Wenshan Li
Orcid: 0000-0003-4434-0712Affiliations:
- Chengdu University of Information Technology, Chengdu, China
According to our database1,
Wenshan Li
authored at least 25 papers
between 2021 and 2026.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2026
Pattern Recognit., 2026
2025
Differential-Trust-Mechanism-Based Trade-Off Method Between Privacy and Accuracy in Recommender Systems.
IEEE Trans. Inf. Forensics Secur., 2025
IEEE Trans. Dependable Secur. Comput., 2025
Malicious encrypted traffic detection method based on multi-granularity representation under data imbalance conditions.
Knowl. Based Syst., 2025
Neurocomputing, 2025
Int. J. Intell. Syst., 2025
Single-stage filter-based local feature selection using an immune algorithm for high-dimensional microarray data.
Appl. Soft Comput., 2025
Graph Agent Network: Empowering Nodes with Inference Capabilities for Adversarial Resilience.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025
Grimm: A Plug-and-Play Perturbation Rectifier for Graph Neural Networks Defending Against Poisoning Attacks.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025
2024
Corrections to "A Hierarchical Unmanned Aerial Vehicle Network Intrusion Detection and Response Approach Based on Immune Vaccine Distribution".
IEEE Internet Things J., December, 2024
IDG-SemiAD: An Immune Detector Generation-Based Collaborative Learning Scheme for Semi-supervised Anomaly Detection in Industrial Cyber-physical Systems.
Int. J. Comput. Intell. Syst., December, 2024
A Hierarchical Unmanned Aerial Vehicle Network Intrusion Detection and Response Approach Based on Immune Vaccine Distribution.
IEEE Internet Things J., October, 2024
SynDroid: An adaptive enhanced Android malware classification method based on CTGAN-SVM.
Comput. Secur., February, 2024
BR-HIDF: An Anti-Sparsity and Effective Host Intrusion Detection Framework Based on Multi-Granularity Feature Extraction.
IEEE Trans. Inf. Forensics Secur., 2024
Adaptive Immune Optimization Algorithm: Combining Mutual Information and Differential Evolution-based Mutation for Local Feature Selection on Microarray Data.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2024
Towards Inductive Robustness: Distilling and Fostering Wave-Induced Resonance in Transductive GCNs against Graph Adversarial Attacks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Artificial immunity based distributed and fast anomaly detection for Industrial Internet of Things.
Future Gener. Comput. Syst., November, 2023
DGA-PSO: An improved detector generation algorithm based on particle swarm optimization in negative selection.
Knowl. Based Syst., October, 2023
MPF-FS: A multi-population framework based on multi-objective optimization algorithms for feature selection.
Appl. Intell., October, 2023
IEEE Trans. Inf. Forensics Secur., 2023
Knowl. Based Syst., 2023
Graph Agent Network: Empowering Nodes with Decentralized Communications Capabilities for Adversarial Resilience.
CoRR, 2023
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023
2021
Proceedings of the ISEEIE 2021: International Symposium on Electrical, Electronics and Information Engineering, Seoul Republic of Korea, February 19, 2021