Wenshan Li

Orcid: 0000-0003-4434-0712

Affiliations:
  • Chengdu University of Information Technology, Chengdu, China


According to our database1, Wenshan Li authored at least 25 papers between 2021 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
A feature selection method based on clonal selection with beneficial noise.
Pattern Recognit., 2026

2025
Differential-Trust-Mechanism-Based Trade-Off Method Between Privacy and Accuracy in Recommender Systems.
IEEE Trans. Inf. Forensics Secur., 2025

CSCAD: An Adaptive LightGBM Algorithm to Detect Cache Side-Channel Attacks.
IEEE Trans. Dependable Secur. Comput., 2025

Malicious encrypted traffic detection method based on multi-granularity representation under data imbalance conditions.
Knowl. Based Syst., 2025

NSA-AE: An inadequately represented immune spaces NSA augmented via autoencoders.
Neurocomputing, 2025

Weak Population-Empowered Large-Scale Multiobjective Immune Algorithm.
Int. J. Intell. Syst., 2025

Single-stage filter-based local feature selection using an immune algorithm for high-dimensional microarray data.
Appl. Soft Comput., 2025

Graph Agent Network: Empowering Nodes with Inference Capabilities for Adversarial Resilience.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

Grimm: A Plug-and-Play Perturbation Rectifier for Graph Neural Networks Defending Against Poisoning Attacks.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

2024
Corrections to "A Hierarchical Unmanned Aerial Vehicle Network Intrusion Detection and Response Approach Based on Immune Vaccine Distribution".
IEEE Internet Things J., December, 2024

IDG-SemiAD: An Immune Detector Generation-Based Collaborative Learning Scheme for Semi-supervised Anomaly Detection in Industrial Cyber-physical Systems.
Int. J. Comput. Intell. Syst., December, 2024

A Hierarchical Unmanned Aerial Vehicle Network Intrusion Detection and Response Approach Based on Immune Vaccine Distribution.
IEEE Internet Things J., October, 2024

SynDroid: An adaptive enhanced Android malware classification method based on CTGAN-SVM.
Comput. Secur., February, 2024

BR-HIDF: An Anti-Sparsity and Effective Host Intrusion Detection Framework Based on Multi-Granularity Feature Extraction.
IEEE Trans. Inf. Forensics Secur., 2024

Adaptive Immune Optimization Algorithm: Combining Mutual Information and Differential Evolution-based Mutation for Local Feature Selection on Microarray Data.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2024

Towards Inductive Robustness: Distilling and Fostering Wave-Induced Resonance in Transductive GCNs against Graph Adversarial Attacks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Artificial immunity based distributed and fast anomaly detection for Industrial Internet of Things.
Future Gener. Comput. Syst., November, 2023

DGA-PSO: An improved detector generation algorithm based on particle swarm optimization in negative selection.
Knowl. Based Syst., October, 2023

MPF-FS: A multi-population framework based on multi-objective optimization algorithms for feature selection.
Appl. Intell., October, 2023

Comprehensive Android Malware Detection Based on Federated Learning Architecture.
IEEE Trans. Inf. Forensics Secur., 2023

A hybrid Artificial Immune optimization for high-dimensional feature selection.
Knowl. Based Syst., 2023

Graph Agent Network: Empowering Nodes with Decentralized Communications Capabilities for Adversarial Resilience.
CoRR, 2023

An Attack Entity Deducing Model for Attack Forensics.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

A Secure Duplicate Data Sharing Method against Untrusted Cloud Service Provider.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023

2021
Construction of Agent Model Based on Emotional Interaction.
Proceedings of the ISEEIE 2021: International Symposium on Electrical, Electronics and Information Engineering, Seoul Republic of Korea, February 19, 2021


  Loading...