
Chun Shan
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j13]Xiaolin Zhao
, Yiman Zhang
, Jingfeng Xue
, Chun Shan
, Zhen Liu
:
Research on Network Risk Evaluation Method Based on a Differential Manifold. IEEE Access 8: 66315-66326 (2020) - [j12]Bing Zhang, Chun Shan, Munawar Hussain, Jiadong Ren, Guoyan Huang:
Software Crucial Functions Ranking and Detection in Dynamic Execution Sequence Patterns. Int. J. Softw. Eng. Knowl. Eng. 30(5): 695-719 (2020)
2010 – 2019
- 2019
- [j11]Xianwei Gao
, Chun Shan
, Changzhen Hu, Zequn Niu
, Zhen Liu:
An Adaptive Ensemble Machine Learning Model for Intrusion Detection. IEEE Access 7: 82512-82521 (2019) - [j10]Chun Shan, Shanshan Mei, Changzhen Hu, Liyuan Liu, Limin Mao:
Software structure characteristic measurement method based on weighted network. Comput. Networks 152: 178-185 (2019) - [j9]Chun Shan, Jun Cai, Yan Liu
, Jian-Zhen Luo
:
Node importance to community based caching strategy for information centric networking. Concurr. Comput. Pract. Exp. 31(21) (2019) - [j8]Qian Wang, Chun Shan, Xiaolin Zhao, Jun Dong, Jiadong Ren, Jiaxin Liu:
A Novel Algorithm for Identifying Key Function Nodes in Software Network Based on Evidence Theory. Int. J. Softw. Eng. Knowl. Eng. 29(3): 415-432 (2019) - [c18]Peng Wang, Chun Shan, Shanshan Mei, Ning Li:
Research on a Multi-Level Combination of Software Defect Localization Method. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1305-1311 - [c17]Yan Zhou, Chun Shan, Shiyou Sun, Shengjun Wei, Sicong Zhang:
Software Defect Prediction Model Based On KPCA-SVM. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1326-1332 - [c16]Ling Xiong, Chun Shan, Changzhen Hu, Zijun Yun, Wenjie Xiong:
A Vulnerability Detection Model for Java Systems Based on Complex Networks. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1339-1347 - [i1]Shengjun Wei, Hao Zhong, Chun Shan, Lin Ye, Xiaojiang Du, Mohsen Guizani:
Vulnerability Prediction Based on Weighted Software Network for Secure Software Building. CoRR abs/1902.04844 (2019) - 2018
- [j7]Jianwen Fu, Jingfeng Xue, Yong Wang
, Zhenyan Liu, Chun Shan:
Malware Visualization for Fine-Grained Classification. IEEE Access 6: 14510-14523 (2018) - [j6]Chun Shan, Xiaolong Chen:
An improved trusted method for global congestion price computing based on software defined networking in data-centred network. Int. J. Intell. Inf. Database Syst. 11(2/3): 153-168 (2018) - [j5]Haitao He, Chun Shan
, Xiangmin Tian
, Yalei Wei, Guoyan Huang:
Analysis on Influential Functions in the Weighted Software Network. Secur. Commun. Networks 2018: 1525186:1-1525186:10 (2018) - [j4]Chun Shan
, Benfu Jiang, Jingfeng Xue
, Fang Guan, Na Xiao:
An Approach for Internal Network Security Metric Based on Attack Probability. Secur. Commun. Networks 2018: 3652170:1-3652170:11 (2018) - [j3]Jian-Zhen Luo
, Chun Shan, Jun Cai, Yan Liu:
IoT Application-Layer Protocol Vulnerability Detection using Reverse Engineering. Symmetry 10(11): 561 (2018) - [c15]Xu An Wang, Arun Kumar Sangaiah, Nadia Nedjah, Chun Shan, Zuliang Wang:
On the Security of a CCA-Secure Timed-Release Conditional Proxy Broadcast Re-encryption Scheme. 3PGCIC 2018: 192-198 - [c14]Xu An Wang, Nadia Nedjah, Arun Kumar Sangaiah, Chun Shan, Zuliang Wang:
Outsourcing Online/offline Proxy Re-encryption for Mobile Cloud Storage Sharing. 3PGCIC 2018: 478-485 - [c13]Cong Li, Xu An Wang, Arun Kumar Sangaiah, Haibing Yang, Chun Shan:
Verifiable Outsourced Attribute Based Encryption Scheme with Fixed Key Size. EIDWT 2018: 792-800 - [c12]Ping Bai, Wei Zhang, Xu An Wang, Yudong Liu, HaiBin Yang, Chun Shan:
Homomorphic Authentication Based on Rank-Based Merkle Hash Tree. EIDWT 2018: 841-848 - [c11]Shengjun Wei, Hao Zhong, Chun Shan, Lin Ye, Xiaojiang Du, Mohsen Guizani:
Vulnerability Prediction Based on Weighted Software Network for Secure Software Building. GLOBECOM 2018: 1-6 - [c10]Zijun Yu, Chun Shan, Limin Mao, Changzhen Hu, Wenjie Xiong:
Software System Representation Methods Based on Algebraic Component. TrustCom/BigDataSE 2018: 1008-1013 - [c9]Wenjie Xiong, Chun Shan, Zhaoliang Sun, Qinglei Meng:
Real-time Processing and Storage of Multimedia Data with Content Delivery Network in Vehicle Monitoring System. WINCOM 2018: 1-4 - 2017
- [j2]Xiaolong Chen, Xiangbo Meng, Xiaoshi Song, Yuting Geng, Chun Shan:
Coverage probability in cognitive radio networks powered by renewable energy with primary transmitter assisted protocol. Inf. Sci. 400: 14-29 (2017) - [c8]Shengjun Wei, Xiaojiang Du, Changzhen Hu, Chun Shan:
Predicting Vulnerable Software Components Using Software Network Graph. CSS 2017: 280-290 - [c7]Zhen Cao, Minqing Zhang, Xiaolong Chen, Wenjun Sun, Chun Shan:
An Image Steganalysis Algorithm Based on Rotation Forest Transformation and Multiple Classifiers Ensemble. EIDWT 2017: 1-12 - [c6]Rui Ma, Tianbao Zhu, Changzhen Hu, Chun Shan, Xiaolin Zhao:
SulleyEX: A Fuzzer for Stateful Network Protocol. NSS 2017: 359-372 - [c5]Chun Shan, Shiyou Sun, Jingfeng Xue, Changzhen Hu, Hongjin Zhu:
A Detecting Method of Array Bounds Defects Based on Symbolic Execution. NSS 2017: 373-385 - 2016
- [j1]Chun Shan, Zequn Yu, Changzhen Hu, Jingfeng Xue, Luxia Wu:
Optimization of program recursive function calls analysis method. Autom. Control. Comput. Sci. 50(4): 253-259 (2016) - [c4]Xiao Long Chen, Chun Shan:
Design and implementation of Data Center Network Global Congestion Price Calculating method based on Software Defined Networking. 3PGCIC 2016: 459-466 - [c3]Chun Shan, Wei Zhang, Shaohua Teng:
Petri Net Applied in Document Flow Management System. HCC 2016: 332-343 - [c2]Chun Shan, Wei Zhang, Shaohua Teng:
The Quality Control and Management of Component-Oriented Software Development. HCC 2016: 746-751 - 2015
- [c1]Rui Ma, Yue Liu, Chun Shan, Xiaolin Zhao, Xu An Wang:
Research on Identification and Addressing of the Internet of Things. 3PGCIC 2015: 810-814
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-09-12 03:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint