Tao Li

Orcid: 0000-0002-5302-3180

Affiliations:
  • Sichuan University, School of Computer Science, Chengdu, China
  • University of Electronic Science and Technology of China, Chengdu, China (PhD 1994)


According to our database1, Tao Li authored at least 111 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Corrections to "A Hierarchical Unmanned Aerial Vehicle Network Intrusion Detection and Response Approach Based on Immune Vaccine Distribution".
IEEE Internet Things J., December, 2024

IDG-SemiAD: An Immune Detector Generation-Based Collaborative Learning Scheme for Semi-supervised Anomaly Detection in Industrial Cyber-physical Systems.
Int. J. Comput. Intell. Syst., December, 2024

A Hierarchical Unmanned Aerial Vehicle Network Intrusion Detection and Response Approach Based on Immune Vaccine Distribution.
IEEE Internet Things J., October, 2024

An Immune-Knowledge-Driven SCADA-Based Industrial Virus Propagation Model.
IEEE Internet Things J., September, 2024

Information-Freshness-Aware Wireless Multiuser Uplink Physical-Layer Security Communication.
IEEE Internet Things J., May, 2024

SynDroid: An adaptive enhanced Android malware classification method based on CTGAN-SVM.
Comput. Secur., February, 2024

AN-GCN: An Anonymous Graph Convolutional Network Against Edge-Perturbing Attacks.
IEEE Trans. Neural Networks Learn. Syst., January, 2024

BR-HIDF: An Anti-Sparsity and Effective Host Intrusion Detection Framework Based on Multi-Granularity Feature Extraction.
IEEE Trans. Inf. Forensics Secur., 2024

An Automatic XSS Attack Vector Generation Method Based on the Improved Dueling DDQN Algorithm.
IEEE Trans. Dependable Secur. Comput., 2024

Exponential Stability for a Class of Discrete-Time Switched Systems and Its Applications to Multiagent Systems.
SIAM J. Control. Optim., 2024

A fast dual-module hybrid high-dimensional feature selection algorithm.
Inf. Sci., 2024

A two-stage clonal selection algorithm for local feature selection on high-dimensional data.
Inf. Sci., 2024

Automating the Deployment of Cyber Range with OpenStack.
Comput. J., 2024

SPAW-SMOTE: Space Partitioning Adaptive Weighted Synthetic Minority Oversampling Technique For Imbalanced Data Set Learning.
Comput. J., 2024

A Cooperative Differential Evolution Based Intrusion Detection System for Unknown Cyberattacks.
Proceedings of the IEEE INFOCOM 2024, 2024

Adaptive Immune Optimization Algorithm: Combining Mutual Information and Differential Evolution-based Mutation for Local Feature Selection on Microarray Data.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2024

Towards Inductive Robustness: Distilling and Fostering Wave-Induced Resonance in Transductive GCNs against Graph Adversarial Attacks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Artificial immunity based distributed and fast anomaly detection for Industrial Internet of Things.
Future Gener. Comput. Syst., November, 2023

An artificial immunity based intrusion detection system for unknown cyberattacks.
Appl. Soft Comput., November, 2023

DGA-PSO: An improved detector generation algorithm based on particle swarm optimization in negative selection.
Knowl. Based Syst., October, 2023

Fast Attack Detection Method for Imbalanced Data in Industrial Cyber-Physical Systems.
J. Artif. Intell. Soft Comput. Res., October, 2023

MPF-FS: A multi-population framework based on multi-objective optimization algorithms for feature selection.
Appl. Intell., October, 2023

DBWE-Corbat: Background network traffic generation using dynamic word embedding and contrastive learning for cyber range.
Comput. Secur., June, 2023

Feature selection optimized by the artificial immune algorithm based on genome shuffling and conditional lethal mutation.
Appl. Intell., June, 2023

SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning.
Future Internet, April, 2023

Comprehensive Android Malware Detection Based on Federated Learning Architecture.
IEEE Trans. Inf. Forensics Secur., 2023

A hybrid Artificial Immune optimization for high-dimensional feature selection.
Knowl. Based Syst., 2023

Graph Agent Network: Empowering Nodes with Decentralized Communications Capabilities for Adversarial Resilience.
CoRR, 2023

An Attack Entity Deducing Model for Attack Forensics.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

A Secure Duplicate Data Sharing Method against Untrusted Cloud Service Provider.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023

2022
FEEL: Federated End-to-End Learning With Non-IID Data for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2022

Robust adaptive dual layer sliding mode controller: Methodology and application of uncertain robot manipulator.
Trans. Inst. Meas. Control, 2022

An adaptive clonal selection algorithm with multiple differential evolution strategies.
Inf. Sci., 2022

XSS adversarial example attacks based on deep reinforcement learning.
Comput. Secur., 2022

An Improved Crowd Aggregation Prediction Algorithm Based on ARMA.
Proceedings of the ICIAI 2022: The 6th International Conference on Innovation in Artificial Intelligence, Guangzhou China, March 4, 2022

A discrete clonal selection algorithm for filter-based local feature selection.
Proceedings of the IEEE Congress on Evolutionary Computation, 2022

2021
DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021

Adaptive Video Data Hiding through Cost Assignment and STCs.
IEEE Trans. Dependable Secur. Comput., 2021

SP-SMOTE: A novel space partitioning based synthetic minority oversampling technique.
Knowl. Based Syst., 2021

A hybrid real-valued negative selection algorithm with variable-sized detectors and the k-nearest neighbors algorithm.
Knowl. Based Syst., 2021

GNN-DBSCAN: A new density-based algorithm using grid and the nearest neighbor.
J. Intell. Fuzzy Syst., 2021

SFE-GACN: A novel unknown attack detection under insufficient data via intra categories generation in embedding space.
Comput. Secur., 2021

JSContana: Malicious JavaScript detection using adaptable context analysis and key feature extraction.
Comput. Secur., 2021

An immune-based risk assessment method for digital virtual assets.
Comput. Secur., 2021

HD-NSA: A real-valued negative selection algorithm based on hierarchy division.
Appl. Soft Comput., 2021

Construction of Agent Model Based on Emotional Interaction.
Proceedings of the ISEEIE 2021: International Symposium on Electrical, Electronics and Information Engineering, Seoul Republic of Korea, February 19, 2021

FS-IDS: A Novel Few-Shot Learning Based Intrusion Detection System for SCADA Networks.
Proceedings of the ICC 2021, 2021

2020
Fractal Coding-Based Robust and Alignment-Free Fingerprint Image Hashing.
IEEE Trans. Inf. Forensics Secur., 2020

A novel density-based clustering algorithm using nearest neighbor graph.
Pattern Recognit., 2020

Spam transaction attack detection model based on GRU and WGAN-div.
Comput. Commun., 2020

Local feature selection based on artificial immune system for classification.
Appl. Soft Comput., 2020

Immune-Based Network Dynamic Risk Control Strategy Knowledge Ontology Construction.
Proceedings of the Intelligent Computing, 2020

2019
A Simple Recurrent Unit Model Based Intrusion Detection System With DCGAN.
IEEE Access, 2019

An Antigen Space Triangulation Coverage Based Real-Value Negative Selection Algorithm.
IEEE Access, 2019

An Immune-Based Real-Time Quantitative Detection for Threat Change of Cyberspace Digital Virtual Assets.
Proceedings of the 3rd European Conference on Electrical Engineering and Computer Science, 2019

2018
Optimal probabilistic encryption for distributed detection in wireless sensor networks based on immune differential evolution algorithm.
Wirel. Networks, 2018

Synchronization Control of Coupled Memristor-Based Neural Networks with Mixed Delays and Stochastic Perturbations.
Neural Process. Lett., 2018

Particle swarm optimizer with crossover operation.
Eng. Appl. Artif. Intell., 2018

Improving semi-supervised co-forest algorithm in evolving data streams.
Appl. Intell., 2018

An immune based dynamic risk control system.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018

dnyNSA: A Novel Real-Value Based Negative Selection Algorithm.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018

An Immunity-Based Security Threat Detection System for Cyberspace Digital Virtual Assets.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Finite-time synchronization of memristor-based neural networks with mixed delays.
Neurocomputing, 2017

An antigen space density based real-value negative selection algorithm.
Appl. Soft Comput., 2017

An Improved Negative Selection Algorithm Based on Subspace Density Seeking.
IEEE Access, 2017

2015
Intelligent traffic signal controller based on type-2 fuzzy logic and NSGAII.
J. Intell. Fuzzy Syst., 2015

Intelligent control of cognitive radio parameter adaption: Using evolutionary multi-objective algorithm based on user preference.
Ad Hoc Networks, 2015

2014
Negative selection algorithm based on grid file of the feature space.
Knowl. Based Syst., 2014

2013
A negative selection algorithm based on hierarchical clustering of self set.
Sci. China Inf. Sci., 2013

2012
Strategy of fast and light-load cloud-based proactive benign worm countermeasure technology to contain worm propagation.
J. Supercomput., 2012

Erratum to: A novel dynamic network data replication scheme based on historical access record and proactive deletion.
J. Supercomput., 2012

A novel dynamic network data replication scheme based on historical access record and proactive deletion.
J. Supercomput., 2012

2011
A Negative Selection Algorithm Based on Hierarchical Clustering of Self Set and its Application in Anomaly Detection.
Int. J. Comput. Intell. Syst., 2011

A novel intrusion detection approach learned from the change of antibody concentration in biological immune response.
Appl. Intell., 2011

2010
Robust Channel Estimation and Detection for Single-Carrier and Multicarrier Block Transmission Systems.
IEEE Trans. Veh. Technol., 2010

An Outlier Robust Negative Selection Algorithm Inspired by Immune Suppression.
J. Comput., 2010

Chaotic Time Series Prediction Using Immune Optimization Theory.
Int. J. Comput. Intell. Syst., 2010

A New Cluster Based Real Negative Selection Algorithm.
Proceedings of the Information and Automation - International Symposium, 2010

2009
Distributed agents model for intrusion detection based on AIS.
Knowl. Based Syst., 2009

A New Intrusion Detection Method Based on Antibody Concentration.
Proceedings of the Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence, 2009

2007
Computer Forensics System Based on Artificial Immune Systems.
J. Univers. Comput. Sci., 2007

A secure mobile communication approach based on information hiding.
Int. J. Ad Hoc Ubiquitous Comput., 2007

Generalized multichannel amplitude-and-phase coded modulation for differential space-time communications.
Digit. Signal Process., 2007

A Genetic Algorithm Based on Immune and Chaos.
Proceedings of the Third International Conference on Natural Computation, 2007

A Feedback Negative Selection Algorithm to Anomaly Detection.
Proceedings of the Third International Conference on Natural Computation, 2007

Dynamical Network Forensics Based on Immune Agent.
Proceedings of the Third International Conference on Natural Computation, 2007

Artificial Immunity-Based Discovery for Popular Information in WEB Pages.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Exploration of Network Security Information Hid in Web Pages Based on Immunology.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

2006
A new differential modulation for coded OFDM with multiple transmit antennas.
IEEE Signal Process. Lett., 2006

Robust multiuser detection for multicarrier CDMA systems.
IEEE J. Sel. Areas Commun., 2006

Immune-Based Dynamic Intrusion Response Model.
Proceedings of the Simulated Evolution and Learning, 6th International Conference, 2006

Immune Multi-agent Active Defense Model for Network Intrusion.
Proceedings of the Simulated Evolution and Learning, 6th International Conference, 2006

An Immune Mobile Agent Based Grid Intrusion Detection Model.
Proceedings of the Simulated Evolution and Learning, 6th International Conference, 2006

Parameter Evolution for Quality of Service in Multimedia Networking.
Proceedings of the Agent Computing and Multi-Agent Systems, 2006

Immunity and Mobile Agent Based Intrusion Detection for Grid.
Proceedings of the Agent Computing and Multi-Agent Systems, 2006

An Immune Evolutionary Algorithm Based on Chaos Mutation.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

Family Gene Based Grid Trust Model.
Proceedings of the Advances in Natural Computation, Second International Conference, 2006

Grid Intrusion Detection Based on Immune Agent.
Proceedings of the Advances in Natural Computation, Second International Conference, 2006

An Immunity-Based Dynamic Multilayer Intrusion Detection System.
Proceedings of the Computational Intelligence and Bioinformatics, 2006

NASC: A Novel Approach for Spam Classification.
Proceedings of the Computational Intelligence and Bioinformatics, 2006

A Big-Neuron Based Expert System.
Proceedings of the Intelligent Computing, 2006

Immunity and Mobile Agent Based Grid Intrusion Detection.
Proceedings of the Computational Intelligence and Bioinformatics, 2006

An Immune-Based Model for Service Survivability.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

2005
A Weather Forecast System Based on Artificial Immune System.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

A New Model of Immune-Based Network Surveillance and Dynamic Computer Forensics.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

A New Model for Dynamic Intrusion Detection.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

An Immune-Based Model for Computer Virus Detection.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2004
Code-timing estimation for CDMA systems with bandlimited chip waveforms.
IEEE Trans. Wirel. Commun., 2004

Blind and training-assisted subspace code-timing estimation for CDMA with bandlimited chip waveforms.
IEEE Trans. Veh. Technol., 2004

2001
The Denotational Semantics of NIPL.
ACM SIGPLAN Notices, 2001

2000
An Intelligent Neural Network Programming System (NNPS).
ACM SIGPLAN Notices, 2000


  Loading...