Li Pan

Orcid: 0000-0002-0424-9845

Affiliations:
  • Shanghai Jiao Tong University, Shanghai, China


According to our database1, Li Pan authored at least 81 papers between 2004 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Compressing Transfer: Mutual Learning- Empowered Knowledge Distillation for Temporal Knowledge Graph Reasoning.
IEEE Trans. Neural Networks Learn. Syst., August, 2025

Beyond Uniform Criteria: Scenario-Adaptive Multi-Dimensional Jailbreak Evaluation.
CoRR, August, 2025

From Cluster Assumption to Graph Convolution: Graph-Based Semi-Supervised Learning Revisited.
IEEE Trans. Neural Networks Learn. Syst., July, 2025

A Survey of Protocol Fuzzing.
ACM Comput. Surv., February, 2025

Distinguish Confusion in Legal Judgment Prediction via Revised Relation Knowledge.
ACM Trans. Inf. Syst., January, 2025

CDCGAN: Class Distribution-aware Conditional GAN-based minority augmentation for imbalanced node classification.
Neural Networks, 2025

LaF-transformer: Leveraging coupling text-graph embedding for semantic calibration in textual entailment.
Knowl. Based Syst., 2025

Deep unsupervised clustering by information maximization on Gaussian mixture autoencoders.
Inf. Sci., 2025

CoST: Comprehensive structural and temporal learning of social propagation for fake news detection.
Neurocomputing, 2025

Multi-perspective API call sequence behavior analysis and fusion for malware classification.
Comput. Secur., 2025

2024
JORA: Weakly Supervised User Identity Linkage via Jointly Learning to Represent and Align.
IEEE Trans. Neural Networks Learn. Syst., March, 2024

LSTEG: An evolutionary game model leveraging deep reinforcement learning for privacy behavior analysis on social networks.
Inf. Sci., 2024

TODEAR: Promoting explainable TKG reasoning through temporal offset enhanced dynamic embedding and adaptive reinforcement learning.
Inf. Sci., 2024

Incorporating target-aware knowledge into prompt-tuning for few-shot stance detection.
Inf. Process. Manag., 2024

rLLM: Relational Table Learning with LLMs.
CoRR, 2024

COOL: Comprehensive Knowledge Enhanced Prompt Learning for Domain Adaptive Few-shot Fake News Detection.
CoRR, 2024

PaPa: Propagation Pattern Enhanced Prompt Learning for Zero-Shot Rumor Detection.
Proceedings of the Neural Information Processing - 31st International Conference, 2024

MINES: Multi-perspective API Call Sequence Behavior Fusion Malware Classification.
Proceedings of the Database Systems for Advanced Applications, 2024

2023
Leveraging multimodal features for knowledge graph entity alignment based on dynamic self-attention networks.
Expert Syst. Appl., October, 2023

Variety-aware GAN and online learning augmented self-training model for knowledge graph entity alignment.
Inf. Process. Manag., September, 2023

Attribute Augmented Network Embedding Based on Generative Adversarial Nets.
IEEE Trans. Neural Networks Learn. Syst., July, 2023

Dominant coverage for target users at the lowest cost under competitive propagation in social networks.
Comput. Networks, May, 2023

Meta-Information Fusion of Hierarchical Semantics Dependency and Graph Structure for Structured Text Classification.
ACM Trans. Knowl. Discov. Data, February, 2023

A Unified Generative Adversarial Learning Framework for Improvement of Skip-Gram Network Representation Learning Methods.
IEEE Trans. Knowl. Data Eng., 2023

Homogeneous Entity Context Enhanced Representation Network for Temporal Knowledge Graph Reasoning.
Proceedings of the IEEE International Conference on Data Mining, 2023

Multimodal Features Enhanced Named Entity Recognition Based on Self-Attention Mechanism.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

2022
CAMU: Cycle-Consistent Adversarial Mapping Model for User Alignment Across Social Networks.
IEEE Trans. Cybern., 2022

Leveraging Diversity-Aware Context Attention Networks for Fake News Detection on Social Platforms.
Proceedings of the International Joint Conference on Neural Networks, 2022

Malware Detection with Limited Supervised Information via Contrastive Learning on API Call Sequences.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

Asymmetrical Context-aware Modulation for Collaborative Filtering Recommendation.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

Domain Adaptation for Stance Detection towards Unseen Target on Social Media.
Proceedings of the 10th International Conference on Affective Computing and Intelligent Interaction, 2022

2021
Mining Set of Interested Communities with Limited Exemplar Nodes for Network Based Services.
IEEE Trans. Serv. Comput., 2021

SG-PAC: A stochastic game approach to generate personal privacy paradox access-control policies in social networks.
Comput. Secur., 2021

Contrastive Multi-View Multiplex Network Embedding with Applications to Robust Network Alignment.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Data-Driven Influential Nodes Identification in Dynamic Social Networks.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

How are You Affected? A Structural Graph Neural Network Model Predicting Individual Social Influence Status.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

Attribute Network Embedding Method based on Joint Clustering of Representation and Network.
Proceedings of the BDCAT '21: 2021 IEEE/ACM 8th International Conference on Big Data Computing, Applications and Technologies, Leicester, United Kingdom, December 6, 2021

2020
Mode decomposition based deep learning model for multi-section traffic prediction.
World Wide Web, 2020

Multimodal Deep Network Embedding With Integrated Structure and Attribute Information.
IEEE Trans. Neural Networks Learn. Syst., 2020

Making Privacy Protection Investment Decisions in Social Networks: An Interdependent Security Game Approach.
Proceedings of the Security and Privacy in Digital Economy, 2020

GeST: A Grid Embedding based Spatio-Temporal Correlation Model for Crime Prediction.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

Distinguish Confusing Law Articles for Legal Judgment Prediction.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

2019
Multi-node Mode Decomposition Based Deep Learning Model for Road Section Traffic Prediction.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Influence Maximization on Large-Scale Networks with a Group-Based Method via Network Embedding.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Understanding Acdamic Impact Development by Predicting the G-index In Collaboration Networks.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

ADCrowdNet: An Attention-Injective Deformable Convolutional Network for Crowd Understanding.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

2018
Mining application-aware community organization with expanded feature subspaces from concerned attributes in social networks.
Knowl. Based Syst., 2018

Dominated competitive influence maximization with time-critical and time-delayed diffusion in social networks.
J. Comput. Sci., 2018

Least Cost Rumor Community Blocking optimization in Social Networks.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

An Improved Group-based Influence Maximization Method in Social Networks.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

Least Cost Precision Marketing Based on User Profiles in Social Networks.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

Designing focused crawler based on improved genetic algorithm.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018

Mode Decomposition Based Hybrid Model for Traffic Flow Prediction.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Privacy-Aware Personal Information Propagation Management in Social Networks.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Traffic Status Evaluation Based on Possibilistic Fuzzy C-Means Clustering Algorithm.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Detecting malware based on expired command-and-control traffic.
Int. J. Distributed Sens. Networks, 2017

Scalable influence blocking maximization in social networks under competitive independent cascade models.
Comput. Networks, 2017

Combinational Meta-paths Mining for Correlation Relationship Evaluation in Bibliographic Networks.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

2016
Puppet attack: A denial of service attack in advanced metering infrastructure network.
J. Netw. Comput. Appl., 2016

Multi-objective community detection method by integrating users' behavior attributes.
Neurocomputing, 2016

Uncovering fuzzy communities in networks with structural similarity.
Neurocomputing, 2016

Survey on Domain Name System Security.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

GEV Regression with Convex Loss Applied to Imbalanced Binary Classification.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Detecting Malicious Server Based on Server-to-Server Realation Graph.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Automatic Threshold Calculation Based Label Propagation Algorithm for Overlapping Community.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2015
Matrix Based Community Evolution Events Detection in Online Social Networks.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Overlapping Community Detection Using NVPA.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

2014
A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network.
J. Electr. Comput. Eng., 2014

A neighborhood vector propagation algorithm for community detection.
Proceedings of the IEEE Global Communications Conference, 2014

Detecting highly overlapping community structure based on Maximal Clique Networks.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

Influence Maximization in Independent Cascade Model with Limited Propagation Distance.
Proceedings of the Web Technologies and Applications, 2014

2012
Constructing the On/Off Covert Channel on Xen.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
Evaluating the transmission rate of covert timing channels in a network.
Comput. Networks, 2011

2010
Fast file dissemination in peer-to-peer networks with upstream bandwidth constraint.
Future Gener. Comput. Syst., 2010

Implementing a passive network covert timing channel.
Comput. Secur., 2010

2009
A study of on/off timing channel based on packet delay distribution.
Comput. Secur., 2009

Extending the CIM-SPL policy language with RBAC for distributed management systems in the WBEM infrastructure.
Proceedings of the Integrated Network Management, 2009

2008
Peer-to-Peer Based Fast File Dissemination in UMTS Networks.
IEICE Trans. Commun., 2008

2007
The Necessity of Combining ELN and SACK to Improve TCP Performance over Heterogeneous Networks.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

2005
An improvement on efficient anonymous auction protocols.
Comput. Secur., 2005

2004
Further analysis of password authentication schemes based on authentication tests.
Comput. Secur., 2004


  Loading...