default search action
Wenli Shang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j25]Wenli Shang, Jingbo Ge, Lei Ding, Zhenbang Jiang, He Sui:
Acceleration offloading for differential privacy protection based on federated learning in edge intelligent controllers. Future Gener. Comput. Syst. 163: 107526 (2025) - 2024
- [j24]Wenli Shang, Jiawei Qiu, Haotian Shi, Shuang Wang, Lei Ding, Yanjun Xiao:
An Efficient Anomaly Detection Method for Industrial Control Systems: Deep Convolutional Autoencoding Transformer Network. Int. J. Intell. Syst. 2024: 1-18 (2024) - [j23]Xiaobin Gao, Feiqi Deng, Wenli Shang, Xueyan Zhao, Shuqi Li:
Attack-resilient asynchronous state estimation of interval type-2 fuzzy systems under stochastic protocols. Int. J. Syst. Sci. 55(13): 2688-2700 (2024) - [j22]Yansong Liu, Li Zhu, Lei Ding, He Sui, Wenli Shang:
A hybrid sampling method for highly imbalanced and overlapped data classification with complex distribution. Inf. Sci. 661: 120117 (2024) - [j21]Wenli Shang, Bowen Wang, Pengcheng Zhu, Lei Ding, Shuang Wang:
A Span-based Multivariate Information-aware Embedding Network for joint relational triplet extraction of threat intelligence. Knowl. Based Syst. 295: 111829 (2024) - [j20]Junkai Huang, Rui Zheng, Youyong Cheng, Jiaqian Hu, Weijun Hu, Wenli Shang, Man Zhang, Zhong Cao:
Interactive semantics neural networks for skeleton-based human interaction recognition. Vis. Comput. 40(10): 7147-7160 (2024) - [c12]Wenli Shang, Zifeng Huang, Zhaojun Gu, Zhong Cao, Lei Ding, Shuang Wang:
CWMAGAN-GP-Based Oversampling Technique for Intrusion Detection. ICIC (8) 2024: 318-330 - 2023
- [j19]Wenli Shang, Tianyu Gong, Jing Hou, Jiayue Lu, Zhong Cao:
Quantitative Evaluation Method for Industrial Control System Vulnerability Based on Improved Expert Elicitation and Fuzzy Set Method. IEEE Access 11: 101007-101019 (2023) - [j18]Zhong Cao, Zhuo Chen, Wenli Shang, Yongdong Zhu:
Efficient Revocable Anonymous Authentication Mechanism for Edge Intelligent Controllers. IEEE Internet Things J. 10(12): 10357-10367 (2023) - [j17]Yun-Shan Wei, Ying-Yu Chen, Wenli Shang:
Feedback higher-order iterative learning control for nonlinear systems with non-uniform iteration lengths and random initial state shifts. J. Frankl. Inst. 360(14): 10745-10765 (2023) - [j16]Jun Li, Shuping Dang, Miaowen Wen, Qiang Li, Yingyang Chen, Yu Huang, Wenli Shang:
Index Modulation Multiple Access for 6G Communications: Principles, Applications, and Challenges. IEEE Netw. 37(1): 52-60 (2023) - [j15]Jinhao Huang, Wei Wei, Bifa Liang, Cheng Liu, Wenli Shang, Jun Li:
Real-Time Stereo Disparity Prediction Based on Patch-Embedded Extraction and Depthwise Hierarchical Refinement for 3-D Sensing of Autonomous Vehicles on Energy-Efficient Edge Computing Devices. IEEE Trans. Green Commun. Netw. 7(1): 424-433 (2023) - [j14]Cheng Liu, Wei Wei, Bifa Liang, Xihao Liu, Wenli Shang, Jun Li:
ConvMLP-Mixer Based Real-Time Stereo Matching Network Towards Autonomous Driving. IEEE Trans. Veh. Technol. 72(2): 2581-2586 (2023) - [j13]Bifa Liang, Wei Wei, Jinhao Huang, Cheng Liu, Hong Yang, Ru Yang, Wenli Shang, Jun Li:
Real-Time Stereo Image Depth Estimation Network With Group-Wise L1 Distance for Edge Devices Towards Autonomous Driving. IEEE Trans. Veh. Technol. 72(11): 13917-13928 (2023) - 2022
- [j12]Zhenfei Kuang, Wei Wei, Yier Yan, Jie Li, Guangman Lu, Yuyang Peng, Jun Li, Wenli Shang:
A Real-time and Robust Monocular Visual Inertial SLAM System Based on Point and Line Features for Mobile Robots of Smart Cities Toward 6G. IEEE Open J. Commun. Soc. 3: 1950-1962 (2022) - 2021
- [j11]Yun-Shan Wei, Xiaofen Yang, Wenli Shang, Ying-Yu Chen:
Higher-Order Iterative Learning Control with Optimal Control Gains Based on Evolutionary Algorithm for Nonlinear System. Complex. 2021: 4281006:1-4281006:9 (2021) - [j10]Wenli Shang, Guanyu Zhang, Tianyu Wang, Rui Zhang:
A Test Cases Generation Method for Industrial Control Protocol Test. Sci. Program. 2021: 6611732:1-6611732:9 (2021) - [j9]Wenli Shang, Xiangyu Xing:
ICS Software Trust Measurement Method Based on Dynamic Length Trust Chain. Sci. Program. 2021: 6691696:1-6691696:11 (2021)
2010 – 2019
- 2019
- [j8]Wenli Shang, Tianyu Gong, Chunyu Chen, Jing Hou, Peng Zeng:
Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees. Secur. Commun. Networks 2019: 3574675:1-3574675:11 (2019) - [c11]Zixiang Wang, Zhoubin Liu, Fengning Wang, Lu Chen, Wenli Shang:
Energy minimum encrypted data aggregation scheme for WSN in smart grid. AIIPCC 2019: 73:1-73:6 - [c10]Yingying Qi, Wenli Shang, Xiaojun He:
A Combined Prediction Method of Industrial Internet Security Situation Based on Time Series. ICCNS 2019: 84-91 - 2018
- [c9]Jianming Zhao, Wenli Shang, Zhoubin Liu, Zixiang Wang:
Security Classification Transmission Method Based on SDN in Industrial Networks. ICCCS (6) 2018: 26-36 - [c8]Wenli Shang, Junrong Cui, Chunhe Song, Jianming Zhao, Peng Zeng:
Research on Industrial Control Anomaly Detection Based on FCM and SVM. TrustCom/BigDataSE 2018: 218-222 - 2017
- [j7]Ming Wan, Wenli Shang, Linghe Kong, Peng Zeng:
Content-based deep communication control for networked control system. Telecommun. Syst. 65(1): 155-168 (2017) - [j6]Ming Wan, Wenli Shang, Peng Zeng:
Double Behavior Characteristics for One-Class Classification Anomaly Detection in Networked Control Systems. IEEE Trans. Inf. Forensics Secur. 12(12): 3011-3023 (2017) - 2016
- [j5]Ming Wan, Wenli Shang, Peng Zeng, Jianming Zhao:
SRDA: A Secure Routing and Data Aggregation Approach for Wireless Smart Meter. J. Commun. 11(1): 108-117 (2016) - [j4]Wenli Shang, Quansheng Qiao, Ming Wan, Peng Zeng:
Design and Implementation of Industrial Firewall for Modbus/TCP. J. Comput. 11(5): 432-438 (2016) - [j3]Wenli Shang, Peng Zeng, Ming Wan, Lin Li, Panfeng An:
Intrusion detection algorithm based on OCSVM in industrial control system. Secur. Commun. Networks 9(10): 1040-1049 (2016) - [j2]Wenli Shang, Peng Zeng, Ming Wan, Lin Li, Panfeng An:
Corrigendum to "Intrusion detection algorithm based on OCSVM in industrial control system". Secur. Commun. Networks 9(17): 4822 (2016) - [c7]Wenli Shang, Junrong Cui, Ming Wan, Panfeng An, Peng Zeng:
Modbus Communication Behavior Modeling and SVM Intrusion Detection Method. ICCNS 2016: 80-85 - 2015
- [c6]Wenli Shang, Ming Wan, Peng Zeng, Quansheng Qiao:
Research on self-learning method on generation and optimization of industrial firewall rules. InfoSec 2015: 47-52 - [c5]Wenli Shang, Lin Li, Ming Wan, Peng Zeng:
Industrial communication intrusion detection algorithm based on improved one-class SVM. WCICSS 2015: 21-25 - 2014
- [j1]Wenli Shang, Xiaofeng Zhou, Jie Yuan:
An intelligent fault diagnosis system for newly assembled transmission. Expert Syst. Appl. 41(9): 4060-4072 (2014)
2000 – 2009
- 2008
- [c4]Jie Yuan, Haibo Shi, Chang Liu, Wenli Shang:
Backward concurrent reasoning based on fuzzy Petri nets. FUZZ-IEEE 2008: 832-837 - [c3]Wenli Shang, Bin Duan, Haibo Shi:
Event-Driven Model for Manufacturing Execution System Platform. ISCSCT (2) 2008: 387-390 - 2007
- [c2]Hui Peng, Wenli Shang, Haibo Shi, Wei Peng:
On-Line Monitoring and Diagnosis of Failures Using Control Charts and Fault Tree Analysis (FTA) Based on Digital Production Model. KSEM 2007: 544-549 - 2004
- [c1]Wenli Shang, Yushun Fan:
Integrated Optimization Model of Production Planning and Scheduling for Batch Production. ICEB 2004: 419-421
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint