


default search action
Zheng Shan
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [i2]Bo Zhao, Zhihang Li, Xiaohan Yu, Benzheng Yuan, Chaojie Zhang, Yimin Gao, Weilong Wang, Qing Mu, Shuya Wang, Huihui Sun, Tian Yang, Mengfan Zhang, Chuanbing Han, Peng Xu, Wenqing Wang, Zheng Shan:
EDA-Q: Electronic Design Automation for Superconducting Quantum Chip. CoRR abs/2502.15386 (2025) - 2024
- [j18]Zhihui Song
, Jinchen Xu, Xin Zhou, Xiaodong Ding
, Zheng Shan:
Transforming two-dimensional tensor networks into quantum circuits for supervised learning. Mach. Learn. Sci. Technol. 5(1): 15048 (2024) - [j17]Xiaodong Ding
, Jinchen Xu, Zhihui Song
, Yifan Hou, Zheng Shan
:
Designing quantum multi-category classifier from the perspective of brain processing information. Mach. Learn. Sci. Technol. 5(3): 35070 (2024) - [j16]Tian Yang, Weilong Wang, Bo Zhao, Lixin Wang, Xiaodong Ding, Chen Liang, Zheng Shan:
A processor architecture design method for improving reusability of special-purpose superconducting quantum processor. Quantum Inf. Process. 23(6): 200 (2024) - [c12]Yu Zhu, Jinchen Xu, Qing Mu, Hongru Yang, Xiaodong Ding, Qiming Du, Zheng Shan:
LCOC: A Low-cost Optimizing Compiler for Large Scale Quantum Programs Towards Realistic Hardware. ISPA 2024: 526-533 - 2023
- [j15]Shiqin Di, Jinchen Xu, Guoqiang Shu, Congcong Feng, Xiaodong Ding, Zheng Shan:
Amplitude transformed quantum convolutional neural network. Appl. Intell. 53(18): 20863-20873 (2023) - [j14]Congcong Feng, Bo Zhao, Xin Zhou
, Xiaodong Ding, Zheng Shan:
An Enhanced Quantum K-Nearest Neighbor Classification Algorithm Based on Polar Distance. Entropy 25(1): 127 (2023) - [j13]Chuanbing Han
, Huihui Sun, Fudong Liu
, Xiangju Zhao, Zheng Shan:
Computational Simulations of Fabrication of Aluminum-Based Josephson Junctions: Topological Aspects of the Barrier Structure. Entropy 25(2): 182 (2023) - [j12]Lin Wei, Haowen Liu, Jing Xu, Lei Shi
, Zheng Shan, Bo Zhao, Yufei Gao:
Quantum machine learning in medical image analysis: A survey. Neurocomputing 525: 42-53 (2023) - [c11]Haowen Liu, Yufei Gao, Lei Shi
, Lin Wei, Zheng Shan, Bo Zhao:
HM-QCNN: Hybrid Multi-branches Quantum-Classical Neural Network for Image Classification. ADMA (2) 2023: 139-151 - 2022
- [j11]Benzheng Yuan, Weilong Wang, Fudong Liu
, Haoran He, Zheng Shan:
Comparison of Lumped Oscillator Model and Energy Participation Ratio Methods in Designing Two-Dimensional Superconducting Quantum Chips. Entropy 24(6): 792 (2022) - [j10]Haoran He, Weilong Wang, Fudong Liu
, Benzheng Yuan, Zheng Shan:
Suppressing the Dielectric Loss in Superconducting Qubits through Useful Geometry Design. Entropy 24(7): 952 (2022) - [j9]Junchao Wang, Guoping Guo, Zheng Shan:
SoK: Benchmarking the Performance of a Quantum Computer. Entropy 24(10): 1467 (2022) - [j8]Guoqiang Shu
, Zheng Shan, Shiqin Di, Xiaodong Ding, Congcong Feng:
A Hybrid Quantum Image-Matching Algorithm. Entropy 24(12): 1816 (2022) - 2021
- [c10]Ke Tang, Fudong Liu, Zheng Shan, Chunyan Zhang:
Anti-obfuscation Binary Code Clone Detection Based on Software Gene. ICPCSEE (1) 2021: 193-208
2010 – 2019
- 2019
- [j7]Xingwei Li
, Zheng Shan, Fudong Liu, Yihang Chen, Yifan Hou:
A Consistently-Executing Graph-Based Approach for Malware Packer Identification. IEEE Access 7: 51620-51629 (2019) - [j6]Binglin Zhao, Fudong Liu, Zheng Shan, Yihang Chen, Jian Liu:
Graph Similarity Metric Using Graph Convolutional Network: Application to Malware Similarity Match. IEICE Trans. Inf. Syst. 102-D(8): 1581-1585 (2019) - [j5]Binglin Zhao
, Zheng Shan, Fudong Liu, Bo Zhao
, Yihang Chen, Wenjie Sun:
Malware homology identification based on a gene perspective. Frontiers Inf. Technol. Electron. Eng. 20(6): 801-815 (2019) - [i1]Meng Qiao, Zheng Shan, Fudong Liu, Wenjie Sun:
A Fast Matrix-Completion-Based Approach for Recommendation Systems. CoRR abs/1912.00600 (2019) - 2018
- [j4]Fudong Liu
, Zheng Shan, Yihang Chen:
Parallel Nonnegative Matrix Factorization with Manifold Regularization. J. Electr. Comput. Eng. 2018: 6270816:1-6270816:10 (2018) - [j3]Guanghui Liang
, Jianmin Pang
, Zheng Shan, Runqing Yang, Yihang Chen:
Automatic Benchmark Generation Framework for Malware Detection. Secur. Commun. Networks 2018: 4947695:1-4947695:8 (2018) - [c9]Yihang Chen, Fudong Liu, Zheng Shan, Guanghui Liang:
MalCommunity: A Graph-Based Evaluation Model for Malware Family Clustering. ICPCSEE (1) 2018: 279-297 - 2017
- [c8]Jun Wang, Jianmin Pang, Liguo Fu, Zheng Shan, Feng Yue, Jiahao Zhang:
A Binary Translation Backend Registers Allocation Algorithm Based on Priority. GSKI (2) 2017: 414-425 - 2016
- [j2]Fei Xue, Zheng Shan, Lijing Yan, Chao Fan:
基于数据挖掘的多轨迹特征检测技术 (Multiple Trajectories Feature Detection Technology Based on Data Mining). 计算机科学 43(5): 91-95 (2016) - 2014
- [c7]Nan Li, Jianmin Pang, Zheng Shan:
Migration of CUDA Program Based on a Divide-and-Conquer Method. CSE 2014: 1685-1691 - 2012
- [j1]Haoran Guo, Jianmin Pang, Jintao Yu, Zheng Shan:
MEGA: a real-time visualisation framework for large-scale terrain. Int. J. Simul. Process. Model. 7(1/2): 33-41 (2012) - [c6]Zheng Shan, Haoran Guo, Jianmin Pang:
BTMD: A Framework of Binary Translation Based Malcode Detector. CyberC 2012: 39-43 - [c5]Feng Yue, Jianmin Pang, Zheng Shan, Xiaonan Liu:
Variable optimization in code migration from GPU to multi-core. GrC 2012: 1-4 - 2011
- [c4]Jinxian Cui, Jianmin Pang, Zheng Shan, Xiaonan Liu:
The multi-threaded optimization of dynamic binary translation. FSKD 2011: 2432-2436
2000 – 2009
- 2008
- [c3]Jiuzhen Jin, Jianmin Pang, Zheng Shan, Rongcai Zhao:
Queuing Network Performance Model for Evaluation of CMP-Based VoIP SPS. ACIS-ICIS 2008: 589-594 - [c2]Jianmin Pang, Jiuzhen Jin, Rongcai Zhao, Zheng Shan, Zheng Zhang:
Using Queuing Network to Evaluate IXP2400 Based VoIP SPS. ICNS 2008: 266-271 - 2005
- [c1]Zheng Shan, Rongcai Zhao, Kangmin Xie:
A Model for NP-based Application Design. PDCAT 2005: 880-883
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-22 00:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint