Wenbo Fang

Orcid: 0000-0002-5081-9503

According to our database1, Wenbo Fang authored at least 19 papers between 2008 and 2026.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2026
A feature selection method based on clonal selection with beneficial noise.
Pattern Recognit., 2026

2025
Automatic penetration testing model based on reinforcement learning for complex network environments.
J. Supercomput., July, 2025

Defending Against APT Attacks in Cloud Computing Environments Using Grouped Multiagent Deep Reinforcement Learning.
IEEE Internet Things J., June, 2025

CSCAD: An Adaptive LightGBM Algorithm to Detect Cache Side-Channel Attacks.
IEEE Trans. Dependable Secur. Comput., 2025

NSA-AE: An inadequately represented immune spaces NSA augmented via autoencoders.
Neurocomputing, 2025

Weak Population-Empowered Large-Scale Multiobjective Immune Algorithm.
Int. J. Intell. Syst., 2025

2024
Corrections to "A Hierarchical Unmanned Aerial Vehicle Network Intrusion Detection and Response Approach Based on Immune Vaccine Distribution".
IEEE Internet Things J., December, 2024

A Hierarchical Unmanned Aerial Vehicle Network Intrusion Detection and Response Approach Based on Immune Vaccine Distribution.
IEEE Internet Things J., October, 2024

SynDroid: An adaptive enhanced Android malware classification method based on CTGAN-SVM.
Comput. Secur., February, 2024

A fast dual-module hybrid high-dimensional feature selection algorithm.
Inf. Sci., 2024

Two-stage video anomaly detection based on dual-stream networks and multi-instance learning.
IET Image Process., 2024

SPAW-SMOTE: Space Partitioning Adaptive Weighted Synthetic Minority Oversampling Technique For Imbalanced Data Set Learning.
Comput. J., 2024

An adaptive detection framework based on artificial immune for IoT intrusion detection system.
Appl. Soft Comput., 2024

2023
Comprehensive Android Malware Detection Based on Federated Learning Architecture.
IEEE Trans. Inf. Forensics Secur., 2023

An Attack Entity Deducing Model for Attack Forensics.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

2022
Spatial and temporal changes analysis of air quality before and after the COVID-19 in Shandong Province, China.
Earth Sci. Informatics, 2022

A comparative study of threshold selection methods for change detection from very high-resolution remote sensing images.
Earth Sci. Informatics, 2022

2020
AMC-MDL: A Novel Approach of Android Malware Classification using Multimodel Deep Learning.
Proceedings of the IEEE Intl Conf on Dependable, 2020

2008
The Application of Intelligent Learning System Based on Network.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008


  Loading...