4
A Collaborative Drone-Truck Delivery System With Memetic Computing Optimization
Ruonan Zhai, Yi Mei, Tong Guo, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2024) Vol. 54, Iss. 6, pp. 3618-3630
Closed Access | Times Cited: 1
Ruonan Zhai, Yi Mei, Tong Guo, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2024) Vol. 54, Iss. 6, pp. 3618-3630
Closed Access | Times Cited: 1
Truthful Auction-Based Resource Allocation Mechanisms With Flexible Task Offloading in Mobile Edge Computing
Xueyi Wang, Dongkuo Wu, Xingwei Wang, et al.
IEEE Transactions on Mobile Computing (2023) Vol. 23, Iss. 5, pp. 6377-6391
Closed Access | Times Cited: 4
Xueyi Wang, Dongkuo Wu, Xingwei Wang, et al.
IEEE Transactions on Mobile Computing (2023) Vol. 23, Iss. 5, pp. 6377-6391
Closed Access | Times Cited: 4
A bi-level model and memetic algorithm for arc interdiction location-routing problem
Ali Nadizadeh, Ali Sabzevari Zadeh
Computational and Applied Mathematics (2021) Vol. 40, Iss. 3
Closed Access | Times Cited: 9
Ali Nadizadeh, Ali Sabzevari Zadeh
Computational and Applied Mathematics (2021) Vol. 40, Iss. 3
Closed Access | Times Cited: 9
TMHSCA: a novel hybrid two-stage mutation with a sine cosine algorithm for discounted {0-1} knapsack problems
Yan Kang, Haining Wang, Bin Pu, et al.
Neural Computing and Applications (2023) Vol. 35, Iss. 17, pp. 12691-12713
Closed Access | Times Cited: 3
Yan Kang, Haining Wang, Bin Pu, et al.
Neural Computing and Applications (2023) Vol. 35, Iss. 17, pp. 12691-12713
Closed Access | Times Cited: 3
The Integration of the Metabolome and Transcriptome for Dendrobium nobile Lindl. in Response to Methyl Jasmonate
Daoyong Gong, Biao Li, Bin Wu, et al.
Molecules (2023) Vol. 28, Iss. 23, pp. 7892-7892
Open Access | Times Cited: 3
Daoyong Gong, Biao Li, Bin Wu, et al.
Molecules (2023) Vol. 28, Iss. 23, pp. 7892-7892
Open Access | Times Cited: 3
An effective hybrid search method for the quadratic knapsack problem with conflict graphs
Qing Zhou, Jin‐Kao Hao, Zhong‐Zhong Jiang, et al.
Journal of the Operational Research Society (2023) Vol. 75, Iss. 5, pp. 1000-1010
Closed Access | Times Cited: 2
Qing Zhou, Jin‐Kao Hao, Zhong‐Zhong Jiang, et al.
Journal of the Operational Research Society (2023) Vol. 75, Iss. 5, pp. 1000-1010
Closed Access | Times Cited: 2
A Collaborative Drone-Truck Delivery System with Memetic Computing Optimization
Ruonan Zhai, Yi Mei, Tong Guo, et al.
(2023)
Open Access | Times Cited: 2
Ruonan Zhai, Yi Mei, Tong Guo, et al.
(2023)
Open Access | Times Cited: 2
Probabilistic Analysis of an RL Circuit Transient Response under Inductor Failure Conditions
Muhammad Farooq‐i‐Azam, Zeashan Hameed Khan, Syed Raheel Hassan, et al.
Electronics (2022) Vol. 11, Iss. 23, pp. 4051-4051
Open Access | Times Cited: 3
Muhammad Farooq‐i‐Azam, Zeashan Hameed Khan, Syed Raheel Hassan, et al.
Electronics (2022) Vol. 11, Iss. 23, pp. 4051-4051
Open Access | Times Cited: 3
Ant-Antlion Optimizer with Similarity Information for Multidimensional Knapsack Problem
Yi Liu, Guoli Yang, Qibin Zheng, et al.
Communications in computer and information science (2024), pp. 243-255
Closed Access
Yi Liu, Guoli Yang, Qibin Zheng, et al.
Communications in computer and information science (2024), pp. 243-255
Closed Access