Tao Li

ORCID: 0000-0002-5302-3180
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Artificial Immune Systems Applications
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Anomaly Detection Techniques and Applications
  • T-cell and B-cell Immunology
  • Influenza Virus Research Studies
  • Advanced Graph Neural Networks
  • Metaheuristic Optimization Algorithms Research
  • Immune Cell Function and Interaction
  • Smart Grid Security and Resilience
  • Adversarial Robustness in Machine Learning
  • Topic Modeling
  • Mathematical and Theoretical Epidemiology and Ecology Models
  • Traffic Prediction and Management Techniques
  • Advanced Decision-Making Techniques
  • Advanced Computational Techniques and Applications
  • Industrial Technology and Control Systems
  • Evolutionary Algorithms and Applications
  • Complex Network Analysis Techniques
  • Traffic control and management
  • Natural Language Processing Techniques
  • Photochromic and Fluorescence Chemistry
  • Advanced Sensor and Control Systems
  • Internet Traffic Analysis and Secure E-voting
  • Time Series Analysis and Forecasting

Sichuan University
2016-2025

Hangzhou Seventh Peoples Hospital
2023-2024

Zhejiang University
2023-2024

West China Hospital of Sichuan University
2023-2024

The Affiliated Yongchuan Hospital of Chongqing Medical University
2018-2024

Chongqing Medical University
2018-2024

China Automotive Technology and Research Center
2022-2024

Shanghai Jiao Tong University
2021-2023

Army Medical University
2023

Guangdong Ocean University
2023

The rapid convergence of legacy industrial infrastructures with intelligent networking and computing technologies (e.g., 5G, software-defined networking, artificial intelligence), have dramatically increased the attack surface cyber-physical systems (CPSs). However, withstanding cyber threats to such large-scale, complex, heterogeneous CPSs has been extremely challenging, due insufficiency high-quality examples. In this article, we propose a novel federated deep learning scheme, named...

10.1109/tii.2020.3023430 article EN IEEE Transactions on Industrial Informatics 2020-09-11

10.1016/j.engappai.2018.01.009 article EN Engineering Applications of Artificial Intelligence 2018-02-23

Android malware and its variants are a major challenge for mobile platforms. However, there two main problems in the existing detection methods: <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">a</i> ) The method lacks evolution ability malware, which leads to low rate of model variants. xmlns:xlink="http://www.w3.org/1999/xlink">b</i> Traditional methods require centralized data training, however, aggregation training samples is limited due...

10.1109/tifs.2023.3287395 article EN IEEE Transactions on Information Forensics and Security 2023-01-01

The paper investigates the use of acoustic based features for music information retrieval. Two specific problems are studied: similarity search (searching sound files similar to a given file) and emotion detection (detection in sounds). Daubechies wavelet coefficient histograms (Li, T. et al., SIGIR'03, p.282-9, 2003), which consist moments coefficients calculated by applying Db8 filter, combined with timbral extracted using MARSYAS system G. Tzanctakis P. Cook (see IEEE Trans. on Speech...

10.1109/icassp.2004.1327208 article EN IEEE International Conference on Acoustics Speech and Signal Processing 2004-09-28

To perform static breath-hold fluorine 19 ((19)F) three-dimensional (3D) ultrashort echo time (UTE) magnetic resonance (MR) imaging of the lungs in healthy volunteers by using a mixture 79% perfluoropropane (PFP) and 21% O2.This study protocol was approved local research ethics board Health Canada. All provided written informed consent. Ten underwent MR at 3.0 T. Fluorine 3D UTE images were acquired during 15-second breath hold according to one two breathing protocols: A, 1-L inhalation PFP...

10.1148/radiol.13130609 article EN Radiology 2013-08-29

Biometric image hashing techniques have been widely studied and seen progressive advancements. However, only a handful of available solutions provide two-factor cancelability while simultaneously satisfying the tradeoff among all criteria template protection mechanisms. In this paper, we propose novel scheme for generating secure robust hash from fingerprint using Fourier-Mellin transform fractal coding. First, due to its invariance property, is incorporated into domain minutiae blocks...

10.1109/tifs.2020.2971142 article EN IEEE Transactions on Information Forensics and Security 2020-01-01

This paper presents a stochastic model for the optimal risk-based generation maintenance outage scheduling based on hourly price-based unit commitment in company (GENCO). Such schedules will be submitted by GENCOs to ISO approval before implementation. The objective of GENCO is consider financial risks when its midterm outages. also coordinates proposed with short-term maximizing payoffs. mixed integer linear program which random prices energy, ancillary services, and fuel are modeled as...

10.1109/tpwrs.2007.913295 article EN IEEE Transactions on Power Systems 2008-01-25

The evolving unknown cyberattacks, compounded by the widespread emerging technologies (say 5G, Internet of Things, etc.), have rapidly expanded cyber threat landscape. However, most existing intrusion detection systems (IDSs) are effective in detecting only known because cyberattack samples usually available for IDS training. Identifying therefore, remains a big challenging issue. To meet this gap, paper, motivated artificial immunity (AIm) and differential evolution (DE), we propose...

10.1109/tevc.2024.3365101 article EN IEEE Transactions on Evolutionary Computation 2024-01-01

Islam in the history and modernization of Maldives demonstrates an intrinsic tension, serving both as foundational cornerstone national identity source social conflict political division. On one hand, narrative being a “100% Muslim nation” has shaped highly unified identity, achieving legalization institutionalization within power structure becoming critical pillar state legitimacy integration. other politicization homogenization religion have weakened inclusivity, exacerbating religious...

10.3390/rel16020201 article EN cc-by Religions 2025-02-08

10.1360/04yf0140 article EN Science in China Series F Information Sciences 2005-01-01

New privacy implications are induced to individuals and families because of the time-series data classification problem in Internet Things such as appliance classifications smart grid. To prevent adversary from inferring household used grid, a singular spectrum analysis (SSA) has been applied local differential (SSA-LDP). First, Fourier noise added via geometric sum which proved achieve Laplace distribution. Furthermore, we have that sanitized through SSA-LDP is ε -deferentially private for...

10.1109/jiot.2020.2977220 article EN IEEE Internet of Things Journal 2020-02-28

The integration of phasor measurement units (PMUs) and data concentrators (PDCs) in smart grids may be exploited by attackers to initiate new sophisticated false injection (FDI) attacks. Existing FDI attack mitigation approaches are generally less effective against attacks, such as collusive (CFDI) attacks launched compromised PDCs (and PMUs) we demonstrate this paper. Thus, propose a secure resilience-enhanced scheme (SeCDM) detect mitigate cyber threats grids. Specifically, design...

10.1109/tpwrs.2021.3127353 article EN IEEE Transactions on Power Systems 2021-11-11

A novel negative selection algorithm (NSA), which is referred to as ANSA, presented. In many actual anomaly detection systems, the training data are just partially composed of normal elements, and self/nonself space often varies over time. Therefore, system has build profile based on a part self elements adjust itself adapt those variables. However, previous NSAs need large number system, lack adaptability. order overcome these limitations, proposed approach uses technique radius evolve...

10.1016/j.pnsc.2008.06.008 article EN cc-by-nc-nd Progress in Natural Science Materials International 2008-11-22
Coming Soon ...