


default search action
Wenhao Yan
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j13]Qi Li, Wenhao Yan, Tad Gonsalves:
An improved adaptive large neighborhood search algorithm for the flexible two-tier vehicle routing problem with drone stations. Frontiers Artif. Intell. 9 (2026)
[c11]Wenhao Yan, Ning An, Wei Qiao, Weiheng Wu, Zhigang Lu, Bo Jiang, Baoxu Liu, Junrong Liu:
Sentient: Detecting APTs via Capturing Indirect Dependencies and Behavioral Logic. AAAI 2026: 1409-1417
[i7]Wenhao Yan, Ning An, Linxu Li, Bingsheng Bi, Bo Jiang, Zhigang Lu, Baoxu Liu, Junrong Liu, Cong Dong:
ProvAgent: Threat Detection Based on Identity-Behavior Binding and Multi-Agent Collaborative Attack Investigation. CoRR abs/2603.09358 (2026)- 2025
[j12]Deyu Meng
, Ziheng Wang
, Wenhao Yan, Tshewang Phuntsho
, Tad Gonsalves
:
Style Mamba-transformer: A hybrid Mamba-transformer unsupervised framework for text style transfer. Knowl. Based Syst. 329: 114270 (2025)
[j11]Xin Huang
, Wenhao Yan
, Wenjie Dong, Qun Ding:
A Novel 2D Hyperchaotic Map with Homogeneous Multistability and Its Application in Image Encryption. Symmetry 17(5): 801 (2025)
[c10]Wenhao Yan, Weiheng Wu, Bingsheng Bi, Wei Qiao, Bo Jiang, Yuling Liu, Junrong Liu:
PanThreat: Global Resource-Based Anomaly Detection for APTs. CSCWD 2025: 135-140
[c9]Zehui Wang, Yunxiang Wang, Wenhao Yan, Yinhao Qi, Tian Tian, Bo Jiang, Zhigang Lu:
Autumn: An Unsupervised APT Detection via Detailed Process-Level Analysis. CSCWD 2025: 600-605
[c8]Zehui Wang, Dan Du, Yinhao Qi, Wenhao Yan, Xiaobo Yang, Bo Jiang, Zhigang Lu:
MPKAN: APT Attack Detection on Audit Logs via Graph Semantic Enhancement. CSCWD 2025: 2605-2610
[c7]Weiheng Wu
, Wei Qiao
, Wenhao Yan
, Bo Jiang
, Yuling Liu
, Baoxu Liu
, Zhigang Lu
, Junrong Liu
:
Brewing Vodka: Distilling Pure Knowledge for Lightweight Threat Detection in Audit Logs. WWW 2025: 2172-2182
[i6]Wenhao Yan, Ning An, Wei Qiao, Weiheng Wu, Bo Jiang, Yuling Liu, Zhigang Lu, Junrong Liu:
Sentient: Multi-Scenario Behavioral Intent Analysis for Advanced Persistent Threat Detection. CoRR abs/2502.06521 (2025)
[i5]Lingjun Mao, Rodolfo Corona, Xin Liang, Wenhao Yan, Zineng Tang:
Images are Worth Variable Length of Representations. CoRR abs/2506.03643 (2025)
[i4]Peilin Ji, Xiao Xue, Simeng Wang, Wenhao Yan:
Entropy-Constrained Strategy Optimization in Urban Floods: A Multi-Agent Framework with LLM and Knowledge Graph Integration. CoRR abs/2508.14654 (2025)
[i3]Wenhao Yan, Sheng Ye, Zhuoyi Yang, Jiayan Teng, Zhen-Hui Dong, Kairui Wen, Xiaotao Gu, Yong-Jin Liu, Jie Tang:
SCAIL: Towards Studio-Grade Character Animation via In-Context Learning of 3D-Consistent Pose Representations. CoRR abs/2512.05905 (2025)- 2024
[j10]Wei Li, Si Li, Huaguang Shi, Wenhao Yan, Yi Zhou:
UAV-enabled fair offloading for MEC networks: a DRL approach based on actor-critic parallel architecture. Appl. Intell. 54(4): 3529-3546 (2024)
[j9]Yanpeng Zhang
, Jian Zeng, Wenhao Yan, Qun Ding:
RBFNN-PSO Intelligent Synchronisation Method for Sprott B Chaotic Systems with External Noise and Its Application in an Image Encryption System. Entropy 26(10): 855 (2024)
[j8]Jing He
, Fu Ren
, Jiaxin Dong
, Huihui Zhang
, Wenhao Yan, Jiping Liu:
Social inequity of park accessibility in Taiyuan: highlighting the unfair layout of parks in second-tier cities of China and the relative role of contributors. Geo spatial Inf. Sci. 27(4): 1118-1140 (2024)
[c6]Wei Li
, Wenhao Yan
, Huaguang Shi
, Si Li
, Yi Zhou
:
Multi-Robot Cooperative Pursuit-Evasion Control: A DeepReinforcement Learning Approach based on Prioritized Experience Replay. CCEAI 2024: 120-127
[i2]Weiheng Wu, Wei Qiao, Wenhao Yan, Bo Jiang, Yuling Liu, Baoxu Liu, Zhigang Lu, Junrong Liu:
Winemaking: Extracting Essential Insights for Efficient Threat Detection in Audit Logs. CoRR abs/2411.02775 (2024)- 2023
[c5]Si Li
, Wei Li
, Huaguang Shi
, Wenhao Yan
, Yi Zhou
:
Fairness-Aware Computation Efficiency Maximization for Multi-UAV-Enabled MEC System. CNML 2023: 403-407
[i1]Wenhao Yan, He Li, Kaoru Ota, Mianxiong Dong:
An Efficient Imbalance-Aware Federated Learning Approach for Wearable Healthcare with Autoregressive Ratio Observation. CoRR abs/2310.14784 (2023)- 2022
[j7]Wenhao Yan
, Wenjie Dong, Peng Wang, Ya Wang, Yanan Xing, Qun Ding:
Discrete-Time Memristor Model for Enhancing Chaotic Complexity and Application in Secure Communication. Entropy 24(7): 864 (2022)
[j6]Zijing Jiang, Wenhao Yan, Wei Ding, Linlin Yue, Qun Ding
:
SM4 Chaotic Masking Scheme Against Power Analysis Based on FPGA. Int. J. Bifurc. Chaos 32(8): 2250110:1-2250110:22 (2022)
[c4]Aiguo Li
, Wenhao Yan
:
Research on vulnerability assessment of physical protection system based on combined weighting-two-dimensional cloud model. ICCNS 2022: 85-89
[c3]Peng Chen, Wenhao Yan, Aisheng Liu, Xin Ma, Tiantian Zheng, Yanting Tan:
Improvement in Organizational Effectiveness Under the Background of Reform of State-Owned Enterprises: A Pilot Work of Assessment of Institutional Effectiveness of the State Grid Corporation of China. MMBD 2022: 300-306- 2021
[j5]Wenhao Yan
, Zijing Jiang, Xin Huang, Qun Ding:
A Three-Dimensional Infinite Collapse Map with Image Encryption. Entropy 23(9): 1221 (2021)
[c2]Xin Ma, Shuhui Li, Wei Yang, Wenhao Yan, Aisheng Liu, Yanting Tan:
Studies on Platform-Type Organization Design Based on Leadership Promotion. MMBD/MLIS 2021: 228-233- 2020
[j4]Wenhao Yan
, Qun Ding:
A New Matrix Projective Synchronization of Fractional-Order Discrete-Time Systems and its Application in Secure Communication. IEEE Access 8: 147451-147458 (2020)
2010 – 2019
- 2019
[j3]Wenhao Yan
, Qun Ding:
A New Matrix Projective Synchronization and Its Application in Secure Communication. IEEE Access 7: 112977-112984 (2019)
[j2]Wangshu Li, Wenhao Yan
, Ruoxun Zhang, Chuanfu Wang, Qun Ding
:
A New 3D Discrete Hyperchaotic System and Its Application in Secure Transmission. Int. J. Bifurc. Chaos 29(14): 1950206:1-1950206:14 (2019)
[c1]Jiangyao Wang, Wenhua Xu, Wenhao Yan, Caixia Li:
Text Similarity Calculation Method Based on Hybrid Model of LDA and TF-IDF. CSAI 2019: 1-8
2000 – 2009
- 2003
[j1]Dengpan Mou, Roland Lares, Wenhao Yan, F. Rominger, Albrecht Rothermel:
Design and implementation of a novel sync processing system for composite video signals. IEEE Trans. Consumer Electron. 49(4): 1286-1291 (2003)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-05-11 00:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







