default search action
Wenshan Li
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Junhao Li, Junjiang He, Wenshan Li, Wenbo Fang, Geying Yang, Tao Li:
SynDroid: An adaptive enhanced Android malware classification method based on CTGAN-SVM. Comput. Secur. 137: 103604 (2024) - [j16]Meng Huang, Wenshan Li, Junjiang He, Xiaolong Lan, Tao Li, Nian Zhang:
IDG-SemiAD: An Immune Detector Generation-Based Collaborative Learning Scheme for Semi-supervised Anomaly Detection in Industrial Cyber-physical Systems. Int. J. Comput. Intell. Syst. 17(1): 108 (2024) - [j15]Jiangchuan Chen, Junjiang He, Wenshan Li, Wenbo Fang, Xiaolong Lan, Wengang Ma, Tao Li:
A Hierarchical Unmanned Aerial Vehicle Network Intrusion Detection and Response Approach Based on Immune Vaccine Distribution. IEEE Internet Things J. 11(20): 33312-33325 (2024) - [j14]Jiangchuan Chen, Junjiang He, Wenshan Li, Wenbo Fang, Xiaolong Lan, Wengang Ma, Tao Li:
Corrections to "A Hierarchical Unmanned Aerial Vehicle Network Intrusion Detection and Response Approach Based on Immune Vaccine Distribution". IEEE Internet Things J. 11(23): 38952 (2024) - [j13]Junjiang He, Cong Tang, Wenshan Li, Tao Li, Li Chen, Xiaolong Lan:
BR-HIDF: An Anti-Sparsity and Effective Host Intrusion Detection Framework Based on Multi-Granularity Feature Extraction. IEEE Trans. Inf. Forensics Secur. 19: 485-499 (2024) - [j12]Yijing Chen, Hongxia Wang, Wanjie Li, Wenshan Li:
A Steganography Immunoprocessing Framework Against CNN-Based and Handcrafted Steganalysis. IEEE Trans. Inf. Forensics Secur. 19: 6055-6069 (2024) - [c6]Ao Liu, Wenshan Li, Tao Li, Beibei Li, Hanyuan Huang, Pan Zhou:
Towards Inductive Robustness: Distilling and Fostering Wave-Induced Resonance in Transductive GCNs against Graph Adversarial Attacks. AAAI 2024: 13855-13863 - [c5]Yi Wang, Wenshan Li, Tao Li:
Adaptive Immune Optimization Algorithm: Combining Mutual Information and Differential Evolution-based Mutation for Local Feature Selection on Microarray Data. GECCO Companion 2024: 483-486 - 2023
- [j11]Jie Yang, Junjiang He, Wenshan Li, Tao Li, Xiaolong Lan, Yunpeng Wang:
MPF-FS: A multi-population framework based on multi-objective optimization algorithms for feature selection. Appl. Intell. 53(19): 22179-22199 (2023) - [j10]Beibei Li, Yujie Chang, Hanyuan Huang, Wenshan Li, Tao Li, Wen Chen:
Artificial immunity based distributed and fast anomaly detection for Industrial Internet of Things. Future Gener. Comput. Syst. 148: 367-379 (2023) - [j9]Yuelei Xie, Wenshan Li, Jie Wan, Shan Ouyang:
Enhanced diversity scheme for orthogonal frequency division multiplexing systems over doubly selective fading channels. IET Commun. 17(6): 695-703 (2023) - [j8]Yongbin Zhu, Wenshan Li, Tao Li:
A hybrid Artificial Immune optimization for high-dimensional feature selection. Knowl. Based Syst. 260: 110111 (2023) - [j7]Ge Zhang, Junjiang He, Wenshan Li, Tao Li, Xiaolong Lan, Yunpeng Wang:
DGA-PSO: An improved detector generation algorithm based on particle swarm optimization in negative selection. Knowl. Based Syst. 278: 110892 (2023) - [j6]Ying Cui, Wenshan Li, Liwei Chen, Liguo Wang, Jing Jiang, Shan Gao:
Feature Fusion Network Model Based on Dual Attention Mechanism for Hyperspectral Image Classification. IEEE Trans. Geosci. Remote. Sens. 61: 1-16 (2023) - [j5]Wenbo Fang, Junjiang He, Wenshan Li, Xiaolong Lan, Yang Chen, Tao Li, Jiwu Huang, Linlin Zhang:
Comprehensive Android Malware Detection Based on Federated Learning Architecture. IEEE Trans. Inf. Forensics Secur. 18: 3977-3990 (2023) - [c4]Jiawei Wang, Junjiang He, Wenshan Li, Xiaolong Lan, Qian Liu, Tao Li:
A Secure Duplicate Data Sharing Method against Untrusted Cloud Service Provider. CloudNet 2023: 352-359 - [c3]Tao Jiang, Junjiang He, Tao Li, Wenbo Fang, Wenshan Li, Cong Tang:
An Attack Entity Deducing Model for Attack Forensics. ICONIP (15) 2023: 340-354 - [i2]Ao Liu, Wenshan Li, Tao Li, Beibei Li, Hanyuan Huang, Guangquan Xu, Pan Zhou:
Graph Agent Network: Empowering Nodes with Decentralized Communications Capabilities for Adversarial Resilience. CoRR abs/2306.06909 (2023) - [i1]Ao Liu, Wenshan Li, Tao Li, Beibei Li, Hanyuan Huang, Pan Zhou:
Towards Inductive Robustness: Distilling and Fostering Wave-induced Resonance in Transductive GCNs Against Graph Adversarial Attacks. CoRR abs/2312.08651 (2023) - 2022
- [j4]Ying Cui, Wenshan Li, Liwei Chen, Shan Gao, Liguo Wang:
Double-Branch Local Context Feature Extraction Network for Hyperspectral Image Classification. IEEE Geosci. Remote. Sens. Lett. 19: 1-5 (2022) - [j3]Jinbiao Xia, Ying Cui, Wenshan Li, Liguo Wang, Chao Wang:
Lightweight Self-Attention Residual Network for Hyperspectral Classification. IEEE Geosci. Remote. Sens. Lett. 19: 1-5 (2022) - [j2]Binwang Yang, Jianna Yu, Wen Liu, Guoxing Jing, Wenshan Li, Wenjie Liu:
Miniaturized Photo-Ionization Fourier Deconvolution Ion Mobility Spectrometer for the Detection of Volatile Organic Compounds. Sensors 22(15): 5468 (2022) - 2021
- [c2]Yongbin Zhu, Wenshan Li, Tao Li, Hui Zhao:
Construction of Agent Model Based on Emotional Interaction. ISEEIE 2021: 356-360 - 2020
- [j1]Yu He, Gaoli Wang, Wenshan Li, Yizhi Ren:
Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things. IEEE Access 8: 20920-20930 (2020)
2010 – 2019
- 2019
- [b1]Wenshan Li:
Read Simulator for Single Cell RNA Sequencing. University of California, Los Angeles, USA, 2019 - 2014
- [c1]Yan Yan, Wenshan Li, Weitao Deng, Guozheng Zhang, Changliang Xia:
Torque ripple minimization of PMSM using PI type iterative learning control. IECON 2014: 925-931
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint