Wenhao Yan

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
Images are Worth Variable Length of Representations.
CoRR, June, 2025

Sentient: Multi-Scenario Behavioral Intent Analysis for Advanced Persistent Threat Detection.
CoRR, February, 2025

Brewing Vodka: Distilling Pure Knowledge for Lightweight Threat Detection in Audit Logs.
Proceedings of the ACM on Web Conference 2025, 2025

PanThreat: Global Resource-Based Anomaly Detection for APTs.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025

Autumn: An Unsupervised APT Detection via Detailed Process-Level Analysis.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025

MPKAN: APT Attack Detection on Audit Logs via Graph Semantic Enhancement.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025

2024
Social inequity of park accessibility in Taiyuan: highlighting the unfair layout of parks in second-tier cities of China and the relative role of contributors.
Geo spatial Inf. Sci., July, 2024

Winemaking: Extracting Essential Insights for Efficient Threat Detection in Audit Logs.
CoRR, 2024

UAV-enabled fair offloading for MEC networks: a DRL approach based on actor-critic parallel architecture.
Appl. Intell., 2024

Multi-Robot Cooperative Pursuit-Evasion Control: A DeepReinforcement Learning Approach based on Prioritized Experience Replay.
Proceedings of the 2024 8th International Conference on Control Engineering and Artificial Intelligence, 2024

2023
An Efficient Imbalance-Aware Federated Learning Approach for Wearable Healthcare with Autoregressive Ratio Observation.
CoRR, 2023

Fairness-Aware Computation Efficiency Maximization for Multi-UAV-Enabled MEC System.
Proceedings of the 2023 International Conference on Communication Network and Machine Learning, 2023

2022
SM4 Chaotic Masking Scheme Against Power Analysis Based on FPGA.
Int. J. Bifurc. Chaos, 2022

Discrete-Time Memristor Model for Enhancing Chaotic Complexity and Application in Secure Communication.
Entropy, 2022

Improvement in Organizational Effectiveness Under the Background of Reform of State-Owned Enterprises: A Pilot Work of Assessment of Institutional Effectiveness of the State Grid Corporation of China.
Proceedings of the Modern Management based on Big Data III, 2022

Research on vulnerability assessment of physical protection system based on combined weighting-two-dimensional cloud model.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

2021
A Three-Dimensional Infinite Collapse Map with Image Encryption.
Entropy, 2021

Studies on Platform-Type Organization Design Based on Leadership Promotion.
Proceedings of the Modern Management based on Big Data II and Machine Learning and Intelligent Systems III, 2021

2020
A New Matrix Projective Synchronization of Fractional-Order Discrete-Time Systems and its Application in Secure Communication.
IEEE Access, 2020

2019
A New 3D Discrete Hyperchaotic System and Its Application in Secure Transmission.
Int. J. Bifurc. Chaos, 2019

A New Matrix Projective Synchronization and Its Application in Secure Communication.
IEEE Access, 2019

Text Similarity Calculation Method Based on Hybrid Model of LDA and TF-IDF.
Proceedings of the CSAI 2019: 2019 3rd International Conference on Computer Science and Artificial Intelligence, 2019

2003
Design and implementation of a novel sync processing system for composite video signals.
IEEE Trans. Consumer Electron., 2003


  Loading...