default search action
Tao Li 0016
Person information
- affiliation: Sichuan University, School of Computer Science, Chengdu, China
- affiliation (PhD 1994): University of Electronic Science and Technology of China, Chengdu, China
Other persons with the same name
- Tao Li — disambiguation page
- Tao Li 0001 — Nanjing University of Posts and Telecommunications, School of Computer Science, China (and 2 more)
- Tao Li 0002 — East China Normal University, School of Mathematical Sciences, Shanghai, China (and 2 more)
- Tao Li 0003 — City University of Hong Kong, Department of Economics and Finance, Hong Kong
- Tao Li 0004 — Land Satellite Remote Sensing Application Center, Ministry of Natural Resources, Beijing, China (and 1 more)
- Tao Li 0005 — Tohoku University, School of Engineering, Sendai, Japan (and 3 more)
- Tao Li 0006 — University of Florida, Department of Electrical and Computer Engineering, Gainesville, FL, USA (and 1 more)
- Tao Li 0007 — Suzhou University of Science and Technology, College of Mathematics and Physics, China
- Tao Li 0008 — National University of Defense Technology, College of Computer, Changsha, China
- Tao Li 0009 — Xidian University, National Laboratory of Radar Signal Processing, Xi'an, China
- Tao Li 0010 — Xidian University, State Key Laboratory of Integrated Services Networks, Xi'an, China
- Tao Li 0011 — Nanjing University of Aeronautics and Astronautics, School of Automation Engineering, China (and 1 more)
- Tao Li 0012 — Tsinghua University, Department of Electronic Engineering, TNList, Beijing, China
- Tao Li 0013 — Google Inc., Mountain View, CA, USA (and 2 more)
- Tao Li 0014 — Xihua University, School of Electrical Engineering and Electronic Information, Chengdu, China (and 1 more)
- Tao Li 0015 — Beijing Research Center of Intelligent Equipment for Agriculture, China (and 1 more)
- Tao Li 0017 — Yangtze University, National Demonstration Center for Experimental Electrical and Electronic Education, Jingzhou, China (and 1 more)
- Tao Li 0018 — Wuhan University of Science and Technology, College of Computer Science and Technology, China
- Tao Li 0019 — Purdue University, Department of Computer Science, West Lafayette, Indiana, USA
- Tao Li 0020 — University of New South Wales, Sydney, Australia
- Tao Li 0021 — University of Warwick, Coventry, UK
- Tao Li 0022 — Nankai University, Tianjin, China
- Tao Li 0023 — Harbin Engineering University, College of Computer Science and Technology, China
- Tao Li 0024 — Nanjing University of Information Science and Technology, School of Automation, Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology, China
- Tao Li 0025 — Wuhan University, Global Navigation Satellite System (GNSS) Research Centre, China
- Tao Li 0026 — TU Dresden, Faculty of Computer Science, Germany
- Tao Li 0027 (aka: Andy Tao Li) — Tsinghua University, School of Economics and Management, Beijing, China
- Tao Li 0028 — Heilongjiang University, Electronic Engineering College, Harbin, China
- Tao Li 0029 — Beijing Institute of Technology, Laboratory of Low Emission Vehicle, China
- Tao Li 0030 — University of Electronic Science and Technology of China, School of Management and Economics, Chengdu, China
- Tao Li 0031 — Ocean University of China, Department of Computer Science and Technology, Qingdao, China
- Tao Li 0032 — Beijing Institute of Technology, State Key Lab of Explosion Science and Technology, China
- Tao Li 0033 — Central South University, School of Information Science and Engineering, Changsha, China
- Tao Li 0034 — Sichuan University, West China Hospital, Chengdu, China
- Tao Li 0035 — University of Shanghai for Science and Technology, School of Environment and Architecture, China
- Tao Li 0036 — Sichuan University, Department of Mathematics, Chengdu, China
- Tao Li 0037 — Beijing Technology and Business University, School of Mathematics and Statistics, China
- Tao Li 0038 — Hong Kong Applied Science and Technology Research Institute, Hong Kong (and 1 more)
- Tao Li 0039 — Google DeepMind (and 1 more)
- Tao Li 0040 — Peking University, Department of Information Science, Beijing, China
- Tao Li 0041 — Renmin University of China, Beijing, China
- Tao Li 0042 — Indiana University-Purdue University, IN, USA
- Tao Li 0043 — Guizhou University, State Key Laboratory of Public Big Data, College of Computer Science and Technology, China (and 1 more)
- Tao Li 0044 — L'Oréal
Other persons with a similar name
- Guotao Li (aka: Guo-Tao Li) — disambiguation page
- Jintao Li (aka: Jin-Tao Li) — disambiguation page
- Li Tao Li
- Wentao Li (aka: Wen-tao Li, Wen-Tao Li, Wen Tao Li) — disambiguation page
- Yan-Tao Li
- Zetao Li (aka: Ze-tao Li, Ze-Tao Li) — disambiguation page
- Jintao Li 0001 (aka: Jin-Tao Li 0001) — University of the Chinese Academy of Sciences, Key Laboratory of Intelligent Information Processing, Beijing, China
- Li Tao
- Li-Tao Teng
- Li-Tao Zhang
- show all similar names
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j71]Shaohong Zhou, Junjiang He, Tao Li, Xiaolong Lan, Yunpeng Wang, Hui Zhao, Yihong Li:
Automating the Deployment of Cyber Range with OpenStack. Comput. J. 67(3): 851-863 (2024) - [j70]Qiang Zhang, Junjiang He, Tao Li, Xiaolong Lan, Wenbo Fang, Yihong Li:
SPAW-SMOTE: Space Partitioning Adaptive Weighted Synthetic Minority Oversampling Technique For Imbalanced Data Set Learning. Comput. J. 67(5): 1747-1762 (2024) - [j69]Junhao Li, Junjiang He, Wenshan Li, Wenbo Fang, Geying Yang, Tao Li:
SynDroid: An adaptive enhanced Android malware classification method based on CTGAN-SVM. Comput. Secur. 137: 103604 (2024) - [j68]Meng Huang, Wenshan Li, Junjiang He, Xiaolong Lan, Tao Li, Nian Zhang:
IDG-SemiAD: An Immune Detector Generation-Based Collaborative Learning Scheme for Semi-supervised Anomaly Detection in Industrial Cyber-physical Systems. Int. J. Comput. Intell. Syst. 17(1): 108 (2024) - [j67]Xiaolong Lan, Ziheng Xu, Junjiang He, Liang Liu, Qingchun Chen, Tao Li:
Information-Freshness-Aware Wireless Multiuser Uplink Physical-Layer Security Communication. IEEE Internet Things J. 11(9): 15940-15956 (2024) - [j66]Junjiang He, Yaxin Li, Jiahang Tang, Hongxia Wang, Geying Yang, Tao Li, Xiaolong Lan:
An Immune-Knowledge-Driven SCADA-Based Industrial Virus Propagation Model. IEEE Internet Things J. 11(18): 29956-29970 (2024) - [j65]Jiangchuan Chen, Junjiang He, Wenshan Li, Wenbo Fang, Xiaolong Lan, Wengang Ma, Tao Li:
A Hierarchical Unmanned Aerial Vehicle Network Intrusion Detection and Response Approach Based on Immune Vaccine Distribution. IEEE Internet Things J. 11(20): 33312-33325 (2024) - [j64]Yi Wang, Hao Tian, Tao Li, Xiaojie Liu:
A two-stage clonal selection algorithm for local feature selection on high-dimensional data. Inf. Sci. 677: 120867 (2024) - [j63]Geying Yang, Junjiang He, Xiaolong Lan, Tao Li, Wenbo Fang:
A fast dual-module hybrid high-dimensional feature selection algorithm. Inf. Sci. 681: 121185 (2024) - [j62]Tao Li, Jie Huang:
Exponential Stability for a Class of Discrete-Time Switched Systems and Its Applications to Multiagent Systems. SIAM J. Control. Optim. 62(2): 1165-1182 (2024) - [j61]Yuan Yao, Junjiang He, Tao Li, Yunpeng Wang, Xiaolong Lan, Yuan Li:
An Automatic XSS Attack Vector Generation Method Based on the Improved Dueling DDQN Algorithm. IEEE Trans. Dependable Secur. Comput. 21(4): 2852-2868 (2024) - [j60]Junjiang He, Cong Tang, Wenshan Li, Tao Li, Li Chen, Xiaolong Lan:
BR-HIDF: An Anti-Sparsity and Effective Host Intrusion Detection Framework Based on Multi-Granularity Feature Extraction. IEEE Trans. Inf. Forensics Secur. 19: 485-499 (2024) - [j59]Ao Liu, Beibei Li, Tao Li, Pan Zhou, Rui Wang:
AN-GCN: An Anonymous Graph Convolutional Network Against Edge-Perturbing Attacks. IEEE Trans. Neural Networks Learn. Syst. 35(1): 88-102 (2024) - [c38]Ao Liu, Wenshan Li, Tao Li, Beibei Li, Hanyuan Huang, Pan Zhou:
Towards Inductive Robustness: Distilling and Fostering Wave-Induced Resonance in Transductive GCNs against Graph Adversarial Attacks. AAAI 2024: 13855-13863 - [c37]Yi Wang, Wenshan Li, Tao Li:
Adaptive Immune Optimization Algorithm: Combining Mutual Information and Differential Evolution-based Mutation for Local Feature Selection on Microarray Data. GECCO Companion 2024: 483-486 - [c36]Hanyuan Huang, Beibei Li, Tao Li:
A Cooperative Differential Evolution Based Intrusion Detection System for Unknown Cyberattacks. INFOCOM (Workshops) 2024: 1-2 - 2023
- [j58]Yongbin Zhu, Tao Li, Xiaolong Lan:
Feature selection optimized by the artificial immune algorithm based on genome shuffling and conditional lethal mutation. Appl. Intell. 53(11): 13972-13992 (2023) - [j57]Jie Yang, Junjiang He, Wenshan Li, Tao Li, Xiaolong Lan, Yunpeng Wang:
MPF-FS: A multi-population framework based on multi-objective optimization algorithms for feature selection. Appl. Intell. 53(19): 22179-22199 (2023) - [j56]Hanyuan Huang, Tao Li, Yong Ding, Beibei Li, Ao Liu:
An artificial immunity based intrusion detection system for unknown cyberattacks. Appl. Soft Comput. 148: 110875 (2023) - [j55]Linfeng Du, Junjiang He, Tao Li, Yunpeng Wang, Xiaolong Lan, Yunhua Huang:
DBWE-Corbat: Background network traffic generation using dynamic word embedding and contrastive learning for cyber range. Comput. Secur. 129: 103202 (2023) - [j54]Beibei Li, Yujie Chang, Hanyuan Huang, Wenshan Li, Tao Li, Wen Chen:
Artificial immunity based distributed and fast anomaly detection for Industrial Internet of Things. Future Gener. Comput. Syst. 148: 367-379 (2023) - [j53]Yuting Guan, Junjiang He, Tao Li, Hui Zhao, Baoqiang Ma:
SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning. Future Internet 15(4): 133 (2023) - [j52]Meng Huang, Tao Li, Beibei Li, Nian Zhang, Hanyuan Huang:
Fast Attack Detection Method for Imbalanced Data in Industrial Cyber-Physical Systems. J. Artif. Intell. Soft Comput. Res. 13(4): 229-245 (2023) - [j51]Yongbin Zhu, Wenshan Li, Tao Li:
A hybrid Artificial Immune optimization for high-dimensional feature selection. Knowl. Based Syst. 260: 110111 (2023) - [j50]Ge Zhang, Junjiang He, Wenshan Li, Tao Li, Xiaolong Lan, Yunpeng Wang:
DGA-PSO: An improved detector generation algorithm based on particle swarm optimization in negative selection. Knowl. Based Syst. 278: 110892 (2023) - [j49]Wenbo Fang, Junjiang He, Wenshan Li, Xiaolong Lan, Yang Chen, Tao Li, Jiwu Huang, Linlin Zhang:
Comprehensive Android Malware Detection Based on Federated Learning Architecture. IEEE Trans. Inf. Forensics Secur. 18: 3977-3990 (2023) - [c35]Jiawei Wang, Junjiang He, Wenshan Li, Xiaolong Lan, Qian Liu, Tao Li:
A Secure Duplicate Data Sharing Method against Untrusted Cloud Service Provider. CloudNet 2023: 352-359 - [c34]Tao Jiang, Junjiang He, Tao Li, Wenbo Fang, Wenshan Li, Cong Tang:
An Attack Entity Deducing Model for Attack Forensics. ICONIP (15) 2023: 340-354 - [i2]Ao Liu, Wenshan Li, Tao Li, Beibei Li, Hanyuan Huang, Guangquan Xu, Pan Zhou:
Graph Agent Network: Empowering Nodes with Decentralized Communications Capabilities for Adversarial Resilience. CoRR abs/2306.06909 (2023) - [i1]Ao Liu, Wenshan Li, Tao Li, Beibei Li, Hanyuan Huang, Pan Zhou:
Towards Inductive Robustness: Distilling and Fostering Wave-induced Resonance in Transductive GCNs Against Graph Adversarial Attacks. CoRR abs/2312.08651 (2023) - 2022
- [j48]Li Chen, Cong Tang, Junjiang He, Hui Zhao, Xiaolong Lan, Tao Li:
XSS adversarial example attacks based on deep reinforcement learning. Comput. Secur. 120: 102831 (2022) - [j47]Yi Wang, Tao Li, Xiaojie Liu, Jian Yao:
An adaptive clonal selection algorithm with multiple differential evolution strategies. Inf. Sci. 604: 142-169 (2022) - [j46]Ya-Jun Ma, Hui Zhao, Tao Li:
Robust adaptive dual layer sliding mode controller: Methodology and application of uncertain robot manipulator. Trans. Inst. Meas. Control 44(4) (2022) - [j45]Beibei Li, Yukun Jiang, Qingqi Pei, Tao Li, Liang Liu, Rongxing Lu:
FEEL: Federated End-to-End Learning With Non-IID Data for Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 23(9): 16728-16740 (2022) - [c33]Yi Wang, Tao Li, Xiaojie Liu, Jian Yao:
A discrete clonal selection algorithm for filter-based local feature selection. CEC 2022: 1-8 - [c32]Zhan Gao, Yang Chen, Zhiyong Li, Tao Li, Junjiang He, Yuehao Li:
An Improved Crowd Aggregation Prediction Algorithm Based on ARMA. ICIAI 2022: 8-12 - 2021
- [j44]Junjiang He, Wen Chen, Tao Li, Beibei Li, Yongbin Zhu, Meng Huang:
HD-NSA: A real-valued negative selection algorithm based on hierarchy division. Appl. Soft Comput. 112: 107726 (2021) - [j43]Junjiang He, Tao Li, Beibei Li, Xiaolong Lan, Zhiyong Li, Yunpeng Wang:
An immune-based risk assessment method for digital virtual assets. Comput. Secur. 102: 102134 (2021) - [j42]Yunhua Huang, Tao Li, Lijia Zhang, Beibei Li, Xiaojie Liu:
JSContana: Malicious JavaScript detection using adaptable context analysis and key feature extraction. Comput. Secur. 104: 102218 (2021) - [j41]Ao Liu, Yunpeng Wang, Tao Li:
SFE-GACN: A novel unknown attack detection under insufficient data via intra categories generation in embedding space. Comput. Secur. 105: 102262 (2021) - [j40]Yihong Li, Yunpeng Wang, Tao Li, Xiaolong Lan, Han Song:
GNN-DBSCAN: A new density-based algorithm using grid and the nearest neighbor. J. Intell. Fuzzy Syst. 41(6): 7589-7601 (2021) - [j39]Yihong Li, Yunpeng Wang, Tao Li, Beibei Li, Xiaolong Lan:
SP-SMOTE: A novel space partitioning based synthetic minority oversampling technique. Knowl. Based Syst. 228: 107269 (2021) - [j38]Zhiyong Li, Tao Li, Junjiang He, Yongbin Zhu, Yunpeng Wang:
A hybrid real-valued negative selection algorithm with variable-sized detectors and the k-nearest neighbors algorithm. Knowl. Based Syst. 232: 107477 (2021) - [j37]Yanli Chen, Hongxia Wang, Hanzhou Wu, Zhiqiang Wu, Tao Li, Asad Malik:
Adaptive Video Data Hiding through Cost Assignment and STCs. IEEE Trans. Dependable Secur. Comput. 18(3): 1320-1335 (2021) - [j36]Beibei Li, Yuhao Wu, Jiarui Song, Rongxing Lu, Tao Li, Liang Zhao:
DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber-Physical Systems. IEEE Trans. Ind. Informatics 17(8): 5615-5624 (2021) - [c31]Yuankai Ouyang, Beibei Li, Qinglei Kong, Han Song, Tao Li:
FS-IDS: A Novel Few-Shot Learning Based Intrusion Detection System for SCADA Networks. ICC 2021: 1-6 - [c30]Yongbin Zhu, Wenshan Li, Tao Li, Hui Zhao:
Construction of Agent Model Based on Emotional Interaction. ISEEIE 2021: 356-360 - 2020
- [j35]Yi Wang, Tao Li:
Local feature selection based on artificial immune system for classification. Appl. Soft Comput. 87: 105989 (2020) - [j34]Jin Yang, Tao Li, Gang Liang, Yunpeng Wang, Tianyu Gao, Fangdong Zhu:
Spam transaction attack detection model based on GRU and WGAN-div. Comput. Commun. 161: 172-182 (2020) - [j33]Hao Li, Xiaojie Liu, Tao Li, Rundong Gan:
A novel density-based clustering algorithm using nearest neighbor graph. Pattern Recognit. 102: 107206 (2020) - [j32]Sani M. Abdullahi, Hongxia Wang, Tao Li:
Fractal Coding-Based Robust and Alignment-Free Fingerprint Image Hashing. IEEE Trans. Inf. Forensics Secur. 15: 2587-2601 (2020) - [c29]Meng Huang, Tao Li, Hui Zhao, Xiaojie Liu, Zhan Gao:
Immune-Based Network Dynamic Risk Control Strategy Knowledge Ontology Construction. SAI (3) 2020: 420-430
2010 – 2019
- 2019
- [j31]Fan Zhang, Wen Chen, Tao Li, Xiaochun Cao, Haipeng Peng:
An Antigen Space Triangulation Coverage Based Real-Value Negative Selection Algorithm. IEEE Access 7: 51886-51898 (2019) - [j30]Jin Yang, Tao Li, Gang Liang, Wenbo He, Yue Zhao:
A Simple Recurrent Unit Model Based Intrusion Detection System With DCGAN. IEEE Access 7: 83286-83296 (2019) - [c28]Junjiang He, Tao Li, Hui Zhao, Xiaojie Liu, Zhan Gao, Yunpeng Wang:
An Immune-Based Real-Time Quantitative Detection for Threat Change of Cyberspace Digital Virtual Assets. EECS 2019: 76-81 - 2018
- [j29]Yi Wang, Tao Li:
Improving semi-supervised co-forest algorithm in evolving data streams. Appl. Intell. 48(10): 3248-3262 (2018) - [j28]Yonggang Chen, Lixiang Li, Jinghua Xiao, Yixian Yang, Jun Liang, Tao Li:
Particle swarm optimizer with crossover operation. Eng. Appl. Artif. Intell. 70: 159-169 (2018) - [j27]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang, Tao Li:
Synchronization Control of Coupled Memristor-Based Neural Networks with Mixed Delays and Stochastic Perturbations. Neural Process. Lett. 47(2): 679-696 (2018) - [j26]Wen Chen, Hui Zhao, Tao Li, Yuling Liu:
Optimal probabilistic encryption for distributed detection in wireless sensor networks based on immune differential evolution algorithm. Wirel. Networks 24(7): 2497-2507 (2018) - [c27]Ping Lin, Tao Li, Xiaojie Liu, Hui Zhao, Jin Yang, Fangdong Zhu:
An Immunity-Based Security Threat Detection System for Cyberspace Digital Virtual Assets. ICCCS (2) 2018: 601-611 - [c26]Fan Zhang, Jin Yang, Tao Li, Fangdong Zhu:
dnyNSA: A Novel Real-Value Based Negative Selection Algorithm. SSCI 2018: 1104-1109 - [c25]Ping Lin, Jin Yang, Tao Li, Lei Ai:
An immune based dynamic risk control system. SSCI 2018: 1130-1137 - 2017
- [j25]Zhengjun Liu, Tao Li, Jin Yang, Tao Yang:
An Improved Negative Selection Algorithm Based on Subspace Density Seeking. IEEE Access 5: 12189-12198 (2017) - [j24]Tao Yang, Wen Chen, Tao Li:
An antigen space density based real-value negative selection algorithm. Appl. Soft Comput. 61: 860-874 (2017) - [j23]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang, Tao Li:
Finite-time synchronization of memristor-based neural networks with mixed delays. Neurocomputing 235: 83-89 (2017) - 2015
- [j22]Wen Chen, Tao Li, Tao Yang:
Intelligent control of cognitive radio parameter adaption: Using evolutionary multi-objective algorithm based on user preference. Ad Hoc Networks 26: 3-16 (2015) - [j21]Wen Chen, Hui Zhao, Tao Li, Yuling Liu:
Intelligent traffic signal controller based on type-2 fuzzy logic and NSGAII. J. Intell. Fuzzy Syst. 29(6): 2611-2618 (2015) - 2014
- [j20]Wen Chen, Xiaoming Ding, Tao Li, Tao Yang:
Negative selection algorithm based on grid file of the feature space. Knowl. Based Syst. 56: 26-35 (2014) - 2013
- [j19]Wen Chen, Tao Li, XiaoJie Liu, Bing Zhang:
A negative selection algorithm based on hierarchical clustering of self set. Sci. China Inf. Sci. 56(8): 1-13 (2013) - 2012
- [j18]Zhe Wang, Tao Li, Naixue Xiong, Yi Pan:
A novel dynamic network data replication scheme based on historical access record and proactive deletion. J. Supercomput. 62(1): 227-250 (2012) - [j17]Zhe Wang, Tao Li, Naixue Xiong, Yi Pan:
Erratum to: A novel dynamic network data replication scheme based on historical access record and proactive deletion. J. Supercomput. 62(1): 616 (2012) - [j16]Xufei Zheng, Tao Li, Yonghui Fang:
Strategy of fast and light-load cloud-based proactive benign worm countermeasure technology to contain worm propagation. J. Supercomput. 62(3): 1451-1479 (2012) - 2011
- [j15]Jie Zeng, XiaoJie Liu, Tao Li, Guiyang Li, Haibo Li, Jinquan Zeng:
A novel intrusion detection approach learned from the change of antibody concentration in biological immune response. Appl. Intell. 35(1): 41-62 (2011) - [j14]Wen Chen, XiaoJie Liu, Tao Li, Yuanquan Shi, Xufei Zheng, Hui Zhao:
A Negative Selection Algorithm Based on Hierarchical Clustering of Self Set and its Application in Anomaly Detection. Int. J. Comput. Intell. Syst. 4(4): 410-419 (2011) - 2010
- [j13]Yuanquan Shi, XiaoJie Liu, Tao Li, Xiaoning Peng, Wen Chen, Ruirui Zhang, Yanming Fu:
Chaotic Time Series Prediction Using Immune Optimization Theory. Int. J. Comput. Intell. Syst. 3(sup01): 43-60 (2010) - [j12]Guiyang Li, Tao Li, Jie Zeng, Haibo Li:
An Outlier Robust Negative Selection Algorithm Inspired by Immune Suppression. J. Comput. 5(9): 1348-1355 (2010) - [j11]Khaled Amleh, Hongbin Li, Tao Li:
Robust Channel Estimation and Detection for Single-Carrier and Multicarrier Block Transmission Systems. IEEE Trans. Veh. Technol. 59(2): 662-672 (2010) - [c24]Wen Chen, Tao Li, Jian Qin, Hui Zhao:
A New Cluster Based Real Negative Selection Algorithm. ISIA 2010: 125-131
2000 – 2009
- 2009
- [j10]Jin Yang, XiaoJie Liu, Tao Li, Gang Liang, SunJun Liu:
Distributed agents model for intrusion detection based on AIS. Knowl. Based Syst. 22(2): 115-119 (2009) - [c23]Jie Zeng, Tao Li, Guiyang Li, Haibo Li:
A New Intrusion Detection Method Based on Antibody Concentration. ICIC (2) 2009: 500-509 - 2007
- [j9]Hongbin Li, Tao Li:
Generalized multichannel amplitude-and-phase coded modulation for differential space-time communications. Digit. Signal Process. 17(1): 261-271 (2007) - [j8]Yun-Feng Chen, Tao Li, Dong-Ni Gao, Xiaoqin Hu, Xiao-Ping Zhang, Jin Liu:
A secure mobile communication approach based on information hiding. Int. J. Ad Hoc Ubiquitous Comput. 2(3): 134-139 (2007) - [j7]Jin Yang, Tao Li, SunJun Liu, Tiefang Wang, Diangang Wang, Gang Liang:
Computer Forensics System Based on Artificial Immune Systems. J. Univers. Comput. Sci. 13(9): 1354-1365 (2007) - [c22]Caiming Liu, Tao Li, Hui Zhao, Lingxi Peng, Jinquan Zeng, Yan Zhang:
Exploration of Network Security Information Hid in Web Pages Based on Immunology. FSKD (1) 2007: 587-591 - [c21]Caiming Liu, XiaoJie Liu, Tao Li, Lingxi Peng, Jinquan Zeng, Hui Zhao:
Artificial Immunity-Based Discovery for Popular Information in WEB Pages. International Conference on Computational Science (4) 2007: 166-169 - [c20]Jianhua Zhang, Xiaojie Liu, Tao Li, Nan Zhang, Nian Liu, Chun Xu:
A Genetic Algorithm Based on Immune and Chaos. ICNC (5) 2007: 239-243 - [c19]Jinquan Zeng, Tao Li, Xiaojie Liu, Caiming Liu, Lingxi Peng, Feixian Sun:
A Feedback Negative Selection Algorithm to Anomaly Detection. ICNC (3) 2007: 604-608 - [c18]Diangang Wang, Tao Li, SunJun Liu, Jianhua Zhang, Caiming Liu:
Dynamical Network Forensics Based on Immune Agent. ICNC (3) 2007: 651-656 - 2006
- [j6]Rensheng Wang, Hongbin Li, Tao Li:
Robust multiuser detection for multicarrier CDMA systems. IEEE J. Sel. Areas Commun. 24(3): 673-683 (2006) - [j5]Hongbin Li, Tao Li:
A new differential modulation for coded OFDM with multiple transmit antennas. IEEE Signal Process. Lett. 13(6): 317-320 (2006) - [c17]Jinquan Zeng, XiaoJie Liu, Tao Li, Feixian Sun, Lingxi Peng, Caiming Liu:
An Immune-Based Model for Service Survivability. CANS 2006: 354-363 - [c16]Tao Li, Hongbin Li:
A Big-Neuron Based Expert System. ICIC (1) 2006: 268-273 - [c15]Gang Liang, Tao Li, Jiancheng Ni, Yaping Jiang, Jin Yang, Xun Gong:
An Immunity-Based Dynamic Multilayer Intrusion Detection System. ICIC (3) 2006: 641-650 - [c14]Xun Gong, Tao Li, Gang Liang, Tiefang Wang, Jin Yang, Xiaoqin Hu:
Immunity and Mobile Agent Based Grid Intrusion Detection. ICIC (3) 2006: 651-659 - [c13]Gang Liang, Tao Li, Xun Gong, Yaping Jiang, Jin Yang, Jiancheng Ni:
NASC: A Novel Approach for Spam Classification. ICIC (3) 2006: 672-681 - [c12]Xun Gong, Tao Li, Tiefang Wang, Jin Yang, Gang Liang, Xiaoqin Hu:
Grid Intrusion Detection Based on Immune Agent. ICNC (2) 2006: 73-82 - [c11]Tiefang Wang, Tao Li, Xun Gong, Jin Yang, Xiaoqin Hu, Diangang Wang, Hui Zhao:
Family Gene Based Grid Trust Model. ICNC (2) 2006: 110-113 - [c10]Jianhua Zhang, Tao Li, Nan Zhang, Diangang Wang, SunJun Liu:
An Immune Evolutionary Algorithm Based on Chaos Mutation. ISDA (1) 2006: 925-929 - [c9]Xun Gong, Tao Li, Ji Lu, Tiefang Wang, Gang Liang, Jin Yang, Feixian Sun:
Immunity and Mobile Agent Based Intrusion Detection for Grid. PRIMA 2006: 187-198 - [c8]Ji Lu, Tao Li, Xun Gong:
Parameter Evolution for Quality of Service in Multimedia Networking. PRIMA 2006: 233-244 - [c7]SunJun Liu, Tao Li, Kui Zhao, Jin Yang, Xun Gong, Jianhua Zhang:
Immune-Based Dynamic Intrusion Response Model. SEAL 2006: 96-103 - [c6]SunJun Liu, Tao Li, Diangang Wang, Kui Zhao, Xun Gong, Xiaoqin Hu, Chun Xu, Gang Liang:
Immune Multi-agent Active Defense Model for Network Intrusion. SEAL 2006: 104-111 - [c5]Xun Gong, Tao Li, Tiefang Wang, Jin Yang, SunJun Liu, Gang Liang:
An Immune Mobile Agent Based Grid Intrusion Detection Model. SEAL 2006: 112-119 - 2005
- [c4]Tao Li, XiaoJie Liu, Hongbin Li:
An Immune-Based Model for Computer Virus Detection. CANS 2005: 59-71 - [c3]Tao Li, XiaoJie Liu, Hongbin Li:
A New Model for Dynamic Intrusion Detection. CANS 2005: 72-84 - [c2]Chunlin Xu, Tao Li, Xuemei Huang, Yaping Jiang:
A Weather Forecast System Based on Artificial Immune System. ICNC (2) 2005: 800-803 - [c1]Tao Li, Juling Ding, XiaoJie Liu, Pin Yang:
A New Model of Immune-Based Network Surveillance and Dynamic Computer Forensics. ICNC (2) 2005: 804-813 - 2004
- [j4]Khaled Amleh, Hongbin Li, Tao Li:
Blind and training-assisted subspace code-timing estimation for CDMA with bandlimited chip waveforms. IEEE Trans. Veh. Technol. 53(6): 1735-1745 (2004) - [j3]Rensheng Wang, Hongbin Li, Tao Li:
Code-timing estimation for CDMA systems with bandlimited chip waveforms. IEEE Trans. Wirel. Commun. 3(4): 1338-1349 (2004) - 2001
- [j2]Tao Li, XiaoJie Liu:
The Denotational Semantics of NIPL. ACM SIGPLAN Notices 36(6): 28-37 (2001) - 2000
- [j1]Tao Li, XiaoJie Liu:
An Intelligent Neural Network Programming System (NNPS). ACM SIGPLAN Notices 35(3): 65-72 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-26 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint