


default search action
Wenshan Li 0001
Person information
- affiliation: Chengdu University of Information Technology, Chengdu, China
Other persons with the same name
- Wenshan Li — disambiguation page
- Wenshan Li 0002
— Harbin Engineering University, Harbin, China - Wenshan Li 0003
— East China Normal University, Shanghai, China - Wenshan Li 0004
— Xiangtan University, Xiangtan, China
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j18]Wenshan Li, Chenyi Huang
, Ao Liu, Yilin Zhang, Beibei Li, Junjiang He, Wenbo Fang, Hongxia Wang:
A feature selection method based on clonal selection with beneficial noise. Pattern Recognit. 171: 112175 (2026)- 2025
[j17]Yi Wang
, Wenshan Li
, Tao Li, Hao Tian:
Single-stage filter-based local feature selection using an immune algorithm for high-dimensional microarray data. Appl. Soft Comput. 172: 112895 (2025)
[j16]Yang Chen, Wenshan Li
, Junjiang He
, Tao Li, Wenbo Fang
, Xiaolong Lan
:
Weak Population-Empowered Large-Scale Multiobjective Immune Algorithm. Int. J. Intell. Syst. 2025(1) (2025)
[j15]Jiangchuan Chen, Junjiang He
, Wenshan Li, Wenbo Fang
, Xiaolong Lan
, Wengang Ma, Tao Li, Dawei Zhao:
NSA-AE: An inadequately represented immune spaces NSA augmented via autoencoders. Neurocomputing 652: 131063 (2025)
[j14]Tao Li, Zhiwei Yang, Wenshan Li
, Linfeng Du, Xiaolong Lan, Junjiang He
:
Malicious encrypted traffic detection method based on multi-granularity representation under data imbalance conditions. Knowl. Based Syst. 316: 113320 (2025)
[j13]Sirui Hao, Junjiang He
, Wenshan Li, Tao Li
, Geying Yang
, Wenbo Fang
, Wanying Chen
:
CSCAD: An Adaptive LightGBM Algorithm to Detect Cache Side-Channel Attacks. IEEE Trans. Dependable Secur. Comput. 22(1): 695-709 (2025)
[j12]Guangquan Xu
, Shicheng Feng
, Hao Xi
, Qingyang Yan, Wenshan Li
, Cong Wang
, Wei Wang
, Shaoying Liu
, Zhihong Tian
, James Xi Zheng
:
Differential-Trust-Mechanism-Based Trade-Off Method Between Privacy and Accuracy in Recommender Systems. IEEE Trans. Inf. Forensics Secur. 20: 5054-5068 (2025)
[j11]Wenbo Fang
, Junjiang He
, Wenshan Li
, Wengang Ma
, Linlin Zhang
, Xiaolong Lan
, Geying Yang
, Jiangchuan Chen
, Tao Li
:
Unknown Cyber Threat Discovery Empowered by Genetic Evolution Without Prior Knowledge. IEEE Trans. Inf. Forensics Secur. 20: 9552-9567 (2025)
[c7]Ao Liu, Wenshan Li, Tao Li, Beibei Li, Guangquan Xu, Pan Zhou, Wengang Ma, Hanyuan Huang:
Graph Agent Network: Empowering Nodes with Inference Capabilities for Adversarial Resilience. AAAI 2025: 18746-18753
[c6]Ao Liu, Wenshan Li, Beibei Li, Wengang Ma, Tao Li, Pan Zhou:
Grimm: A Plug-and-Play Perturbation Rectifier for Graph Neural Networks Defending Against Poisoning Attacks. AAAI 2025: 18754-18762- 2024
[j10]Junhao Li, Junjiang He, Wenshan Li, Wenbo Fang, Geying Yang
, Tao Li:
SynDroid: An adaptive enhanced Android malware classification method based on CTGAN-SVM. Comput. Secur. 137: 103604 (2024)
[j9]Meng Huang, Wenshan Li, Junjiang He, Xiaolong Lan, Tao Li, Nian Zhang:
IDG-SemiAD: An Immune Detector Generation-Based Collaborative Learning Scheme for Semi-supervised Anomaly Detection in Industrial Cyber-physical Systems. Int. J. Comput. Intell. Syst. 17(1): 108 (2024)
[j8]Jiangchuan Chen
, Junjiang He
, Wenshan Li
, Wenbo Fang
, Xiaolong Lan
, Wengang Ma, Tao Li
:
A Hierarchical Unmanned Aerial Vehicle Network Intrusion Detection and Response Approach Based on Immune Vaccine Distribution. IEEE Internet Things J. 11(20): 33312-33325 (2024)
[j7]Jiangchuan Chen
, Junjiang He
, Wenshan Li
, Wenbo Fang
, Xiaolong Lan
, Wengang Ma, Tao Li
:
Corrections to "A Hierarchical Unmanned Aerial Vehicle Network Intrusion Detection and Response Approach Based on Immune Vaccine Distribution". IEEE Internet Things J. 11(23): 38952 (2024)
[j6]Junjiang He
, Cong Tang
, Wenshan Li, Tao Li, Li Chen, Xiaolong Lan
:
BR-HIDF: An Anti-Sparsity and Effective Host Intrusion Detection Framework Based on Multi-Granularity Feature Extraction. IEEE Trans. Inf. Forensics Secur. 19: 485-499 (2024)
[c5]Ao Liu, Wenshan Li, Tao Li, Beibei Li, Hanyuan Huang, Pan Zhou:
Towards Inductive Robustness: Distilling and Fostering Wave-Induced Resonance in Transductive GCNs against Graph Adversarial Attacks. AAAI 2024: 13855-13863
[c4]Yi Wang
, Wenshan Li
, Tao Li
:
Adaptive Immune Optimization Algorithm: Combining Mutual Information and Differential Evolution-based Mutation for Local Feature Selection on Microarray Data. GECCO Companion 2024: 483-486
[i3]Ao Liu, Wenshan Li, Beibei Li, Wengang Ma, Tao Li, Pan Zhou:
Grimm: A Plug-and-Play Perturbation Rectifier for Graph Neural Networks Defending against Poisoning Attacks. CoRR abs/2412.08555 (2024)- 2023
[j5]Jie Yang, Junjiang He, Wenshan Li, Tao Li, Xiaolong Lan, Yunpeng Wang:
MPF-FS: A multi-population framework based on multi-objective optimization algorithms for feature selection. Appl. Intell. 53(19): 22179-22199 (2023)
[j4]Beibei Li
, Yujie Chang, Hanyuan Huang, Wenshan Li, Tao Li, Wen Chen:
Artificial immunity based distributed and fast anomaly detection for Industrial Internet of Things. Future Gener. Comput. Syst. 148: 367-379 (2023)
[j3]Yongbin Zhu
, Wenshan Li, Tao Li:
A hybrid Artificial Immune optimization for high-dimensional feature selection. Knowl. Based Syst. 260: 110111 (2023)
[j2]Ge Zhang
, Junjiang He, Wenshan Li, Tao Li, Xiaolong Lan, Yunpeng Wang:
DGA-PSO: An improved detector generation algorithm based on particle swarm optimization in negative selection. Knowl. Based Syst. 278: 110892 (2023)
[j1]Wenbo Fang
, Junjiang He, Wenshan Li, Xiaolong Lan
, Yang Chen, Tao Li
, Jiwu Huang
, Linlin Zhang:
Comprehensive Android Malware Detection Based on Federated Learning Architecture. IEEE Trans. Inf. Forensics Secur. 18: 3977-3990 (2023)
[c3]Jiawei Wang, Junjiang He, Wenshan Li, Xiaolong Lan, Qian Liu, Tao Li:
A Secure Duplicate Data Sharing Method against Untrusted Cloud Service Provider. CloudNet 2023: 352-359
[c2]Tao Jiang, Junjiang He, Tao Li, Wenbo Fang, Wenshan Li, Cong Tang:
An Attack Entity Deducing Model for Attack Forensics. ICONIP (15) 2023: 340-354
[i2]Ao Liu, Wenshan Li, Tao Li, Beibei Li, Hanyuan Huang, Guangquan Xu, Pan Zhou:
Graph Agent Network: Empowering Nodes with Decentralized Communications Capabilities for Adversarial Resilience. CoRR abs/2306.06909 (2023)
[i1]Ao Liu, Wenshan Li, Tao Li, Beibei Li
, Hanyuan Huang, Pan Zhou:
Towards Inductive Robustness: Distilling and Fostering Wave-induced Resonance in Transductive GCNs Against Graph Adversarial Attacks. CoRR abs/2312.08651 (2023)- 2021
[c1]Yongbin Zhu, Wenshan Li, Tao Li, Hui Zhao:
Construction of Agent Model Based on Emotional Interaction. ISEEIE 2021: 356-360
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-20 01:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint



Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







