default search action
Chun Shan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j42]Chun Shan, Jian Zeng, Hongming Liu, Chuixing Chen, Xiaojiang Du, Mohsen Guizani:
TDOcc: Exploit machine learning and big data in multi-view 3D occupancy prediction. Future Gener. Comput. Syst. 164: 107583 (2025) - 2024
- [j41]Mianjie Li, Qihan Pei, Chun Shan, Shen Su, Yuan Liu, Zhihong Tian:
Data tampering detection and recovery scheme based on multi-branch target extraction for internet of vehicles. Comput. Networks 252: 110677 (2024) - [j40]Peitao Gao, Chun Shan, Yinhe Wang, Chihui Liu:
Velocity tracking control of nodes for the nonlinear complex dynamical networks associated with outgoing links subsystem. Comput. Commun. 214: 167-173 (2024) - [j39]Mianjie Li, Senfeng Lai, Jiao Wang, Zhihong Tian, Nadra Guizani, Xiaojiang Du, Chun Shan:
Analysis on unit maximum capacity of orthogonal multiple watermarking for multimedia signals in B5G wireless communications. Digit. Commun. Networks 10(1): 38-44 (2024) - [j38]Dan Xiang, Dengyu He, Pan Gao, Huihua Wang, Chenkai Zhai, Qiang Qu, Chun Shan, Xing Zhu, Junliu Zhong:
Dual-color space color correction and histogram segmentation optimized strategy for underwater image enhancement. Earth Sci. Informatics 17(3): 2347-2365 (2024) - [j37]Dan Xiang, Huihua Wang, Zebin Zhou, Hao Zhao, Pan Gao, Jinwen Zhang, Chun Shan:
Underwater image enhancement based on weighted guided filter image fusion. Multim. Syst. 30(5): 240 (2024) - [j36]Kewei Wang, Changzhen Hu, Chun Shan:
Evaluation of Application Layer DDoS Attack Effect in Cloud Native Applications. IEEE Trans. Cloud Comput. 12(2): 522-538 (2024) - [j35]Mianjie Li, Haozheng Cui, Chihui Liu, Chun Shan, Xiaojiang Du, Mohsen Guizani:
A Four-Dimensional Space-Based Data Multi-Embedding Mechanism for Network Services. IEEE Trans. Netw. Serv. Manag. 21(3): 2741-2750 (2024) - [j34]Guangyuan Zheng, Miaowen Wen, Jinming Wen, Chun Shan:
Joint Hybrid Precoding and Rate Allocation for RSMA in Near-Field and Far-Field Massive MIMO Communications. IEEE Wirel. Commun. Lett. 13(4): 1034-1038 (2024) - 2023
- [j33]Mianjie Li, Chun Shan, Zhihong Tian, Xiaojiang Du, Mohsen Guizani:
Adaptive Information Hiding Method Based on Feature Extraction for Visible Light Communication. IEEE Commun. Mag. 61(4): 102-106 (2023) - [j32]Mianjie Li, Zhihong Tian, Xiaojiang Du, Xiaochen Yuan, Chun Shan, Mohsen Guizani:
Power normalized cepstral robust features of deep neural networks in a cloud computing data privacy protection scheme. Neurocomputing 518: 165-173 (2023) - [j31]Hui Xie, Jun Zheng, Teng He, Shengjun Wei, Chun Shan, Changzhen Hu:
B-UAVM: A Blockchain-Supported Secure Multi-UAV Task Management Scheme. IEEE Internet Things J. 10(24): 21240-21253 (2023) - [j30]Zhen Liu, Changzhen Hu, Chun Shan, Zheheng Peng:
DEFIA: Evaluate defense effectiveness by fusing behavior information of cyberattacks. Inf. Sci. 646: 119375 (2023) - [j29]Mianjie Li, Chihui Liu, Chun Shan, Houbing Song, Zhihan Lv:
A dual-embedded tamper detection framework based on block truncation coding for intelligent multimedia systems. Inf. Sci. 649: 119362 (2023) - [j28]Zhen Liu, Changzhen Hu, Chun Shan, Zheng Yan:
ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential Manifolds. IEEE Trans. Dependable Secur. Comput. 20(5): 4070-4084 (2023) - [j27]Mianjie Li, Yuan Liu, Zhihong Tian, Chun Shan:
Privacy Protection Method Based On Multidimensional Feature Fusion Under 6G Networks. IEEE Trans. Netw. Sci. Eng. 10(3): 1462-1471 (2023) - [c24]Chun Shan, Ziyi Zhang, Siyi Zhou:
A multi-task deep learning based vulnerability severity prediction method. CloudNet 2023: 307-315 - [c23]Mingze Wei, Yaomin Huang, Zhiyuan Xu, Ning Liu, Zhengping Che, Xinyu Zhang, Chaomin Shen, Feifei Feng, Chun Shan, Jian Tang:
CMG-Net: An End-to-End Contact-based Multi-Finger Dexterous Grasping Network. ICRA 2023: 9125-9131 - [c22]Shen Su, Yuntian Tan, Yue Xue, Chao Wang, Hui Lu, Zhihong Tian, Chun Shan, Xiaojiang Du:
Detecting Smart Contract Project Anomalies in Metaverse. MetaCom 2023: 524-532 - [i4]Mingze Wei, Yaomin Huang, Zhiyuan Xu, Ning Liu, Zhengping Che, Xinyu Zhang, Chaomin Shen, Feifei Feng, Chun Shan, Jian Tang:
CMG-Net: An End-to-End Contact-Based Multi-Finger Dexterous Grasping Network. CoRR abs/2303.13182 (2023) - 2022
- [j26]Xiang Yu, Xianfei Yang, Qingji Tan, Chun Shan, Zhihan Lv:
An edge computing based anomaly detection method in IoT industrial sustainability. Appl. Soft Comput. 128: 109486 (2022) - [j25]Kewei Wang, Changzhen Hu, Chun Shan:
Calculation of utility of network services based on state manifolds. Comput. Networks 217: 109258 (2022) - [j24]Kaiwei Zhao, Chun Shan, Yan Luximon:
Contributions of individual muscle forces to hip, knee, and ankle contact forces during the stance phase of running: a model-based study. Health Inf. Sci. Syst. 10(1): 11 (2022) - [j23]Chun Shan, Siyi Zhou, Ziyi Zhang, Mianjie Li:
Digital watermarking method for image feature point extraction and analysis. Int. J. Intell. Syst. 37(10): 7281-7299 (2022) - [j22]Xianwei Gao, Changzhen Hu, Chun Shan, Weijie Han:
MaliCage: A packed malware family classification framework based on DNN and GAN. J. Inf. Secur. Appl. 68: 103267 (2022) - [j21]Weiwei Lin, Kun Yao, Lan Zeng, Fagui Liu, Chun Shan, Xiaobin Hong:
A GAN-based method for time-dependent cloud workload generation. J. Parallel Distributed Comput. 168: 33-44 (2022) - [j20]Mianjie Li, Wei Shi, Fusheng Zhu, Zhihong Tian, Muhammad Shafiq, Zhiyong Luo, Chun Shan:
Large-Capacity Local Multi-Dimensional Information Hiding Method for 6G Networks. IEEE Netw. 36(4): 160-165 (2022) - [i3]Tonghe Wang, Songpu Ai, Zhihong Tian, Brij B. Gupta, Chun Shan:
A Blockchain-Based Distributed Computational Resource Trading System for Industrial Internet of Things Considering Multiple Preferences. CoRR abs/2201.09539 (2022) - 2021
- [j19]Zhen Liu, Changzhen Hu, Chun Shan:
Riemannian manifold on stream data: Fourier transform and entropy-based DDoS attacks detection method. Comput. Secur. 109: 102392 (2021) - [j18]Xiushan Liu, Chun Shan, Qin Zhang, Jun Cheng, Peng Xu:
Compressed Wavelet Tensor Attention Capsule Network. Secur. Commun. Networks 2021: 9949204:1-9949204:12 (2021) - [j17]Xiang Yu, Chun Shan, Jilong Bian, Xianfei Yang, Ying Chen, Haifeng Song:
AdaGUM: An Adaptive Graph Updating Model-Based Anomaly Detection Method for Edge Computing Environment. Secur. Commun. Networks 2021: 9954951:1-9954951:12 (2021) - [j16]Lingling Lv, Chan Zheng, Lei Zhang, Chun Shan, Zhihong Tian, Xiaojiang Du, Mohsen Guizani:
Contract and Lyapunov Optimization-Based Load Scheduling and Energy Management for UAV Charging Stations. IEEE Trans. Green Commun. Netw. 5(3): 1381-1394 (2021) - [j15]Senfeng Lai, Yanpei Guo, Guiyang Liu, Chun Shan, Lixin Huang, Yicong Zhang, Yanghui Wu, Wenhua Gu, Wen Wu:
Modulation of the Transmission Spectra of the Double-Ring Structure by Surface Plasmonic Polaritons. Wirel. Commun. Mob. Comput. 2021: 5529655:1-5529655:7 (2021) - [c21]Beibei Zhu, Zhiyong Luo, Shichao Jin, Chun Shan:
Joint Matrix Completion and Randomized SVD Channel Estimation of the mmWave Massive MIMO. ComComAP 2021: 210-215 - [c20]Mian Guo, Chun Shan, Mithun Mukherjee, Jaime Lloret, Quansheng Guan:
Collaborative Edge Learning in MIMO-NOMA Uplink Transmission Environment. ICCC 2021: 1054-1058 - [c19]Kaixin Huang, Chengchuang Lin, Runhua Huang, Gansen Zhao, Aihua Yin, Hanbiao Chen, Li Guo, Chun Shan, Ruihua Nie, Shuangyin Li:
A novel chromosome instance segmentation method based on geometry and deep learning. IJCNN 2021: 1-8 - [i2]Mian Guo, Chun Shan, Mithun Mukherjee, Jaime Lloret, Quansheng Guan:
Collaborative Edge Learning in MIMO-NOMA Uplink Transmission Environment. CoRR abs/2106.14356 (2021) - 2020
- [j14]Xiaolin Zhao, Yiman Zhang, Jingfeng Xue, Chun Shan, Zhen Liu:
Research on Network Risk Evaluation Method Based on a Differential Manifold. IEEE Access 8: 66315-66326 (2020) - [j13]Bing Zhang, Chun Shan, Munawar Hussain, Jiadong Ren, Guoyan Huang:
Software Crucial Functions Ranking and Detection in Dynamic Execution Sequence Patterns. Int. J. Softw. Eng. Knowl. Eng. 30(5): 695-719 (2020) - [j12]Xianwei Gao, Changzhen Hu, Chun Shan, Baoxu Liu, Zequn Niu, Hui Xie:
Malware classification for the cloud via semi-supervised transfer learning. J. Inf. Secur. Appl. 55: 102661 (2020)
2010 – 2019
- 2019
- [j11]Xianwei Gao, Chun Shan, Changzhen Hu, Zequn Niu, Zhen Liu:
An Adaptive Ensemble Machine Learning Model for Intrusion Detection. IEEE Access 7: 82512-82521 (2019) - [j10]Chun Shan, Shanshan Mei, Changzhen Hu, Liyuan Liu, Limin Mao:
Software structure characteristic measurement method based on weighted network. Comput. Networks 152: 178-185 (2019) - [j9]Chun Shan, Jun Cai, Yan Liu, Jian-Zhen Luo:
Node importance to community based caching strategy for information centric networking. Concurr. Comput. Pract. Exp. 31(21) (2019) - [j8]Qian Wang, Chun Shan, Xiaolin Zhao, Jun Dong, Jiadong Ren, Jiaxin Liu:
A Novel Algorithm for Identifying Key Function Nodes in Software Network Based on Evidence Theory. Int. J. Softw. Eng. Knowl. Eng. 29(3): 415-432 (2019) - [c18]Peng Wang, Chun Shan, Shanshan Mei, Ning Li:
Research on a Multi-Level Combination of Software Defect Localization Method. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1305-1311 - [c17]Yan Zhou, Chun Shan, Shiyou Sun, Shengjun Wei, Sicong Zhang:
Software Defect Prediction Model Based On KPCA-SVM. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1326-1332 - [c16]Ling Xiong, Chun Shan, Changzhen Hu, Zijun Yun, Wenjie Xiong:
A Vulnerability Detection Model for Java Systems Based on Complex Networks. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1339-1347 - [i1]Shengjun Wei, Hao Zhong, Chun Shan, Lin Ye, Xiaojiang Du, Mohsen Guizani:
Vulnerability Prediction Based on Weighted Software Network for Secure Software Building. CoRR abs/1902.04844 (2019) - 2018
- [j7]Jianwen Fu, Jingfeng Xue, Yong Wang, Zhenyan Liu, Chun Shan:
Malware Visualization for Fine-Grained Classification. IEEE Access 6: 14510-14523 (2018) - [j6]Chun Shan, Xiaolong Chen:
An improved trusted method for global congestion price computing based on software defined networking in data-centred network. Int. J. Intell. Inf. Database Syst. 11(2/3): 153-168 (2018) - [j5]Haitao He, Chun Shan, Xiangmin Tian, Yalei Wei, Guoyan Huang:
Analysis on Influential Functions in the Weighted Software Network. Secur. Commun. Networks 2018: 1525186:1-1525186:10 (2018) - [j4]Chun Shan, Benfu Jiang, Jingfeng Xue, Fang Guan, Na Xiao:
An Approach for Internal Network Security Metric Based on Attack Probability. Secur. Commun. Networks 2018: 3652170:1-3652170:11 (2018) - [j3]Jian-Zhen Luo, Chun Shan, Jun Cai, Yan Liu:
IoT Application-Layer Protocol Vulnerability Detection using Reverse Engineering. Symmetry 10(11): 561 (2018) - [c15]Xu An Wang, Arun Kumar Sangaiah, Nadia Nedjah, Chun Shan, Zuliang Wang:
On the Security of a CCA-Secure Timed-Release Conditional Proxy Broadcast Re-encryption Scheme. 3PGCIC 2018: 192-198 - [c14]Xu An Wang, Nadia Nedjah, Arun Kumar Sangaiah, Chun Shan, Zuliang Wang:
Outsourcing Online/offline Proxy Re-encryption for Mobile Cloud Storage Sharing. 3PGCIC 2018: 478-485 - [c13]Cong Li, Xu An Wang, Arun Kumar Sangaiah, Haibing Yang, Chun Shan:
Verifiable Outsourced Attribute Based Encryption Scheme with Fixed Key Size. EIDWT 2018: 792-800 - [c12]Ping Bai, Wei Zhang, Xu An Wang, Yudong Liu, Haibin Yang, Chun Shan:
Homomorphic Authentication Based on Rank-Based Merkle Hash Tree. EIDWT 2018: 841-848 - [c11]Shengjun Wei, Hao Zhong, Chun Shan, Lin Ye, Xiaojiang Du, Mohsen Guizani:
Vulnerability Prediction Based on Weighted Software Network for Secure Software Building. GLOBECOM 2018: 1-6 - [c10]Zijun Yu, Chun Shan, Limin Mao, Changzhen Hu, Wenjie Xiong:
Software System Representation Methods Based on Algebraic Component. TrustCom/BigDataSE 2018: 1008-1013 - [c9]Wenjie Xiong, Chun Shan, Zhaoliang Sun, Qinglei Meng:
Real-time Processing and Storage of Multimedia Data with Content Delivery Network in Vehicle Monitoring System. WINCOM 2018: 1-4 - 2017
- [j2]Xiaolong Chen, Xiangbo Meng, Xiaoshi Song, Yuting Geng, Chun Shan:
Coverage probability in cognitive radio networks powered by renewable energy with primary transmitter assisted protocol. Inf. Sci. 400: 14-29 (2017) - [c8]Shengjun Wei, Xiaojiang Du, Changzhen Hu, Chun Shan:
Predicting Vulnerable Software Components Using Software Network Graph. CSS 2017: 280-290 - [c7]Zhen Cao, Minqing Zhang, Xiaolong Chen, Wenjun Sun, Chun Shan:
An Image Steganalysis Algorithm Based on Rotation Forest Transformation and Multiple Classifiers Ensemble. EIDWT 2017: 1-12 - [c6]Rui Ma, Tianbao Zhu, Changzhen Hu, Chun Shan, Xiaolin Zhao:
SulleyEX: A Fuzzer for Stateful Network Protocol. NSS 2017: 359-372 - [c5]Chun Shan, Shiyou Sun, Jingfeng Xue, Changzhen Hu, Hongjin Zhu:
A Detecting Method of Array Bounds Defects Based on Symbolic Execution. NSS 2017: 373-385 - 2016
- [j1]Chun Shan, Zequn Yu, Changzhen Hu, Jingfeng Xue, Luxia Wu:
Optimization of program recursive function calls analysis method. Autom. Control. Comput. Sci. 50(4): 253-259 (2016) - [c4]Xiao Long Chen, Chun Shan:
Design and implementation of Data Center Network Global Congestion Price Calculating method based on Software Defined Networking. 3PGCIC 2016: 459-466 - [c3]Chun Shan, Wei Zhang, Shaohua Teng:
Petri Net Applied in Document Flow Management System. HCC 2016: 332-343 - [c2]Chun Shan, Wei Zhang, Shaohua Teng:
The Quality Control and Management of Component-Oriented Software Development. HCC 2016: 746-751 - 2015
- [c1]Rui Ma, Yue Liu, Chun Shan, Xiaolin Zhao, Xu An Wang:
Research on Identification and Addressing of the Internet of Things. 3PGCIC 2015: 810-814
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint