Shunliang Zhang

Orcid: 0000-0001-8437-5894

According to our database1, Shunliang Zhang authored at least 32 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A systematic survey on physical layer security oriented to reconfigurable intelligent surface empowered 6G.
Comput. Secur., 2025

2024
Artificial intelligence empowered physical layer security for 6G: State-of-the-art, challenges, and opportunities.
Comput. Networks, 2024

Packet Bytes-Based Abnormal Encrypted Proxy Traffic Identification.
Proceedings of the 30th IEEE International Conference on Telecommunications, 2024

2023
Research on Encrypted Malicious 5G Access Network Traffic Identification Based on Deep Learning.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

On the secrecy performance of aerial IRS-assisted wireless communications.
Proceedings of the IEEE Military Communications Conference, 2023

EDR-AKA: An Enhanced Authentication Protocol to Protect 5G Against Active Sniffing Attacks.
Proceedings of the 29th International Conference on Telecommunications, 2023

2022
On the Performance of Deep Learning Methods for Identifying Abnormal Encrypted Proxy Traffic.
Proceedings of the IEEE International Conference on Trust, 2022

Recognition of Abnormal Proxy Voice Traffic in 5G Environment Based on Deep Learning<sup>*</sup>.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

Reliability-Aware and Delay-Constrained Service Function Chain Orchestration in Multi-Data-Center Networks.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

Mobile Device Identification Based on Two-dimensional Representation of RF Fingerprint with Deep Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

2021
Joint Interference Alignment and Power Allocation Based on Stackelberg Game in Device-to-Device Communications Underlying Cellular Networks.
IEEE Access, 2021

A Chaos-Based Encryption Scheme for OFDM-IM Systems.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Encrypted 5G Over- The- Top Voice Traffic Identification Based on Deep Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Security Aware Resource Allocation for D2D Communications with cooperative Jamming.
Proceedings of the 28th International Conference on Telecommunications, 2021

Secure transmission in cooperative wireless networks: A two-level coalitional game approach.
Proceedings of the 28th International Conference on Telecommunications, 2021

2020
A survey on space-aerial-terrestrial integrated 5G networks.
Comput. Networks, 2020

Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities.
Comput. Networks, 2020

UIDroid: User-driven Based Hierarchical Access Control for Sensitive Information.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Performance Analysis of D2D-enabled Non-orthogonal Multiple Access in Cooperative Relaying System.
Proceedings of the MobiQuitous '20: Computing, 2020

A Physical Layer Encryption Scheme Based on Chaotic Maps in OFDM Systems.
Proceedings of the 27th International Conference on Telecommunications, 2020

An Encrypted Polar Coding Scheme Based on Chaotic Sequences.
Proceedings of the 27th International Conference on Telecommunications, 2020

ExpectDroid: User Expectation Based Authorization Management in Android.
Proceedings of the 27th International Conference on Telecommunications, 2020

2019
An Overview of Network Slicing for 5G.
IEEE Wirel. Commun., 2019

Green 5G enabling technologies: an overview.
IET Commun., 2019

Towards secure 5G networks: A Survey.
Comput. Networks, 2019

A social-relation-based game model for distributed clustering in cooperative wireless networks.
Proceedings of the MobiQuitous 2019, 2019

Cost-Aware and Delay-Constrained Service Function Orchestration in Multi-Data-Center Networks.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

2018
Iterative power allocation for throughput maximisation in IA-based cellular networks: two-game approach.
IET Commun., 2018

Pseudo Downlink Channel Scheme for Eavesdroppers to Work Against Two-way Training DCE in Non-reciprocal MIMO Channel.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

2017
Iterative interference alignment in device-to-device LAN with cellular networks.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

2014
WeChat traffic profile and impact on mobile networks.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

2013
Economic analysis of cache location in mobile network.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013


  Loading...