Stop the war!
Остановите войну!
for scientists:
default search action
Tao Li 0016
Person information
- affiliation: Sichuan University, School of Computer Science, Chengdu, China
Other persons with the same name
- Tao Li — disambiguation page
- Tao Li 0001 — Nanjing University of Posts and Telecommunications, School of Computer Science, China (and 2 more)
- Tao Li 0002 — East China Normal University, School of Mathematical Sciences, Shanghai, China (and 2 more)
- Tao Li 0003 — City University of Hong Kong, Department of Economics and Finance, Hong Kong
- Tao Li 0004 — National Administration of Surveying, Mapping and Geo-Information, Beijing, China
- Tao Li 0005 — Tohoku University, School of Engineering, Sendai, Japan (and 3 more)
- Tao Li 0006 — University of Florida, Department of Electrical and Computer Engineering, Gainesville, FL, USA (and 1 more)
- Tao Li 0007 — Suzhou University of Science and Technology, College of Mathematics and Physics, China
- Tao Li 0008 — National University of Defense Technology, College of Computer, Changsha, China
- Tao Li 0009 — Xidian University, National Laboratory of Radar Signal Processing, Xi'an, China
- Tao Li 0010 — Xidian University, State Key Laboratory of Integrated Services Networks, Xi'an, China
- Tao Li 0011 — Nanjing University of Aeronautics and Astronautics, School of Automation Engineering, China (and 1 more)
- Tao Li 0012 — Tsinghua University, Department of Electronic Engineering, TNList, Beijing, China
- Tao Li 0013 — Google Inc., Mountain View, CA, USA (and 2 more)
- Tao Li 0014 — Xihua University, School of Electrical Engineering and Electronic Information, Chengdu, China (and 1 more)
- Tao Li 0015 — Beijing Research Center of Intelligent Equipment for Agriculture, China (and 1 more)
- Tao Li 0017 — Yangtze University, National Demonstration Center for Experimental Electrical and Electronic Education, Jingzhou, China (and 1 more)
- Tao Li 0018 — Wuhan University of Science and Technology, College of Computer Science and Technology, China
- Tao Li 0019 — Purdue University, Department of Computer Science, West Lafayette, Indiana, USA
- Tao Li 0020 — University of New South Wales, Sydney, Australia
- Tao Li 0021 — University of Warwick, Coventry, UK
- Tao Li 0022 — Nankai University, Tianjin, China
- Tao Li 0023 — Harbin Engineering University, College of Computer Science and Technology, China
- Tao Li 0024 — Nanjing University of Information Science and Technology, School of Automation, Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology, China
- Tao Li 0025 — Wuhan University, Global Navigation Satellite System (GNSS) Research Centre, China
- Tao Li 0026 — TU Dresden, Faculty of Computer Science, Germany
- Tao Li 0027 (aka: Andy Tao Li) — Tsinghua University, School of Economics and Management, Beijing, China
- Tao Li 0028 — Heilongjiang University, Electronic Engineering College, Harbin, China
- Tao Li 0029 — Beijing Institute of Technology, Laboratory of Low Emission Vehicle, China
- Tao Li 0030 — University of Electronic Science and Technology of China, School of Management and Economics, Chengdu, China
- Tao Li 0031 — Ocean University of China, Department of Computer Science and Technology, Qingdao, China
- Tao Li 0032 — Beijing Institute of Technology, State Key Lab of Explosion Science and Technology, China
- Tao Li 0033 — Central South University, School of Information Science and Engineering, Changsha, China
- Tao Li 0034 — Sichuan University, West China Hospital, Chengdu, China
- Tao Li 0035 — University of Shanghai for Science and Technology, School of Environment and Architecture, China
- Tao Li 0036 — Sichuan University, Department of Mathematics, Chengdu, China
- Tao Li 0037 — Beijing Technology and Business University, School of Mathematics and Statistics, China
- Tao Li 0038 — Hong Kong Applied Science and Technology Research Institute, Hong Kong (and 1 more)
- Tao Li 0039 — Google DeepMind (and 1 more)
- Tao Li 0040 — Peking University, Department of Information Science, Beijing, China
- Tao Li 0041 — Renmin University of China, Beijing, China
- Tao Li 0042 — Indiana University-Purdue University, IN, USA
- Tao Li 0043 — Guizhou University, State Key Laboratory of Public Big Data, College of Computer Science and Technology, China (and 1 more)
- Tao Li 0044 — L'Oréal
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j65]Shaohong Zhou, Junjiang He, Tao Li, Xiaolong Lan, Yunpeng Wang, Hui Zhao, Yihong Li:
Automating the Deployment of Cyber Range with OpenStack. Comput. J. 67(3): 851-863 (2024) - [j64]Qiang Zhang, Junjiang He, Tao Li, Xiaolong Lan, Wenbo Fang, Yihong Li:
SPAW-SMOTE: Space Partitioning Adaptive Weighted Synthetic Minority Oversampling Technique For Imbalanced Data Set Learning. Comput. J. 67(5): 1747-1762 (2024) - [j63]Junhao Li, Junjiang He, Wenshan Li, Wenbo Fang, Geying Yang, Tao Li:
SynDroid: An adaptive enhanced Android malware classification method based on CTGAN-SVM. Comput. Secur. 137: 103604 (2024) - [j62]Meng Huang, Wenshan Li, Junjiang He, Xiaolong Lan, Tao Li, Nian Zhang:
IDG-SemiAD: An Immune Detector Generation-Based Collaborative Learning Scheme for Semi-supervised Anomaly Detection in Industrial Cyber-physical Systems. Int. J. Comput. Intell. Syst. 17(1): 108 (2024) - [j61]Xiaolong Lan, Ziheng Xu, Junjiang He, Liang Liu, Qingchun Chen, Tao Li:
Information-Freshness-Aware Wireless Multiuser Uplink Physical-Layer Security Communication. IEEE Internet Things J. 11(9): 15940-15956 (2024) - [j60]Junjiang He, Yaxin Li, Jiahang Tang, Hongxia Wang, Geying Yang, Tao Li, Xiaolong Lan:
An Immune-Knowledge-Driven SCADA-Based Industrial Virus Propagation Model. IEEE Internet Things J. 11(18): 29956-29970 (2024) - [j59]Yi Wang, Hao Tian, Tao Li, Xiaojie Liu:
A two-stage clonal selection algorithm for local feature selection on high-dimensional data. Inf. Sci. 677: 120867 (2024) - [j58]Geying Yang, Junjiang He, Xiaolong Lan, Tao Li, Wenbo Fang:
A fast dual-module hybrid high-dimensional feature selection algorithm. Inf. Sci. 681: 121185 (2024) - [j57]Tao Li, Jie Huang:
Exponential Stability for a Class of Discrete-Time Switched Systems and Its Applications to Multiagent Systems. SIAM J. Control. Optim. 62(2): 1165-1182 (2024) - [j56]Yuan Yao, Junjiang He, Tao Li, Yunpeng Wang, Xiaolong Lan, Yuan Li:
An Automatic XSS Attack Vector Generation Method Based on the Improved Dueling DDQN Algorithm. IEEE Trans. Dependable Secur. Comput. 21(4): 2852-2868 (2024) - [j55]Junjiang He, Cong Tang, Wenshan Li, Tao Li, Li Chen, Xiaolong Lan:
BR-HIDF: An Anti-Sparsity and Effective Host Intrusion Detection Framework Based on Multi-Granularity Feature Extraction. IEEE Trans. Inf. Forensics Secur. 19: 485-499 (2024) - [j54]Ao Liu, Beibei Li, Tao Li, Pan Zhou, Rui Wang:
AN-GCN: An Anonymous Graph Convolutional Network Against Edge-Perturbing Attacks. IEEE Trans. Neural Networks Learn. Syst. 35(1): 88-102 (2024) - [c35]Ao Liu, Wenshan Li, Tao Li, Beibei Li, Hanyuan Huang, Pan Zhou:
Towards Inductive Robustness: Distilling and Fostering Wave-Induced Resonance in Transductive GCNs against Graph Adversarial Attacks. AAAI 2024: 13855-13863 - [c34]Hanyuan Huang, Beibei Li, Tao Li:
A Cooperative Differential Evolution Based Intrusion Detection System for Unknown Cyberattacks. INFOCOM (Workshops) 2024: 1-2 - 2023
- [j53]Yongbin Zhu, Tao Li, Xiaolong Lan:
Feature selection optimized by the artificial immune algorithm based on genome shuffling and conditional lethal mutation. Appl. Intell. 53(11): 13972-13992 (2023) - [j52]Jie Yang, Junjiang He, Wenshan Li, Tao Li, Xiaolong Lan, Yunpeng Wang:
MPF-FS: A multi-population framework based on multi-objective optimization algorithms for feature selection. Appl. Intell. 53(19): 22179-22199 (2023) - [j51]Hanyuan Huang, Tao Li, Yong Ding, Beibei Li, Ao Liu:
An artificial immunity based intrusion detection system for unknown cyberattacks. Appl. Soft Comput. 148: 110875 (2023) - [j50]Linfeng Du, Junjiang He, Tao Li, Yunpeng Wang, Xiaolong Lan, Yunhua Huang:
DBWE-Corbat: Background network traffic generation using dynamic word embedding and contrastive learning for cyber range. Comput. Secur. 129: 103202 (2023) - [j49]Beibei Li, Yujie Chang, Hanyuan Huang, Wenshan Li, Tao Li, Wen Chen:
Artificial immunity based distributed and fast anomaly detection for Industrial Internet of Things. Future Gener. Comput. Syst. 148: 367-379 (2023) - [j48]Yuting Guan, Junjiang He, Tao Li, Hui Zhao, Baoqiang Ma:
SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning. Future Internet 15(4): 133 (2023) - [j47]Meng Huang, Tao Li, Beibei Li, Nian Zhang, Hanyuan Huang:
Fast Attack Detection Method for Imbalanced Data in Industrial Cyber-Physical Systems. J. Artif. Intell. Soft Comput. Res. 13(4): 229-245 (2023) - [j46]Yongbin Zhu, Wenshan Li, Tao Li:
A hybrid Artificial Immune optimization for high-dimensional feature selection. Knowl. Based Syst. 260: 110111 (2023) - [j45]Ge Zhang, Junjiang He, Wenshan Li, Tao Li, Xiaolong Lan, Yunpeng Wang:
DGA-PSO: An improved detector generation algorithm based on particle swarm optimization in negative selection. Knowl. Based Syst. 278: 110892 (2023) - [j44]Wenbo Fang, Junjiang He, Wenshan Li, Xiaolong Lan, Yang Chen, Tao Li, Jiwu Huang, Linlin Zhang:
Comprehensive Android Malware Detection Based on Federated Learning Architecture. IEEE Trans. Inf. Forensics Secur. 18: 3977-3990 (2023) - [c33]Jiawei Wang, Junjiang He, Wenshan Li, Xiaolong Lan, Qian Liu, Tao Li:
A Secure Duplicate Data Sharing Method against Untrusted Cloud Service Provider. CloudNet 2023: 352-359 - [c32]Tao Jiang, Junjiang He, Tao Li, Wenbo Fang, Wenshan Li, Cong Tang:
An Attack Entity Deducing Model for Attack Forensics. ICONIP (15) 2023: 340-354 - [i2]Ao Liu, Wenshan Li, Tao Li, Beibei Li, Hanyuan Huang, Guangquan Xu, Pan Zhou:
Graph Agent Network: Empowering Nodes with Decentralized Communications Capabilities for Adversarial Resilience. CoRR abs/2306.06909 (2023) - [i1]Ao Liu, Wenshan Li, Tao Li, Beibei Li, Hanyuan Huang, Pan Zhou:
Towards Inductive Robustness: Distilling and Fostering Wave-induced Resonance in Transductive GCNs Against Graph Adversarial Attacks. CoRR abs/2312.08651 (2023) - 2022
- [j43]Li Chen, Cong Tang, Junjiang He, Hui Zhao, Xiaolong Lan, Tao Li:
XSS adversarial example attacks based on deep reinforcement learning. Comput. Secur. 120: 102831 (2022) - [j42]Yi Wang, Tao Li, Xiaojie Liu, Jian Yao:
An adaptive clonal selection algorithm with multiple differential evolution strategies. Inf. Sci. 604: 142-169 (2022) - [j41]Ya-Jun Ma, Hui Zhao, Tao Li:
Robust adaptive dual layer sliding mode controller: Methodology and application of uncertain robot manipulator. Trans. Inst. Meas. Control 44(4) (2022) - [j40]Beibei Li, Yukun Jiang, Qingqi Pei, Tao Li, Liang Liu, Rongxing Lu:
FEEL: Federated End-to-End Learning With Non-IID Data for Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 23(9): 16728-16740 (2022) - [c31]Yi Wang, Tao Li, Xiaojie Liu, Jian Yao:
A discrete clonal selection algorithm for filter-based local feature selection. CEC 2022: 1-8 - [c30]Zhan Gao, Yang Chen, Zhiyong Li, Tao Li, Junjiang He, Yuehao Li:
An Improved Crowd Aggregation Prediction Algorithm Based on ARMA. ICIAI 2022: 8-12 - 2021
- [j39]Junjiang He, Wen Chen, Tao Li, Beibei Li, Yongbin Zhu, Meng Huang:
HD-NSA: A real-valued negative selection algorithm based on hierarchy division. Appl. Soft Comput. 112: 107726 (2021) - [j38]Junjiang He, Tao Li, Beibei Li, Xiaolong Lan, Zhiyong Li, Yunpeng Wang:
An immune-based risk assessment method for digital virtual assets. Comput. Secur. 102: 102134 (2021) - [j37]Yunhua Huang, Tao Li, Lijia Zhang, Beibei Li, Xiaojie Liu:
JSContana: Malicious JavaScript detection using adaptable context analysis and key feature extraction. Comput. Secur. 104: 102218 (2021) - [j36]Ao Liu, Yunpeng Wang, Tao Li:
SFE-GACN: A novel unknown attack detection under insufficient data via intra categories generation in embedding space. Comput. Secur. 105: 102262 (2021) - [j35]Yihong Li, Yunpeng Wang, Tao Li, Xiaolong Lan, Han Song:
GNN-DBSCAN: A new density-based algorithm using grid and the nearest neighbor. J. Intell. Fuzzy Syst. 41(6): 7589-7601 (2021) - [j34]Yihong Li, Yunpeng Wang, Tao Li, Beibei Li, Xiaolong Lan:
SP-SMOTE: A novel space partitioning based synthetic minority oversampling technique. Knowl. Based Syst. 228: 107269 (2021) - [j33]Zhiyong Li, Tao Li, Junjiang He, Yongbin Zhu, Yunpeng Wang:
A hybrid real-valued negative selection algorithm with variable-sized detectors and the k-nearest neighbors algorithm. Knowl. Based Syst. 232: 107477 (2021) - [j32]Yanli Chen, Hongxia Wang, Hanzhou Wu, Zhiqiang Wu, Tao Li, Asad Malik:
Adaptive Video Data Hiding through Cost Assignment and STCs. IEEE Trans. Dependable Secur. Comput. 18(3): 1320-1335 (2021) - [j31]Beibei Li, Yuhao Wu, Jiarui Song, Rongxing Lu, Tao Li, Liang Zhao:
DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber-Physical Systems. IEEE Trans. Ind. Informatics 17(8): 5615-5624 (2021) - [c29]Yuankai Ouyang, Beibei Li, Qinglei Kong, Han Song, Tao Li:
FS-IDS: A Novel Few-Shot Learning Based Intrusion Detection System for SCADA Networks. ICC 2021: 1-6 - [c28]Yongbin Zhu, Wenshan Li, Tao Li, Hui Zhao:
Construction of Agent Model Based on Emotional Interaction. ISEEIE 2021: 356-360 - 2020
- [j30]Yi Wang, Tao Li:
Local feature selection based on artificial immune system for classification. Appl. Soft Comput. 87: 105989 (2020) - [j29]Jin Yang, Tao Li, Gang Liang, Yunpeng Wang, Tianyu Gao, Fangdong Zhu:
Spam transaction attack detection model based on GRU and WGAN-div. Comput. Commun. 161: 172-182 (2020) - [j28]Hao Li, Xiaojie Liu, Tao Li, Rundong Gan:
A novel density-based clustering algorithm using nearest neighbor graph. Pattern Recognit. 102: 107206 (2020) - [j27]Sani M. Abdullahi, Hongxia Wang, Tao Li:
Fractal Coding-Based Robust and Alignment-Free Fingerprint Image Hashing. IEEE Trans. Inf. Forensics Secur. 15: 2587-2601 (2020) - [c27]Meng Huang, Tao Li, Hui Zhao, Xiaojie Liu, Zhan Gao:
Immune-Based Network Dynamic Risk Control Strategy Knowledge Ontology Construction. SAI (3) 2020: 420-430
2010 – 2019
- 2019
- [c26]Junjiang He, Tao Li, Hui Zhao, Xiaojie Liu, Zhan Gao, Yunpeng Wang:
An Immune-Based Real-Time Quantitative Detection for Threat Change of Cyberspace Digital Virtual Assets. EECS 2019: 76-81 - 2018
- [j26]Yi Wang, Tao Li:
Improving semi-supervised co-forest algorithm in evolving data streams. Appl. Intell. 48(10): 3248-3262 (2018) - [j25]Wen Chen, Hui Zhao, Tao Li, Yuling Liu:
Optimal probabilistic encryption for distributed detection in wireless sensor networks based on immune differential evolution algorithm. Wirel. Networks 24(7): 2497-2507 (2018) - [c25]Ping Lin, Tao Li, Xiaojie Liu, Hui Zhao, Jin Yang, Fangdong Zhu:
An Immunity-Based Security Threat Detection System for Cyberspace Digital Virtual Assets. ICCCS (2) 2018: 601-611 - 2017
- [j24]Zhengjun Liu, Tao Li, Jin Yang, Tao Yang:
An Improved Negative Selection Algorithm Based on Subspace Density Seeking. IEEE Access 5: 12189-12198 (2017) - [j23]Tao Yang, Wen Chen, Tao Li:
An antigen space density based real-value negative selection algorithm. Appl. Soft Comput. 61: 860-874 (2017) - 2015
- [j22]Wen Chen, Tao Li, Tao Yang:
Intelligent control of cognitive radio parameter adaption: Using evolutionary multi-objective algorithm based on user preference. Ad Hoc Networks 26: 3-16 (2015) - [j21]Wen Chen, Hui Zhao, Tao Li, Yuling Liu:
Intelligent traffic signal controller based on type-2 fuzzy logic and NSGAII. J. Intell. Fuzzy Syst. 29(6): 2611-2618 (2015) - 2014
- [j20]Wen Chen, Xiaoming Ding, Tao Li, Tao Yang:
Negative selection algorithm based on grid file of the feature space. Knowl. Based Syst. 56: 26-35 (2014) - 2013
- [j19]Wen Chen, Tao Li, XiaoJie Liu, Bing Zhang:
A negative selection algorithm based on hierarchical clustering of self set. Sci. China Inf. Sci. 56(8): 1-13 (2013) - 2012
- [j18]Zhe Wang, Tao Li, Naixue Xiong, Yi Pan:
A novel dynamic network data replication scheme based on historical access record and proactive deletion. J. Supercomput. 62(1): 227-250 (2012) - [j17]Zhe Wang, Tao Li, Naixue Xiong, Yi Pan:
Erratum to: A novel dynamic network data replication scheme based on historical access record and proactive deletion. J. Supercomput. 62(1): 616 (2012) - [j16]Xufei Zheng, Tao Li, Yonghui Fang:
Strategy of fast and light-load cloud-based proactive benign worm countermeasure technology to contain worm propagation. J. Supercomput. 62(3): 1451-1479 (2012) - 2011
- [j15]Jie Zeng, XiaoJie Liu, Tao Li, Guiyang Li, Haibo Li, Jinquan Zeng:
A novel intrusion detection approach learned from the change of antibody concentration in biological immune response. Appl. Intell. 35(1): 41-62 (2011) - [j14]Wen Chen, XiaoJie Liu, Tao Li, Yuanquan Shi, Xufei Zheng, Hui Zhao:
A Negative Selection Algorithm Based on Hierarchical Clustering of Self Set and its Application in Anomaly Detection. Int. J. Comput. Intell. Syst. 4(4): 410-419 (2011) - 2010
- [j13]Yuanquan Shi, XiaoJie Liu, Tao Li, Xiaoning Peng, Wen Chen, Ruirui Zhang, Yanming Fu:
Chaotic Time Series Prediction Using Immune Optimization Theory. Int. J. Comput. Intell. Syst. 3(sup01): 43-60 (2010) - [j12]Guiyang Li, Tao Li, Jie Zeng, Haibo Li:
An Outlier Robust Negative Selection Algorithm Inspired by Immune Suppression. J. Comput. 5(9): 1348-1355 (2010) - [j11]Khaled Amleh, Hongbin Li, Tao Li:
Robust Channel Estimation and Detection for Single-Carrier and Multicarrier Block Transmission Systems. IEEE Trans. Veh. Technol. 59(2): 662-672 (2010) - [c24]Wen Chen, Tao Li, Jian Qin, Hui Zhao:
A New Cluster Based Real Negative Selection Algorithm. ISIA 2010: 125-131
2000 – 2009
- 2009
- [j10]Jin Yang, XiaoJie Liu, Tao Li, Gang Liang, SunJun Liu:
Distributed agents model for intrusion detection based on AIS. Knowl. Based Syst. 22(2): 115-119 (2009) - [c23]Jie Zeng, Tao Li, Guiyang Li, Haibo Li:
A New Intrusion Detection Method Based on Antibody Concentration. ICIC (2) 2009: 500-509 - 2007
- [j9]Hongbin Li, Tao Li:
Generalized multichannel amplitude-and-phase coded modulation for differential space-time communications. Digit. Signal Process. 17(1): 261-271 (2007) - [j8]Yun-Feng Chen, Tao Li, Dong-Ni Gao, Xiaoqin Hu, Xiao-Ping Zhang, Jin Liu:
A secure mobile communication approach based on information hiding. Int. J. Ad Hoc Ubiquitous Comput. 2(3): 134-139 (2007) - [j7]Jin Yang, Tao Li, SunJun Liu, Tiefang Wang, Diangang Wang, Gang Liang:
Computer Forensics System Based on Artificial Immune Systems. J. Univers. Comput. Sci. 13(9): 1354-1365 (2007) - [c22]Caiming Liu, Tao Li, Hui Zhao, Lingxi Peng, Jinquan Zeng, Yan Zhang:
Exploration of Network Security Information Hid in Web Pages Based on Immunology. FSKD (1) 2007: 587-591 - [c21]Caiming Liu, XiaoJie Liu, Tao Li, Lingxi Peng, Jinquan Zeng, Hui Zhao:
Artificial Immunity-Based Discovery for Popular Information in WEB Pages. International Conference on Computational Science (4) 2007: 166-169 - [c20]Jianhua Zhang, Xiaojie Liu, Tao Li, Nan Zhang, Nian Liu, Chun Xu:
A Genetic Algorithm Based on Immune and Chaos. ICNC (5) 2007: 239-243 - [c19]Jinquan Zeng, Tao Li, Xiaojie Liu, Caiming Liu, Lingxi Peng, Feixian Sun:
A Feedback Negative Selection Algorithm to Anomaly Detection. ICNC (3) 2007: 604-608 - [c18]Diangang Wang, Tao Li, SunJun Liu, Jianhua Zhang, Caiming Liu:
Dynamical Network Forensics Based on Immune Agent. ICNC (3) 2007: 651-656 - 2006
- [j6]Rensheng Wang, Hongbin Li, Tao Li:
Robust multiuser detection for multicarrier CDMA systems. IEEE J. Sel. Areas Commun. 24(3): 673-683 (2006) - [j5]Hongbin Li, Tao Li:
A new differential modulation for coded OFDM with multiple transmit antennas. IEEE Signal Process. Lett. 13(6): 317-320 (2006) - [c17]Jinquan Zeng, XiaoJie Liu, Tao Li, Feixian Sun, Lingxi Peng, Caiming Liu:
An Immune-Based Model for Service Survivability. CANS 2006: 354-363 - [c16]Tao Li, Hongbin Li:
A Big-Neuron Based Expert System. ICIC (1) 2006: 268-273 - [c15]Gang Liang, Tao Li, Jiancheng Ni, Yaping Jiang, Jin Yang, Xun Gong:
An Immunity-Based Dynamic Multilayer Intrusion Detection System. ICIC (3) 2006: 641-650 - [c14]Xun Gong, Tao Li, Gang Liang, Tiefang Wang, Jin Yang, Xiaoqin Hu:
Immunity and Mobile Agent Based Grid Intrusion Detection. ICIC (3) 2006: 651-659 - [c13]Gang Liang, Tao Li, Xun Gong, Yaping Jiang, Jin Yang, Jiancheng Ni:
NASC: A Novel Approach for Spam Classification. ICIC (3) 2006: 672-681 - [c12]Xun Gong, Tao Li, Tiefang Wang, Jin Yang, Gang Liang, Xiaoqin Hu:
Grid Intrusion Detection Based on Immune Agent. ICNC (2) 2006: 73-82 - [c11]Tiefang Wang, Tao Li, Xun Gong, Jin Yang, Xiaoqin Hu, Diangang Wang, Hui Zhao:
Family Gene Based Grid Trust Model. ICNC (2) 2006: 110-113 - [c10]Jianhua Zhang, Tao Li, Nan Zhang, Diangang Wang, SunJun Liu:
An Immune Evolutionary Algorithm Based on Chaos Mutation. ISDA (1) 2006: 925-929 - [c9]Xun Gong, Tao Li, Ji Lu, Tiefang Wang, Gang Liang, Jin Yang, Feixian Sun:
Immunity and Mobile Agent Based Intrusion Detection for Grid. PRIMA 2006: 187-198 - [c8]Ji Lu, Tao Li, Xun Gong:
Parameter Evolution for Quality of Service in Multimedia Networking. PRIMA 2006: 233-244 - [c7]SunJun Liu, Tao Li, Kui Zhao, Jin Yang, Xun Gong, Jianhua Zhang:
Immune-Based Dynamic Intrusion Response Model. SEAL 2006: 96-103 - [c6]SunJun Liu, Tao Li, Diangang Wang, Kui Zhao, Xun Gong, Xiaoqin Hu, Chun Xu, Gang Liang:
Immune Multi-agent Active Defense Model for Network Intrusion. SEAL 2006: 104-111 - [c5]Xun Gong, Tao Li, Tiefang Wang, Jin Yang, SunJun Liu, Gang Liang:
An Immune Mobile Agent Based Grid Intrusion Detection Model. SEAL 2006: 112-119 - 2005
- [c4]Tao Li, XiaoJie Liu, Hongbin Li:
An Immune-Based Model for Computer Virus Detection. CANS 2005: 59-71 - [c3]Tao Li, XiaoJie Liu, Hongbin Li:
A New Model for Dynamic Intrusion Detection. CANS 2005: 72-84 - [c2]Chunlin Xu, Tao Li, Xuemei Huang, Yaping Jiang:
A Weather Forecast System Based on Artificial Immune System. ICNC (2) 2005: 800-803 - [c1]Tao Li, Juling Ding, XiaoJie Liu, Pin Yang:
A New Model of Immune-Based Network Surveillance and Dynamic Computer Forensics. ICNC (2) 2005: 804-813 - 2004
- [j4]Khaled Amleh, Hongbin Li, Tao Li:
Blind and training-assisted subspace code-timing estimation for CDMA with bandlimited chip waveforms. IEEE Trans. Veh. Technol. 53(6): 1735-1745 (2004) - [j3]Rensheng Wang, Hongbin Li, Tao Li:
Code-timing estimation for CDMA systems with bandlimited chip waveforms. IEEE Trans. Wirel. Commun. 3(4): 1338-1349 (2004) - 2001
- [j2]Tao Li, XiaoJie Liu:
The Denotational Semantics of NIPL. ACM SIGPLAN Notices 36(6): 28-37 (2001) - 2000
- [j1]Tao Li, XiaoJie Liu:
An Intelligent Neural Network Programming System (NNPS). ACM SIGPLAN Notices 35(3): 65-72 (2000)