default search action
Shunliang Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j9]Shunliang Zhang, Weiqing Huang, Yinlong Liu:
A systematic survey on physical layer security oriented to reconfigurable intelligent surface empowered 6G. Comput. Secur. 148: 104100 (2025) - 2024
- [j8]Shunliang Zhang, Dali Zhu, Yinlong Liu:
Artificial intelligence empowered physical layer security for 6G: State-of-the-art, challenges, and opportunities. Comput. Networks 242: 110255 (2024) - [c24]Shunliang Zhang, Hongce Zhao, Zuwei Fan:
Packet Bytes-Based Abnormal Encrypted Proxy Traffic Identification. ICT 2024: 1-7 - [c23]Xiaolei Guo, Shunliang Zhang, Yinlong Liu:
Deep Reinforcement Learning Based Secrecy Performance Optimization for Aerial IRS-Assisted Communications. MILCOM 2024: 425-430 - 2023
- [c22]Yunlong Zhang, Shunliang Zhang, Xiaolei Guo:
EDR-AKA: An Enhanced Authentication Protocol to Protect 5G Against Active Sniffing Attacks. ICT 2023: 1-6 - [c21]Xiaolei Guo, Shunliang Zhang:
On the secrecy performance of aerial IRS-assisted wireless communications. MILCOM 2023: 864-869 - [c20]Zongning Gao, Shunliang Zhang:
Research on Encrypted Malicious 5G Access Network Traffic Identification Based on Deep Learning. SciSec 2023: 496-512 - 2022
- [c19]Jing Li, Shunliang Zhang, Mengyan Xing, Zhuang Qiao, Xiaohui Zhang:
Mobile Device Identification Based on Two-dimensional Representation of RF Fingerprint with Deep Learning. ISCC 2022: 1-6 - [c18]Shunliang Zhang, Xiang Wang, Jing Li:
Reliability-Aware and Delay-Constrained Service Function Chain Orchestration in Multi-Data-Center Networks. LCN 2022: 403-406 - [c17]Hongce Zhao, Shunliang Zhang, Xianjin Huang, Zhuang Qiao, Xiaohui Zhang, Guanglei Wu:
Recognition of Abnormal Proxy Voice Traffic in 5G Environment Based on Deep Learning*. MSN 2022: 391-397 - [c16]Hongce Zhao, Shunliang Zhang, Zhuang Qiao, Xianjin Huang, Xiaohui Zhang:
On the Performance of Deep Learning Methods for Identifying Abnormal Encrypted Proxy Traffic. TrustCom 2022: 1416-1423 - 2021
- [j7]Dan Wang, Shunliang Zhang, Qian Cheng, Xiaohui Zhang:
Joint Interference Alignment and Power Allocation Based on Stackelberg Game in Device-to-Device Communications Underlying Cellular Networks. IEEE Access 9: 81651-81659 (2021) - [c15]Feiwen Li, Shunliang Zhang:
Secure transmission in cooperative wireless networks: A two-level coalitional game approach. ICT 2021: 1-6 - [c14]Hao Wang, Shunliang Zhang, Qian Cheng:
Security Aware Resource Allocation for D2D Communications with cooperative Jamming. ICT 2021: 1-6 - [c13]Zhuang Qiao, Liuqun Zhai, Shunliang Zhang, Xiaohui Zhang:
Encrypted 5G Over- The- Top Voice Traffic Identification Based on Deep Learning. ISCC 2021: 1-7 - [c12]Xiaohui Zhang, Shunliang Zhang, Zhuang Qiao:
A Chaos-Based Encryption Scheme for OFDM-IM Systems. ISCC 2021: 1-6 - 2020
- [j6]Shunliang Zhang, Dali Zhu, Yongming Wang:
A survey on space-aerial-terrestrial integrated 5G networks. Comput. Networks 174: 107212 (2020) - [j5]Shunliang Zhang, Dali Zhu:
Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities. Comput. Networks 183: 107556 (2020) - [c11]Luping Ma, Dali Zhu, Shunliang Zhang, Xiaohui Zhang, Shumin Peng, Ya Li:
ExpectDroid: User Expectation Based Authorization Management in Android. ICT 2020: 1-6 - [c10]Xiaohui Zhang, Shunliang Zhang, Luping Ma:
An Encrypted Polar Coding Scheme Based on Chaotic Sequences. ICT 2020: 1-6 - [c9]Xiaohui Zhang, Shunliang Zhang, Xu Shan, Luping Ma:
A Physical Layer Encryption Scheme Based on Chaotic Maps in OFDM Systems. ICT 2020: 1-6 - [c8]Qian Cheng, Shunliang Zhang, Dan Wang, Xiaona Li, Xiaohui Zhang:
Performance Analysis of D2D-enabled Non-orthogonal Multiple Access in Cooperative Relaying System. MobiQuitous 2020: 301-307 - [c7]Luping Ma, Dali Zhu, Shunliang Zhang, Xiaohui Zhang, Shumin Peng, Ya Li:
UIDroid: User-driven Based Hierarchical Access Control for Sensitive Information. TrustCom 2020: 1733-1740
2010 – 2019
- 2019
- [j4]Shunliang Zhang, Yongming Wang, Weihua Zhou:
Towards secure 5G networks: A Survey. Comput. Networks 162 (2019) - [j3]Shunliang Zhang, Xuejun Cai, Weihua Zhou, Yongming Wang:
Green 5G enabling technologies: an overview. IET Commun. 13(2): 135-143 (2019) - [j2]Shunliang Zhang:
An Overview of Network Slicing for 5G. IEEE Wirel. Commun. 26(3): 111-117 (2019) - [c6]Xiang Wang, Shunliang Zhang, Yongming Wang:
Cost-Aware and Delay-Constrained Service Function Orchestration in Multi-Data-Center Networks. ISCC 2019: 1-6 - [c5]Bowen Li, Shunliang Zhang, Xu Shan, Yongming Wang, Zhenxiang Gao:
A social-relation-based game model for distributed clustering in cooperative wireless networks. MobiQuitous 2019: 414-423 - 2018
- [j1]Weihua Liu, Shunliang Zhang, Xinke Zhang, Yongming Wang:
Iterative power allocation for throughput maximisation in IA-based cellular networks: two-game approach. IET Commun. 12(14): 1678-1685 (2018) - [c4]Keke Hu, Ying Wang, Zhongfang Wang, Shunliang Zhang, Yongming Wang:
Pseudo Downlink Channel Scheme for Eavesdroppers to Work Against Two-way Training DCE in Non-reciprocal MIMO Channel. ISCC 2018: 117-122 - 2017
- [c3]Dan Wang, Qian Cheng, Weihua Liu, Shunliang Zhang, Yongming Wang:
Iterative interference alignment in device-to-device LAN with cellular networks. PIMRC 2017: 1-6 - 2014
- [c2]Shunliang Zhang, Yi Wu, Xuejun Cai:
WeChat traffic profile and impact on mobile networks. ICCC 2014: 334-338 - 2013
- [c1]Xuejun Cai, Shunliang Zhang, Yunfei Zhang:
Economic analysis of cache location in mobile network. WCNC 2013: 1243-1248
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-22 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint