


default search action
Li Pan 0002
Person information
- affiliation: Shanghai Jiao Tong University, Shanghai, China
Other persons with the same name
- Li Pan — disambiguation page
- Li Pan 0001
— Shandong University, Jinan, China
- Li Pan 0003
— Hunan Institute of Science and Technology, Yueyang, China
- Li Pan 0004
— The Chinese University of Hong Kong, Hong Kong, China
- Li Pan 0005
— University of Oklahoma, Norman, OK, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j35]Peng Wu
, Mohan Gao, Fuhui Sun, Xiaoyan Wang, Li Pan
:
Multi-perspective API call sequence behavior analysis and fusion for malware classification. Comput. Secur. 148: 104177 (2025) - [j34]Xiaohan Zhang, Cen Zhang
, Xinghua Li
, Zhengjie Du
, Bing Mao
, Yuekang Li
, Yaowen Zheng
, Yeting Li
, Li Pan
, Yang Liu
, Robert H. Deng
:
A Survey of Protocol Fuzzing. ACM Comput. Surv. 57(2): 35:1-35:36 (2025) - [j33]Peng Wu
, Li Pan
:
Deep unsupervised clustering by information maximization on Gaussian mixture autoencoders. Inf. Sci. 714: 122215 (2025) - [j32]Bojia Liu
, Conghui Zheng
, Fuhui Sun, Xiaoyan Wang, Li Pan
:
CDCGAN: Class Distribution-aware Conditional GAN-based minority augmentation for imbalanced node classification. Neural Networks 183: 106933 (2025) - [j31]Nuo Xu
, Pinghui Wang
, Junzhou Zhao
, Feiyang Sun
, Lin Lan
, Jing Tao
, Li Pan
, Xiaohong Guan
:
Distinguish Confusion in Legal Judgment Prediction via Revised Relation Knowledge. ACM Trans. Inf. Syst. 43(1): 6:1-6:32 (2025) - 2024
- [j30]Shaokang Wang
, Fuhui Sun, Xiaoyan Wang, Li Pan
:
Incorporating target-aware knowledge into prompt-tuning for few-shot stance detection. Inf. Process. Manag. 61(5): 103815 (2024) - [j29]Yu Wu, Li Pan
:
LSTEG: An evolutionary game model leveraging deep reinforcement learning for privacy behavior analysis on social networks. Inf. Sci. 676: 120842 (2024) - [j28]Ye Qian
, Fuhui Sun, Xiaoyan Wang, Li Pan
:
TODEAR: Promoting explainable TKG reasoning through temporal offset enhanced dynamic embedding and adaptive reinforcement learning. Inf. Sci. 679: 121066 (2024) - [j27]Conghui Zheng
, Li Pan
, Peng Wu
:
JORA: Weakly Supervised User Identity Linkage via Jointly Learning to Represent and Align. IEEE Trans. Neural Networks Learn. Syst. 35(3): 3900-3911 (2024) - [c38]Mohan Gao, Peng Wu
, Li Pan:
MINES: Multi-perspective API Call Sequence Behavior Fusion Malware Classification. DASFAA (4) 2024: 210-220 - [i5]Yi Ouyang, Peng Wu
, Li Pan:
COOL: Comprehensive Knowledge Enhanced Prompt Learning for Domain Adaptive Few-shot Fake News Detection. CoRR abs/2406.10870 (2024) - [i4]Weichen Li, Xiaotong Huang, Jianwu Zheng, Zheng Wang, Chaokun Wang, Li Pan, Jianhua Li:
rLLM: Relational Table Learning with LLMs. CoRR abs/2407.20157 (2024) - [i3]Nuo Xu, Pinghui Wang, Junzhou Zhao, Feiyang Sun, Lin Lan, Jing Tao, Li Pan, Xiaohong Guan:
Distinguish Confusion in Legal Judgment Prediction via Revised Relation Knowledge. CoRR abs/2408.09422 (2024) - 2023
- [j26]Jiaxing Zheng
, Li Pan
:
Dominant coverage for target users at the lowest cost under competitive propagation in social networks. Comput. Networks 226: 109693 (2023) - [j25]Ye Qian
, Li Pan
:
Leveraging multimodal features for knowledge graph entity alignment based on dynamic self-attention networks. Expert Syst. Appl. 228: 120363 (2023) - [j24]Ye Qian
, Li Pan
:
Variety-aware GAN and online learning augmented self-training model for knowledge graph entity alignment. Inf. Process. Manag. 60(5): 103472 (2023) - [j23]Shaokang Wang
, Li Pan
, Yu Wu
:
Meta-Information Fusion of Hierarchical Semantics Dependency and Graph Structure for Structured Text Classification. ACM Trans. Knowl. Discov. Data 17(2): 23:1-23:18 (2023) - [j22]Peng Wu
, Conghui Zheng
, Li Pan
:
A Unified Generative Adversarial Learning Framework for Improvement of Skip-Gram Network Representation Learning Methods. IEEE Trans. Knowl. Data Eng. 35(1): 45-58 (2023) - [j21]Conghui Zheng
, Li Pan
, Peng Wu
:
Attribute Augmented Network Embedding Based on Generative Adversarial Nets. IEEE Trans. Neural Networks Learn. Syst. 34(7): 3473-3487 (2023) - [c37]Changqing Li, Ye Qian, Li Pan:
Multimodal Features Enhanced Named Entity Recognition Based on Self-Attention Mechanism. DSC 2023: 52-59 - [c36]Yujia Yang, Conghui Zheng, Li Pan:
Homogeneous Entity Context Enhanced Representation Network for Temporal Knowledge Graph Reasoning. ICDM 2023: 1487-1492 - 2022
- [j20]Conghui Zheng
, Li Pan
, Peng Wu
:
CAMU: Cycle-Consistent Adversarial Mapping Model for User Alignment Across Social Networks. IEEE Trans. Cybern. 52(10): 10709-10720 (2022) - [c35]Ruofan Deng, Li Pan, Chloé Clavel:
Domain Adaptation for Stance Detection towards Unseen Target on Social Media. ACII 2022: 1-8 - [c34]Yi Ouyang, Peng Wu
, Li Pan:
Asymmetrical Context-aware Modulation for Collaborative Filtering Recommendation. CIKM 2022: 1595-1604 - [c33]Mohan Gao, Peng Wu
, Li Pan:
Malware Detection with Limited Supervised Information via Contrastive Learning on API Call Sequences. ICICS 2022: 492-507 - [c32]Zhikai Chen, Peng Wu
, Li Pan:
Leveraging Diversity-Aware Context Attention Networks for Fake News Detection on Social Platforms. IJCNN 2022: 1-8 - 2021
- [j19]Yu Wu
, Li Pan:
SG-PAC: A stochastic game approach to generate personal privacy paradox access-control policies in social networks. Comput. Secur. 102: 102157 (2021) - [j18]Peng Wu
, Li Pan
, Conghui Zheng
:
Mining Set of Interested Communities with Limited Exemplar Nodes for Network Based Services. IEEE Trans. Serv. Comput. 14(4): 1138-1151 (2021) - [c31]Wenhan Gao, Peng Wu
, Li Pan:
Attribute Network Embedding Method based on Joint Clustering of Representation and Network. BDCAT 2021: 111-119 - [c30]Jiajie Du, Li Pan:
How are You Affected? A Structural Graph Neural Network Model Predicting Individual Social Influence Status. CollaborateCom (2) 2021: 401-415 - [c29]Ye Qian
, Li Pan:
Data-Driven Influential Nodes Identification in Dynamic Social Networks. CollaborateCom (1) 2021: 592-607 - [c28]Hao Xiong, Junchi Yan, Li Pan:
Contrastive Multi-View Multiplex Network Embedding with Applications to Robust Network Alignment. KDD 2021: 1913-1923 - 2020
- [j17]Conghui Zheng
, Li Pan
, Peng Wu
:
Multimodal Deep Network Embedding With Integrated Structure and Attribute Information. IEEE Trans. Neural Networks Learn. Syst. 31(5): 1437-1449 (2020) - [j16]Khouanetheva Pholsena, Li Pan
, Zhenpeng Zheng:
Mode decomposition based deep learning model for multi-section traffic prediction. World Wide Web 23(4): 2513-2527 (2020) - [c27]Nuo Xu
, Pinghui Wang, Long Chen, Li Pan, Xiaoyan Wang, Junzhou Zhao:
Distinguish Confusing Law Articles for Legal Judgment Prediction. ACL 2020: 3086-3095 - [c26]Yiting Qian, Li Pan, Peng Wu
, Zhengmin Xia:
GeST: A Grid Embedding based Spatio-Temporal Correlation Model for Crime Prediction. DSC 2020: 1-7 - [c25]Yu Wu, Li Pan, Fang Liu:
Making Privacy Protection Investment Decisions in Social Networks: An Interdependent Security Game Approach. SPDE 2020: 711-725 - [i2]Nuo Xu, Pinghui Wang, Long Chen, Li Pan, Xiaoyan Wang, Junzhou Zhao:
Distinguish Confusing Law Articles for Legal Judgment Prediction. CoRR abs/2004.02557 (2020)
2010 – 2019
- 2019
- [c24]Ning Liu, Yongchao Long, Changqing Zou, Qun Niu
, Li Pan, Hefeng Wu:
ADCrowdNet: An Attention-Injective Deformable Convolutional Network for Crowd Understanding. CVPR 2019: 3225-3234 - [c23]Khouanetheva Pholsena, Li Pan, Zhenpeng Zheng:
Multi-node Mode Decomposition Based Deep Learning Model for Road Section Traffic Prediction. DSC 2019: 77-83 - [c22]Yaoxuan Ji, Li Pan, Peng Wu
:
Influence Maximization on Large-Scale Networks with a Group-Based Method via Network Embedding. DSC 2019: 176-182 - [c21]Jiajie Du, Li Pan, Huijuan Li, Lihong Yao:
Understanding Acdamic Impact Development by Predicting the G-index In Collaboration Networks. DSC 2019: 662-667 - [i1]Conghui Zheng, Li Pan, Peng Wu:
Multimodal Deep Network Embedding with Integrated Structure and Attribute Information. CoRR abs/1903.12019 (2019) - 2018
- [j15]Huijuan Li, Li Pan, Peng Wu
:
Dominated competitive influence maximization with time-critical and time-delayed diffusion in social networks. J. Comput. Sci. 28: 318-327 (2018) - [j14]Peng Wu
, Li Pan:
Mining application-aware community organization with expanded feature subspaces from concerned attributes in social networks. Knowl. Based Syst. 139: 1-12 (2018) - [c20]Yu Wu
, Li Pan:
Privacy-Aware Personal Information Propagation Management in Social Networks. DSC 2018: 169-174 - [c19]Khouanetheva Pholsena, Li Pan:
Traffic Status Evaluation Based on Possibilistic Fuzzy C-Means Clustering Algorithm. DSC 2018: 175-180 - [c18]Zhenpeng Zheng, Li Pan, Khouanetheva Pholsena:
Mode Decomposition Based Hybrid Model for Traffic Flow Prediction. DSC 2018: 521-526 - [c17]Wei Yan, Li Pan:
Designing focused crawler based on improved genetic algorithm. ICACI 2018: 319-323 - [c16]Mengyi Chen, Li Pan:
Least Cost Precision Marketing Based on User Profiles in Social Networks. SSIC 2018: 1-8 - [c15]Danhua Huang, Li Pan:
An Improved Group-based Influence Maximization Method in Social Networks. SSIC 2018: 1-6 - [c14]Jianguo Zheng, Li Pan:
Least Cost Rumor Community Blocking optimization in Social Networks. SSIC 2018: 1-5 - 2017
- [j13]Peng Wu
, Li Pan:
Scalable influence blocking maximization in social networks under competitive independent cascade models. Comput. Networks 123: 38-50 (2017) - [j12]Futai Zou, Siyu Zhang, Linsen Li, Li Pan, Jianhua Li:
Detecting malware based on expired command-and-control traffic. Int. J. Distributed Sens. Networks 13(7) (2017) - [c13]Qinchen Wu, Peng Wu
, Li Pan:
Combinational Meta-paths Mining for Correlation Relationship Evaluation in Bibliographic Networks. CollaborateCom 2017: 660-669 - 2016
- [j11]Peng Wu
, Li Pan:
Multi-objective community detection method by integrating users' behavior attributes. Neurocomputing 210: 13-25 (2016) - [j10]Xiaofeng Wang, Gongshen Liu
, Li Pan, Jianhua Li:
Uncovering fuzzy communities in networks with structural similarity. Neurocomputing 210: 26-33 (2016) - [j9]Ping Yi, Ting Zhu, Qingquan Zhang, Yue Wu, Li Pan:
Puppet attack: A denial of service attack in advanced metering infrastructure network. J. Netw. Comput. Appl. 59: 325-332 (2016) - [c12]Gongshen Liu, Kui Meng, Hongyi Guo, Li Pan, Jianhua Li:
Automatic Threshold Calculation Based Label Propagation Algorithm for Overlapping Community. DSC 2016: 382-387 - [c11]Haolin Zhang, Gongshen Liu, Li Pan, Kui Meng, Jianhua Li:
GEV Regression with Convex Loss Applied to Imbalanced Binary Classification. DSC 2016: 532-537 - [c10]Futai Zou, Siyu Zhang, Bei Pei, Li Pan, Linsen Li, Jianhua Li:
Survey on Domain Name System Security. DSC 2016: 602-607 - [c9]Zihao Wang, Futai Zou, Bei Pei, Weijia He, Li Pan, Zhaochong Mao, Linsen Li:
Detecting Malicious Server Based on Server-to-Server Realation Graph. DSC 2016: 698-702 - 2015
- [c8]Keke Gu, Junhua Tang, Li Pan, Jianhua Li:
Overlapping Community Detection Using NVPA. SmartCity 2015: 197-202 - [c7]Yang Sun, Junhua Tang, Li Pan, Jianhua Li:
Matrix Based Community Evolution Events Detection in Online Social Networks. SmartCity 2015: 465-470 - 2014
- [j8]Wenchao Li, Ping Yi
, Yue Wu, Li Pan, Jianhua Li:
A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network. J. Electr. Comput. Eng. 2014: 240217:1-240217:8 (2014) - [c6]Shunming Lv, Li Pan:
Influence Maximization in Independent Cascade Model with Limited Propagation Distance. APWeb Workshophs 2014: 23-34 - [c5]Peng Wu
, Li Pan:
Detecting highly overlapping community structure based on Maximal Clique Networks. ASONAM 2014: 196-199 - [c4]Xiao Liang, Junhua Tang, Li Pan:
A neighborhood vector propagation algorithm for community detection. GLOBECOM 2014: 2923-2928 - 2012
- [c3]Yetian Xia, Xiaochao Zi, Lihong Yao, Li Pan, Jianhua Li:
Constructing the On/Off Covert Channel on Xen. CIS 2012: 568-572 - 2011
- [j7]Xiaochao Zi, Lihong Yao, Xinghao Jiang, Li Pan, Jianhua Li:
Evaluating the transmission rate of covert timing channels in a network. Comput. Networks 55(12): 2760-2771 (2011) - 2010
- [j6]Xiaochao Zi, Lihong Yao, Li Pan, Jianhua Li:
Implementing a passive network covert timing channel. Comput. Secur. 29(6): 686-696 (2010) - [j5]Kai Wang, Jianhua Li, Li Pan:
Fast file dissemination in peer-to-peer networks with upstream bandwidth constraint. Future Gener. Comput. Syst. 26(7): 986-1002 (2010)
2000 – 2009
- 2009
- [j4]Lihong Yao, Xiaochao Zi, Li Pan, Jianhua Li:
A study of on/off timing channel based on packet delay distribution. Comput. Secur. 28(8): 785-794 (2009) - [c2]Li Pan, Jorge Lobo
, Seraphin B. Calo:
Extending the CIM-SPL policy language with RBAC for distributed management systems in the WBEM infrastructure. Integrated Network Management 2009: 145-148 - 2008
- [j3]Kai Wang, Li Pan, Jianhua Li:
Peer-to-Peer Based Fast File Dissemination in UMTS Networks. IEICE Trans. Commun. 91-B(12): 3860-3871 (2008) - 2007
- [c1]Yaogong Wang, Li Pan, Jianhua Li:
The Necessity of Combining ELN and SACK to Improve TCP Performance over Heterogeneous Networks. SITIS 2007: 137-142 - 2005
- [j2]Rui Jiang, Li Pan, Jianhua Li:
An improvement on efficient anonymous auction protocols. Comput. Secur. 24(2): 169-174 (2005) - 2004
- [j1]Rui Jiang, Li Pan, Jianhua Li:
Further analysis of password authentication schemes based on authentication tests. Comput. Secur. 23(6): 469-477 (2004)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-18 20:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint