Tao Li
Orcid: 0000-0002-5302-3180Affiliations:
- Sichuan University, School of Computer Science, Chengdu, China
- University of Electronic Science and Technology of China, Chengdu, China (PhD 1994)
According to our database1,
Tao Li
authored at least 111 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Corrections to "A Hierarchical Unmanned Aerial Vehicle Network Intrusion Detection and Response Approach Based on Immune Vaccine Distribution".
IEEE Internet Things J., December, 2024
IDG-SemiAD: An Immune Detector Generation-Based Collaborative Learning Scheme for Semi-supervised Anomaly Detection in Industrial Cyber-physical Systems.
Int. J. Comput. Intell. Syst., December, 2024
A Hierarchical Unmanned Aerial Vehicle Network Intrusion Detection and Response Approach Based on Immune Vaccine Distribution.
IEEE Internet Things J., October, 2024
IEEE Internet Things J., September, 2024
Information-Freshness-Aware Wireless Multiuser Uplink Physical-Layer Security Communication.
IEEE Internet Things J., May, 2024
SynDroid: An adaptive enhanced Android malware classification method based on CTGAN-SVM.
Comput. Secur., February, 2024
IEEE Trans. Neural Networks Learn. Syst., January, 2024
BR-HIDF: An Anti-Sparsity and Effective Host Intrusion Detection Framework Based on Multi-Granularity Feature Extraction.
IEEE Trans. Inf. Forensics Secur., 2024
An Automatic XSS Attack Vector Generation Method Based on the Improved Dueling DDQN Algorithm.
IEEE Trans. Dependable Secur. Comput., 2024
Exponential Stability for a Class of Discrete-Time Switched Systems and Its Applications to Multiagent Systems.
SIAM J. Control. Optim., 2024
Inf. Sci., 2024
A two-stage clonal selection algorithm for local feature selection on high-dimensional data.
Inf. Sci., 2024
SPAW-SMOTE: Space Partitioning Adaptive Weighted Synthetic Minority Oversampling Technique For Imbalanced Data Set Learning.
Comput. J., 2024
A Cooperative Differential Evolution Based Intrusion Detection System for Unknown Cyberattacks.
Proceedings of the IEEE INFOCOM 2024, 2024
Adaptive Immune Optimization Algorithm: Combining Mutual Information and Differential Evolution-based Mutation for Local Feature Selection on Microarray Data.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2024
Towards Inductive Robustness: Distilling and Fostering Wave-Induced Resonance in Transductive GCNs against Graph Adversarial Attacks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Artificial immunity based distributed and fast anomaly detection for Industrial Internet of Things.
Future Gener. Comput. Syst., November, 2023
Appl. Soft Comput., November, 2023
DGA-PSO: An improved detector generation algorithm based on particle swarm optimization in negative selection.
Knowl. Based Syst., October, 2023
Fast Attack Detection Method for Imbalanced Data in Industrial Cyber-Physical Systems.
J. Artif. Intell. Soft Comput. Res., October, 2023
MPF-FS: A multi-population framework based on multi-objective optimization algorithms for feature selection.
Appl. Intell., October, 2023
DBWE-Corbat: Background network traffic generation using dynamic word embedding and contrastive learning for cyber range.
Comput. Secur., June, 2023
Feature selection optimized by the artificial immune algorithm based on genome shuffling and conditional lethal mutation.
Appl. Intell., June, 2023
SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning.
Future Internet, April, 2023
IEEE Trans. Inf. Forensics Secur., 2023
Knowl. Based Syst., 2023
Graph Agent Network: Empowering Nodes with Decentralized Communications Capabilities for Adversarial Resilience.
CoRR, 2023
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023
2022
IEEE Trans. Intell. Transp. Syst., 2022
Robust adaptive dual layer sliding mode controller: Methodology and application of uncertain robot manipulator.
Trans. Inst. Meas. Control, 2022
An adaptive clonal selection algorithm with multiple differential evolution strategies.
Inf. Sci., 2022
Comput. Secur., 2022
Proceedings of the ICIAI 2022: The 6th International Conference on Innovation in Artificial Intelligence, Guangzhou China, March 4, 2022
Proceedings of the IEEE Congress on Evolutionary Computation, 2022
2021
DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Dependable Secur. Comput., 2021
SP-SMOTE: A novel space partitioning based synthetic minority oversampling technique.
Knowl. Based Syst., 2021
A hybrid real-valued negative selection algorithm with variable-sized detectors and the k-nearest neighbors algorithm.
Knowl. Based Syst., 2021
J. Intell. Fuzzy Syst., 2021
SFE-GACN: A novel unknown attack detection under insufficient data via intra categories generation in embedding space.
Comput. Secur., 2021
JSContana: Malicious JavaScript detection using adaptable context analysis and key feature extraction.
Comput. Secur., 2021
Comput. Secur., 2021
Appl. Soft Comput., 2021
Proceedings of the ISEEIE 2021: International Symposium on Electrical, Electronics and Information Engineering, Seoul Republic of Korea, February 19, 2021
FS-IDS: A Novel Few-Shot Learning Based Intrusion Detection System for SCADA Networks.
Proceedings of the ICC 2021, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
Pattern Recognit., 2020
Comput. Commun., 2020
Appl. Soft Comput., 2020
Proceedings of the Intelligent Computing, 2020
2019
IEEE Access, 2019
An Antigen Space Triangulation Coverage Based Real-Value Negative Selection Algorithm.
IEEE Access, 2019
An Immune-Based Real-Time Quantitative Detection for Threat Change of Cyberspace Digital Virtual Assets.
Proceedings of the 3rd European Conference on Electrical Engineering and Computer Science, 2019
2018
Optimal probabilistic encryption for distributed detection in wireless sensor networks based on immune differential evolution algorithm.
Wirel. Networks, 2018
Synchronization Control of Coupled Memristor-Based Neural Networks with Mixed Delays and Stochastic Perturbations.
Neural Process. Lett., 2018
Appl. Intell., 2018
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018
An Immunity-Based Security Threat Detection System for Cyberspace Digital Virtual Assets.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
Neurocomputing, 2017
Appl. Soft Comput., 2017
IEEE Access, 2017
2015
J. Intell. Fuzzy Syst., 2015
Intelligent control of cognitive radio parameter adaption: Using evolutionary multi-objective algorithm based on user preference.
Ad Hoc Networks, 2015
2014
Knowl. Based Syst., 2014
2013
Sci. China Inf. Sci., 2013
2012
Strategy of fast and light-load cloud-based proactive benign worm countermeasure technology to contain worm propagation.
J. Supercomput., 2012
Erratum to: A novel dynamic network data replication scheme based on historical access record and proactive deletion.
J. Supercomput., 2012
A novel dynamic network data replication scheme based on historical access record and proactive deletion.
J. Supercomput., 2012
2011
A Negative Selection Algorithm Based on Hierarchical Clustering of Self Set and its Application in Anomaly Detection.
Int. J. Comput. Intell. Syst., 2011
A novel intrusion detection approach learned from the change of antibody concentration in biological immune response.
Appl. Intell., 2011
2010
Robust Channel Estimation and Detection for Single-Carrier and Multicarrier Block Transmission Systems.
IEEE Trans. Veh. Technol., 2010
J. Comput., 2010
Int. J. Comput. Intell. Syst., 2010
Proceedings of the Information and Automation - International Symposium, 2010
2009
Knowl. Based Syst., 2009
Proceedings of the Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence, 2009
2007
J. Univers. Comput. Sci., 2007
Int. J. Ad Hoc Ubiquitous Comput., 2007
Generalized multichannel amplitude-and-phase coded modulation for differential space-time communications.
Digit. Signal Process., 2007
Proceedings of the Third International Conference on Natural Computation, 2007
Proceedings of the Third International Conference on Natural Computation, 2007
Proceedings of the Third International Conference on Natural Computation, 2007
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007
2006
IEEE Signal Process. Lett., 2006
IEEE J. Sel. Areas Commun., 2006
Proceedings of the Simulated Evolution and Learning, 6th International Conference, 2006
Proceedings of the Simulated Evolution and Learning, 6th International Conference, 2006
Proceedings of the Simulated Evolution and Learning, 6th International Conference, 2006
Proceedings of the Agent Computing and Multi-Agent Systems, 2006
Proceedings of the Agent Computing and Multi-Agent Systems, 2006
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006
Proceedings of the Advances in Natural Computation, Second International Conference, 2006
Proceedings of the Advances in Natural Computation, Second International Conference, 2006
Proceedings of the Computational Intelligence and Bioinformatics, 2006
Proceedings of the Computational Intelligence and Bioinformatics, 2006
Proceedings of the Computational Intelligence and Bioinformatics, 2006
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006
2005
Proceedings of the Advances in Natural Computation, First International Conference, 2005
Proceedings of the Advances in Natural Computation, First International Conference, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
2004
IEEE Trans. Wirel. Commun., 2004
Blind and training-assisted subspace code-timing estimation for CDMA with bandlimited chip waveforms.
IEEE Trans. Veh. Technol., 2004
2001
2000