default search action
Shujun Li
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j56]Zhanbo Liang, Jie Guo, Weidong Qiu, Zheng Huang, Shujun Li:
When graph convolution meets double attention: online privacy disclosure detection with multi-label text classification. Data Min. Knowl. Discov. 38(3): 1171-1192 (2024) - [j55]Jingrong Liu, Shujun Li, Wanfang Zhang:
Effects of providing EFL learners with additional online and face-to-face practise opportunities to promote active learning in higher education. J. Comput. Assist. Learn. 40(3): 1246-1260 (2024) - [j54]Ruiyuan Lin, Sheng Liu, Jun Jiang, Shujun Li, Chengqing Li, C.-C. Jay Kuo:
Recovering sign bits of DCT coefficients in digital images as an optimization problem. J. Vis. Commun. Image Represent. 98: 104045 (2024) - [c81]Haozhang Li, Yangde Wang, Weidong Qiu, Shujun Li, Peng Tang:
PassTSL: Modeling Human-Created Passwords Through Two-Stage Learning. ACISP (3) 2024: 404-423 - [c80]Yining Yuan, Kevin McAreavey, Shujun Li, Weiru Liu:
Multi-Granular Evaluation of Diverse Counterfactual Explanations. ICAART (2) 2024: 186-197 - [e8]Shujun Li, Kovila P. L. Coopamootoo, Michael Sirivianos:
European Interdisciplinary Cybersecurity Conference, EICC 2024, Xanthi, Greece, June 5-6, 2024. ACM 2024 [contents] - [i70]Jiazhou Ji, Ruizhe Li, Shujun Li, Jie Guo, Weidong Qiu, Zheng Huang, Chiyu Chen, Xiaoyu Jiang, Xinru Lu:
Detecting Machine-Generated Texts: Not Just "AI vs Humans" and Explainability is Complicated. CoRR abs/2406.18259 (2024) - [i69]Yangde Wang, Haozhang Li, Weidong Qiu, Shujun Li, Peng Tang:
PassTSL: Modeling Human-Created Passwords through Two-Stage Learning. CoRR abs/2407.14145 (2024) - [i68]Nandita Pattnaik, Shujun Li, Jason R. C. Nurse:
Security and Privacy Perspectives of People Living in Shared Home Environments. CoRR abs/2409.09363 (2024) - 2023
- [j53]Nandita Pattnaik, Shujun Li, Jason R. C. Nurse:
Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on twitter. Comput. Secur. 125: 103008 (2023) - [j52]Nandita Pattnaik, Shujun Li, Jason R. C. Nurse:
A Survey of User Perspectives on Security and Privacy in a Home Networking Environment. ACM Comput. Surv. 55(9): 180:1-180:38 (2023) - [j51]Ali Raza, Kim Phuc Tran, Ludovic Koehl, Shujun Li:
AnoFed: Adaptive anomaly detection for digital health using transformer-based federated learning and support vector data description. Eng. Appl. Artif. Intell. 121: 106051 (2023) - [c79]Haiyue Yuan, Matthew Boakes, Xiao Ma, Dongmei Cao, Shujun Li:
Visualising Personal Data Flows: Insights from a Case Study of Booking.com. CAiSE Forum 2023: 52-60 - [c78]Xin Yuan, Jie Guo, Weidong Qiu, Zheng Huang, Shujun Li:
Support or Refute: Analyzing the Stance of Evidence to Detect Out-of-Context Mis- and Disinformation. EMNLP 2023: 4268-4280 - [c77]Maria Sophia Heering, Haiyue Yuan, Shujun Li:
The Impact of Privacy and Security Attitudes and Concerns of Travellers on Their Willingness to Use Mobility-as-a-Service Systems. ITSC 2023: 5573-5578 - [c76]Ali Raza, Kim Phuc Tran, Ludovic Koehl, Shujun Li:
Proof of Swarm Based Ensemble Learning for Federated Learning Applications. SAC 2023: 152-155 - [c75]Jamie Knott, Haiyue Yuan, Matthew Boakes, Shujun Li:
Cyber Security and Online Safety Education for Schools in the UK: Looking through the Lens of Twitter Data. SAC 2023: 1603-1606 - [c74]Mohamad Imad Mahaini, Shujun Li:
Cyber Security Researchers on Online Social Networks: From the Lens of the UK's ACEs-CSR on Twitter. SocialSec 2023: 129-148 - [c73]Sam Parker, Haiyue Yuan, Shujun Li:
PassViz: An Interactive Visualisation System for Analysing Leaked Passwords. VizSec 2023: 33-42 - [c72]Shujun Li, Li Li, Yiwen Cui, Xueyan Wu:
Big Data-Based Recommendation Algorithm in E-commerce Personalized Marketing. WHICEB (1) 2023: 62-71 - [e7]Shujun Li, Mark Manulis, Atsuko Miyaji:
Network and System Security - 17th International Conference, NSS 2023, Canterbury, UK, August 14-16, 2023, Proceedings. Lecture Notes in Computer Science 13983, Springer 2023, ISBN 978-3-031-39827-8 [contents] - [e6]Budi Arief, Anna Monreale, Michael Sirivianos, Shujun Li:
Security and Privacy in Social Networks and Big Data - 9th International Symposium, SocialSec 2023, Canterbury, UK, August 14-16, 2023, Proceedings. Lecture Notes in Computer Science 14097, Springer 2023, ISBN 978-981-99-5176-5 [contents] - [i67]Haiyue Yuan, Matthew Boakes, Xiao Ma, Dongmei Cao, Shujun Li:
Visualising Personal Data Flows: Insights from a Case Study of Booking.com. CoRR abs/2304.09603 (2023) - [i66]Enes Altuncu, Jason R. C. Nurse, Meryem Bagriacik, Sophie Kaleba, Haiyue Yuan, Lisa Bonheme, Shujun Li:
aedFaCT: Scientific Fact-Checking Made Easier via Semi-Automatic Discovery of Relevant Expert Opinions. CoRR abs/2305.07796 (2023) - [i65]Yangde Wang, Weidong Qiu, Weicheng Zhang, Hao Tian, Shujun Li:
SE#PCFG: Semantically Enhanced PCFG for Password Analysis and Cracking. CoRR abs/2306.06824 (2023) - [i64]Sharifah Roziah Binti Mohd Kassim, Shujun Li, Budi Arief:
The Use of Public Data and Free Tools in National CSIRTs' Operational Practices: A Systematic Literature Review. CoRR abs/2306.07988 (2023) - [i63]Sam Parker, Haiyue Yuan, Shujun Li:
PassViz: A Visualisation System for Analysing Leaked Passwords. CoRR abs/2309.12968 (2023) - [i62]Xin Yuan, Jie Guo, Weidong Qiu, Zheng Huang, Shujun Li:
Support or Refute: Analyzing the Stance of Evidence to Detect Out-of-Context Mis- and Disinformation. CoRR abs/2311.01766 (2023) - [i61]Zhanbo Liang, Jie Guo, Weidong Qiu, Zheng Huang, Shujun Li:
When Graph Convolution Meets Double Attention: Online Privacy Disclosure Detection with Multi-Label Text Classification. CoRR abs/2311.15917 (2023) - [i60]Maria Sophia Heering, Haiyue Yuan, Shujun Li:
The Impact of Privacy and Security Attitudes and Concerns of Travellers on Their Willingness to Use Mobility-as-a-Service Systems. CoRR abs/2312.00519 (2023) - 2022
- [j50]Ali Raza, Kim Phuc Tran, Ludovic Koehl, Shujun Li:
Designing ECG monitoring healthcare system with federated transfer learning and explainable AI. Knowl. Based Syst. 236: 107763 (2022) - [j49]Sarah Turner, Nandita Pattnaik, Jason R. C. Nurse, Shujun Li:
"You Just Assume It Is In There, I Guess": Understanding UK Families' Application and Knowledge of Smart Home Cyber Security. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-34 (2022) - [j48]Yang Lu, Shujun Li:
From data flows to privacy-benefit trade-offs: A user-centric semantic model. Secur. Priv. 5(4) (2022) - [j47]Yang Lu, Shujun Li, Alex Alves Freitas, Athina Ioannou:
How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis. EAI Endorsed Trans. Security Safety 8(30): 3 (2022) - [c71]Sarah Turner, Jason R. C. Nurse, Shujun Li:
"It was hard to find the words": Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices. CHI Extended Abstracts 2022: 34:1-34:8 - [c70]Sharifah Roziah Binti Mohd Kassim, Solahuddin Bin Shamsuddin, Shujun Li, Budi Arief:
How National CSIRTs Operate: Personal Observations and Opinions from MyCERT. DSC 2022: 1-2 - [c69]Haiyue Yuan, Shujun Li:
Cyber Security Risks of Net Zero Technologies. DSC 2022: 1-11 - [c68]Xianglong Wu, Qirong Tang, Fang Wang, Ruiqin Guo, Qing Zhu, Shujun Li, Deyu Tu, Qingyun Liu:
A Robot-Assisted System for Dental Implantation. ICIRA (4) 2022: 15-28 - [c67]Keenan Jones, Jason R. C. Nurse, Shujun Li:
Out of the Shadows: Analyzing Anonymous' Twitter Resurgence during the 2020 Black Lives Matter Protests. ICWSM 2022: 417-428 - [c66]Keenan Jones, Jason R. C. Nurse, Shujun Li:
Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators. ICWSM 2022: 429-440 - [c65]Yang Xu, Jie Guo, Weidong Qiu, Zheng Huang, Enes Altuncu, Shujun Li:
"Comments Matter and The More The Better!": Improving Rumor Detection with User Comments. TrustCom 2022: 383-390 - [e5]Cristina Alcaraz, Liqun Chen, Shujun Li, Pierangela Samarati:
Information and Communications Security - 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022, Proceedings. Lecture Notes in Computer Science 13407, Springer 2022, ISBN 978-3-031-15776-9 [contents] - [i59]Keenan Jones, Jason R. C. Nurse, Shujun Li:
Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators. CoRR abs/2203.09813 (2022) - [i58]Nandita Pattnaik, Shujun Li, Jason R. C. Nurse:
Perspectives of Non-Expert Users on Cyber Security and Privacy: An Analysis of Online Discussions on Twitter. CoRR abs/2206.02156 (2022) - [i57]Sarah Turner, Nandita Pattnaik, Jason R. C. Nurse, Shujun Li:
"You Just Assume It Is In There, I Guess": UK Families' Application And Knowledge Of Smart Home Cyber Security. CoRR abs/2206.03930 (2022) - [i56]Ali Raza, Shujun Li, Kim Phuc Tran, Ludovic Koehl:
Detection of Poisoning Attacks with Anomaly Detection in Federated Learning for Healthcare Applications: A Machine Learning Approach. CoRR abs/2207.08486 (2022) - [i55]Keenan Jones, Enes Altuncu, Virginia N. L. Franqueira, Yichao Wang, Shujun Li:
A Comprehensive Survey of Natural Language Generation Advances from the Perspective of Digital Deception. CoRR abs/2208.05757 (2022) - [i54]Nandita Pattnaik, Shujun Li, Jason R. C. Nurse:
A Survey of User Perspectives on Security and Privacy in a Home Networking Environment. CoRR abs/2208.08193 (2022) - [i53]Enes Altuncu, Virginia N. L. Franqueira, Shujun Li:
Deepfake: Definitions, Performance Metrics and Standards, Datasets and Benchmarks, and a Meta-Review. CoRR abs/2208.10913 (2022) - [i52]Haiyue Yuan, Enes Altuncu, Shujun Li, Can Baskent:
Graphical Models of False Information and Fact Checking Ecosystems. CoRR abs/2208.11582 (2022) - [i51]Rahime Belen Saglam, Enes Altuncu, Yang Lu, Shujun Li:
A Systematic Literature Review of the Tension between the GDPR and Public Blockchain Systems. CoRR abs/2210.04541 (2022) - [i50]Ruiyuan Lin, Sheng Liu, Jun Jiang, Shujun Li, Chengqing Li, C.-C. Jay Kuo:
Recovering Sign Bits of DCT Coefficients in Digital Images as an Optimization Problem. CoRR abs/2211.01096 (2022) - [i49]Enes Altuncu, Jason R. C. Nurse, Yang Xu, Jie Guo, Shujun Li:
Improving Performance of Automatic Keyword Extraction (AKE) Methods Using PoS-Tagging and Enhanced Semantic-Awareness. CoRR abs/2211.05031 (2022) - [i48]Jamie Knott, Haiyue Yuan, Matthew Boakes, Shujun Li:
Cyber Security and Online Safety Education for Schools in the UK: Looking through the Lens of Twitter Data. CoRR abs/2212.13742 (2022) - [i47]Ali Raza, Kim Phuc Tran, Ludovic Koehl, Shujun Li:
Proof of Swarm Based Ensemble Learning for Federated Learning Applications. CoRR abs/2212.14050 (2022) - 2021
- [j46]Guorui Feng, Sheng Li, Haoliang Li, Shujun Li:
Special issue on low complexity methods for multimedia security. Multim. Syst. 27(3): 301-302 (2021) - [j45]Xinhao Sun, Kaixi Wang, Shujun Li:
Audio steganography with less modification to the optimal matching CNV-QIM path with the minimal hamming distance expected value to a secret. Multim. Syst. 27(3): 341-352 (2021) - [j44]Shuqin Zhang, Guangyao Bai, Hong Li, Peipei Liu, Minzhi Zhang, Shujun Li:
Multi-Source Knowledge Reasoning for Data-Driven IoT Security. Sensors 21(22): 7579 (2021) - [j43]Haiyue Yuan, Shujun Li, Patrice Rusconi:
CogTool+: Modeling Human Performance at Large Scale. ACM Trans. Comput. Hum. Interact. 28(2): 15:1-15:38 (2021) - [c64]Mohamad Imad Mahaini, Shujun Li:
Detecting cyber security related Twitter accounts and different sub-groups: a multi-classifier approach. ASONAM 2021: 599-606 - [c63]Sarah Turner, Jason R. C. Nurse, Shujun Li:
When Googling It Doesn't Work: The Challenge of Finding Security Advice for Smart Home Devices. HAISA 2021: 115-126 - [c62]Ingolf Becker, Rebecca Posner, Tasmina Islam, Paul Ekblom, Hervé Borrion, Michael McGuire, Shujun Li:
Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation. HICSS 2021: 1-10 - [c61]Keenan Jones, Jason R. C. Nurse, Shujun Li:
The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter. ICWSM Workshops 2021 - [c60]Shujun Li, Lianzhi Huo:
Remote Sensing Image Change Detection Based on Fully Convolutional Network With Pyramid Attention. IGARSS 2021: 4352-4355 - [e4]Joaquín García-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung:
Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 398, Springer 2021, ISBN 978-3-030-90018-2 [contents] - [e3]Joaquín García-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung:
Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 399, Springer 2021, ISBN 978-3-030-90021-2 [contents] - [i46]Keenan Jones, Jason R. C. Nurse, Shujun Li:
The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter. CoRR abs/2105.03168 (2021) - [i45]Ali Raza, Kim Phuc Tran, Ludovic Koehl, Shujun Li:
Designing ECG Monitoring Healthcare System with Federated Transfer Learning and Explainable AI. CoRR abs/2105.12497 (2021) - [i44]Keenan Jones, Jason R. C. Nurse, Shujun Li:
Out of the Shadows: Analyzing Anonymous' Twitter Resurgence during the 2020 Black Lives Matter Protests. CoRR abs/2107.10554 (2021) - [i43]Sarah Turner, Jason R. C. Nurse, Shujun Li:
When Googling it doesn't work: The challenge of finding security advice for smart home devices. CoRR abs/2108.03107 (2021) - [i42]Ali Raza, Kim Phuc Tran, Ludovic Koehl, Shujun Li, Xianyi Zeng, Khaled Benzaidi:
Lightweight Transformer in Federated Setting for Human Activity Recognition. CoRR abs/2110.00244 (2021) - [i41]Sarah Turner, Jason R. C. Nurse, Shujun Li:
It was hard to find the words: Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices. CoRR abs/2112.09035 (2021) - 2020
- [b1]Haiyue Yuan, Shujun Li, Patrice Rusconi:
Cognitive Modeling for Automated Human Performance Evaluation at Scale. Human-Computer Interaction Series, Springer 2020, ISBN 978-3-030-45703-7, pp. 1-97 - [j42]Çagri B. Aslan, Shujun Li, Fatih V. Çelebi, Hao Tian:
The World of Defacers: Looking Through the Lens of Their Activities on Twitter. IEEE Access 8: 204132-204143 (2020) - [j41]Carlos Javier Hernández-Castro, Shujun Li, María D. R.-Moreno:
All about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks. Comput. Secur. 92: 101758 (2020) - [c59]Rahime Belen Saglam, Çagri B. Aslan, Shujun Li, Lisa Dickson, Ganna Pogrebna:
A Data-Driven Analysis of Blockchain Systems' Public Online Communications on GDPR. DAPPS 2020: 22-31 - [c58]Hui Wang, Anthony T. S. Ho, Shujun Li:
OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 243-260 - [c57]Yang Lu, Shujun Li:
From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues. HICSS 2020: 1-10 - [c56]Keenan Jones, Jason R. C. Nurse, Shujun Li:
Behind the Mask: A Computational Study of Anonymous' Presence on Twitter. ICWSM 2020: 327-338 - [c55]Kubra Aydin, Rahime Belen Saglam, Shujun Li, Abdullah Bulbul:
When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter. SIN 2020: 16:1-16:8 - [c54]Zeynep Chousein, Haci Yakup Tetik, Rahime Belen Saglam, Abdullah Bülbül, Shujun Li:
Tension between GDPR and Public Blockchains: A Data-Driven Analysis of Online Discussions. SIN 2020: 17:1-17:8 - [c53]Shujun Li, Bin Li, Li Li, Shu Wang:
Research on the Application of Blockchain Technology in the Field of Cross-border Logistics for Small and Medium-sized Enterprises. WHICEB 2020: 52 - [e2]Ioana Boureanu, Constantin Catalin Dragan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, Panagiotis Gouvas, Roger A. Hallman, Shujun Li, Victor Chang, Frank Pallas, Jörg Pohle, M. Angela Sasse:
Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12580, Springer 2020, ISBN 978-3-030-66503-6 [contents] - [i40]Keenan Jones, Jason R. C. Nurse, Shujun Li:
Behind the Mask: A Computational Study of Anonymous' Presence on Twitter. CoRR abs/2006.08273 (2020) - [i39]Matthieu Monteiro, Kumara Kahatapitiya, Hassan Jameel Asghar, Kanchana Thilakarathna, Thierry Rakotoarivelo, Dali Kaafar, Shujun Li, Ron Steinfeld, Josef Pieprzyk:
Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices. IACR Cryptol. ePrint Arch. 2020: 261 (2020)
2010 – 2019
- 2019
- [j40]Zichi Wang, Shujun Li, Xinpeng Zhang:
Towards Improved Steganalysis: When Cover Selection is Used in Steganography. IEEE Access 7: 168914-168921 (2019) - [j39]Ximing Liu, Yingjiu Li, Robert H. Deng, Bing Chang, Shujun Li:
When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. Comput. Secur. 80: 90-107 (2019) - [j38]Saeed Ibrahim Alqahtani, Shujun Li, Haiyue Yuan, Patrice Rusconi:
Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More? EAI Endorsed Trans. Security Safety 6(21): e1 (2019) - [j37]Chengqing Li, Bingbing Feng, Shujun Li, Jürgen Kurths, Guanrong Chen:
Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks. IEEE Trans. Circuits Syst. I Regul. Pap. 66-I(6): 2322-2335 (2019) - [c52]Mohamad Imad Mahaini, Shujun Li, Rahime Belen Saglam:
Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example. ARES 2019: 30:1-30:9 - [c51]Yang Lu, Shujun Li, Athina Ioannou, Iis Tussyadiah:
From Data Disclosure to Privacy Nudges: A Privacy-Aware and User-Centric Personal Data Management Framework. DependSys 2019: 262-276 - [c50]Tasmina Islam, Ingolf Becker, Rebecca Posner, Paul Ekblom, Michael McGuire, Hervé Borrion, Shujun Li:
A Socio-Technical and Co-evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems. DependSys 2019: 277-293 - [c49]Iis Tussyadiah, Shujun Li, Graham Miller:
Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For. ENTER 2019: 278-290 - [c48]Qianwen Wei, Shujun Li, Wei Li, Hong Li, Mingsheng Wang:
Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain. WASA 2019: 358-369 - [i38]Markus Wagner, Hanhe Lin, Shujun Li, Dietmar Saupe:
Algorithm Selection for Image Quality Assessment. CoRR abs/1908.06911 (2019) - [i37]Yang Lu, Shujun Li, Athina Ioannou, Iis Tussyadiah:
From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework. CoRR abs/1909.09942 (2019) - 2018
- [j36]Anderson Rocha, Shujun Li, C.-C. Jay Kuo, Alessandro Piva, Jiwu Huang:
Data-driven multimedia forensics and security. J. Vis. Commun. Image Represent. 55: 447-448 (2018) - [j35]Ding Wang, Shujun Li, Qi Jiang:
User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs. Secur. Commun. Networks 2018: 6150491:1-6150491:2 (2018) - [c47]Shujun Li, Anthony T. S. Ho, Zichi Wang, Xinpeng Zhang:
Lost in the Digital Wild: Hiding Information in Digital Activities. MPS@CCS 2018: 27-37 - [c46]Roger A. Hallman, Shujun Li, Victor Chang:
2nd International Workshop on Multimedia Privacy and Security. CCS 2018: 2173-2174 - [c45]Çagri B. Aslan, Rahime Belen Saglam, Shujun Li:
Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example. SMSociety 2018: 236-240 - [e1]Roger A. Hallman, Shujun Li, Victor Chang:
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, MPS@CCS 2018, Toronto, ON, Canada, October 15, 2018. ACM 2018, ISBN 978-1-4503-5988-7 [contents] - [i36]Shujun Li, Anthony T. S. Ho, Zichi Wang, Xinpeng Zhang:
Lost in the Digital Wild: Hiding Information in Digital Activities. CoRR abs/1809.02888 (2018) - [i35]Ximing Liu, Yingjiu Li, Robert H. Deng, Bing Chang, Shujun Li:
When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. CoRR abs/1810.07665 (2018) - 2017
- [j34]Simying Ong, Shujun Li, KokSheik Wong, KuanYew Tan:
Fast recovery of unknown coefficients in DCT-transformed images. Signal Process. Image Commun. 58: 1-13 (2017) - [c44]Saeed Ibrahim Alqahtani, Shujun Li:
PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices. ARES 2017: 19:1-19:10 - [c43]Christopher Sandy, Patrice Rusconi, Shujun Li:
Can Humans Detect the Authenticity of Social Media Accounts? On the Impact of Verbal and Non-Verbal Cues on Credibility Judgements of Twitter Profiles. CYBCONF 2017: 1-8 - [c42]Nick Williams, Shujun Li:
Simulating Human Detection of Phishing Websites: An Investigation into the Applicability of the ACT-R Cognitive Behaviour Architecture Model. CYBCONF 2017: 1-8 - [c41]Nouf Aljaffan, Haiyue Yuan, Shujun Li:
PSV (Password Security Visualizer): From Password Checking to User Education. HCI (22) 2017: 191-211 - [c40]Haiyue Yuan, Shujun Li, Patrice Rusconi, Nouf Aljaffan:
When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems. HCI (22) 2017: 251-264 - [c39]Vlad Hosu, Franz Hahn, Mohsen Jenadeleh, Hanhe Lin, Hui Men, Tamás Szirányi, Shujun Li, Dietmar Saupe:
The Konstanz natural video database (KoNViD-1k). QoMEX 2017: 1-6 - [i34]Carlos Javier Hernández-Castro, María D. R.-Moreno, David F. Barrero, Shujun Li:
An oracle-based attack on CAPTCHAs protected against oracle attacks. CoRR abs/1702.03815 (2017) - 2016
- [j33]Shujun Li, Hong Li, Limin Sun:
Privacy-preserving crowdsourced site survey in WiFi fingerprint-based localization. EURASIP J. Wirel. Commun. Netw. 2016: 123 (2016) - [c38]Runxiao Wang, Wentao Zhao, Shujun Li, Shunqi Zhang:
Influence of leg stiffness on payload capacity at high speed. ROBIO 2016: 1005-1010 - [i33]Aamo Iorliam, Santosh Tirunagari, Anthony T. S. Ho, Shujun Li, Adrian Waller, Norman Poh:
"Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law. CoRR abs/1609.04214 (2016) - [i32]Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Álvarez, Guanrong Chen:
On the security defects of an image encryption scheme. CoRR abs/1610.02534 (2016) - 2015
- [j32]Mario Cagalj, Toni Perkovic, Marin Bugaric, Shujun Li:
Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks. Pervasive Mob. Comput. 20: 64-81 (2015) - [j31]Hassan Jameel Asghar, Ron Steinfeld, Shujun Li, Mohamed Ali Kâafar, Josef Pieprzyk:
On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices. IEEE Trans. Inf. Forensics Secur. 10(8): 1643-1655 (2015) - [c37]Roland Schmitz, Shujun Li, Christos Grecos, Xinpeng Zhang:
Content-Fragile Commutative Watermarking-Encryption Based on Pixel Entropy. ACIVS 2015: 474-485 - [i31]Hui Wang, Anthony T. S. Ho, Shujun Li:
OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework. CoRR abs/1506.00243 (2015) - 2014
- [j30]Roland Schmitz, Shujun Li, Christos Grecos, Xinpeng Zhang:
Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms. Int. J. Multim. Data Eng. Manag. 5(4): 36-52 (2014) - [j29]Shujun Li, Konrad Rieck, Alan Woodward:
Special issue on threat detection, analysis and defense. J. Inf. Secur. Appl. 19(3): 163-164 (2014) - [j28]Hui Wang, Anthony T. S. Ho, Shujun Li:
A novel image restoration scheme based on structured side information and its application to image watermarking. Signal Process. Image Commun. 29(7): 773-787 (2014) - [c36]Matthew Davidson, Karen Renaud, Shujun Li:
jCAPTCHA: Accessible Human Validation. ICCHP (1) 2014: 129-136 - [c35]Fang Liu, Hui Wang, Lee-Ming Cheng, Anthony T. S. Ho, Shujun Li:
Enhanced perceptual image authentication with tamper localization and self-restoration. ICME 2014: 1-6 - [i30]Hassan Jameel Asghar, Ron Steinfeld, Shujun Li, Dali Kaafar, Josef Pieprzyk:
Algebraic Attacks on Human Identification Protocols. IACR Cryptol. ePrint Arch. 2014: 767 (2014) - 2013
- [j27]Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang:
Cryptanalysis of the convex hull click human identification protocol. Int. J. Inf. Sec. 12(2): 83-96 (2013) - [j26]Junaid Jameel Ahmad, Shujun Li, Richard Thavot, Marco Mattavelli:
Secure computing with the MPEG RVC framework. Signal Process. Image Commun. 28(10): 1315-1334 (2013) - [c34]Junaid Jameel Ahmad, Shujun Li, Marco Mattavelli:
Performance benchmarking of RVC based multimedia specifications. ICIP 2013: 4569-4573 - [c33]Roland Schmitz, Shujun Li, Christos Grecos, Xinpeng Zhang:
Towards More Robust Commutative Watermarking-Encryption of Images. ISM 2013: 283-286 - [c32]Hassan Jameel Asghar, Shujun Li, Ron Steinfeld, Josef Pieprzyk:
Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks. NDSS 2013 - 2012
- [c31]Sabine Cornelsen, Andreas Karrenbauer, Shujun Li:
Leveling the Grid. ALENEX 2012: 45-54 - [c30]Roland Schmitz, Shujun Li, Christos Grecos, Xinpeng Zhang:
A New Approach to Commutative Watermarking-Encryption. Communications and Multimedia Security 2012: 117-130 - [c29]Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi, Thomas Schneider:
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm. Financial Cryptography 2012: 299-313 - [c28]Kongfeng Zhu, Shujun Li, Dietmar Saupe:
An objective method of measuring texture preservation for camcorder performance evaluation. IQSP 2012: 829304 - [p2]Shujun Li:
On the Performance of Secret Entropy Coding: A Perspective Beyond Security. Autonomous Systems: Developments and Trends 2012: 389-401 - [i29]Shujun Li, Andreas Karrenbauer, Dietmar Saupe, C.-C. Jay Kuo:
Recovering Missing Coefficients in DCT-Transformed Images. CoRR abs/1209.1673 (2012) - [i28]Hassan Jameel Asghar, Shujun Li, Ron Steinfeld, Josef Pieprzyk:
Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks. IACR Cryptol. ePrint Arch. 2012: 659 (2012) - 2011
- [j25]Roland Schmitz, Shujun Li:
Neue Entwicklungen in der e-Banking Security. Prax. Inf.verarb. Kommun. 34(4): 176-184 (2011) - [c27]Shujun Li, Ahmad-Reza Sadeghi, Sören Heisrath, Roland Schmitz, Junaid Jameel Ahmad:
hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers. Financial Cryptography 2011: 235-249 - [c26]Shujun Li, Andreas Karrenbauer, Dietmar Saupe, C.-C. Jay Kuo:
Recovering missing coefficients in DCT-transformed images. ICIP 2011: 1537-1540 - [c25]Shujun Li, Chengqing Li, C.-C. Jay Kuo:
On the security of a secure Lempel-Ziv-Welch (LZW) algorithm. ICME 2011: 1-5 - [c24]Junaid Jameel Ahmad, Shujun Li, Ihab Amer, Marco Mattavelli:
Building multimedia security applications in the MPEG reconfigurable video coding (RVC) framework. MM&Sec 2011: 121-130 - [c23]Yousra Javed, Maliha Nazir, Muhammad Murtaza Khan, Syed Ali Khayam, Shujun Li:
Captchæcker: Reconfigurable CAPTCHAs based on automated security and usability analysis. SafeConfig 2011 - [c22]Toni Perkovic, Shujun Li, Asma Mumtaz, Syed Ali Khayam, Yousra Javed, Mario Cagalj:
Breaking undercover: exploiting design flaws and nonuniform human behavior. SOUPS 2011: 5 - [p1]Gonzalo Álvarez, José María Amigó, David Arroyo, Shujun Li:
Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers. Chaos-Based Cryptography 2011: 257-295 - [i27]Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi, Thomas Schneider:
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm. IACR Cryptol. ePrint Arch. 2011: 679 (2011) - 2010
- [j24]Chengqing Li, Shujun Li, Kwok-Tung Lo, Kyandoghere Kyamakya:
A differential cryptanalysis of Yen-Chen-Wu multimedia cryptography system. J. Syst. Softw. 83(8): 1443-1452 (2010) - [c21]Shujun Li, S. Amier Haider Shah, M. Asad Usman Khan, Syed Ali Khayam, Ahmad-Reza Sadeghi, Roland Schmitz:
Breaking e-banking CAPTCHAs. ACSAC 2010: 171-180 - [c20]Shujun Li, Ahmad-Reza Sadeghi, Roland Schmitz:
hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers. Financial Cryptography 2010: 429 - [c19]Li Zhang, Zhu Wang, Shujun Li, Lihua Zhang:
A method for automatic routing based on comprehensive evaluation on limiting conditions of maneuverability. Geoinformatics 2010: 1-5 - [c18]Shujun Li, Syed Ali Khayam, Ahmad-Reza Sadeghi, Roland Schmitz:
Breaking Randomized Linear Generation Functions Based Virtual Password System. ICC 2010: 1-6 - [c17]Shujun Li, Junaid Jameel Ahmad, Dietmar Saupe, C.-C. Jay Kuo:
An improved DC recovery method from AC coefficients of DCT-transformed images. ICIP 2010: 2085-2088 - [c16]Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang:
Cryptanalysis of the Convex Hull Click Human Identification Protocol. ISC 2010: 24-30 - [i26]Shujun Li, Junaid Jameel Ahmad, Dietmar Saupe, C.-C. Jay Kuo:
An Improved DC Recovery Method from AC Coefficients of DCT-Transformed Images. CoRR abs/1002.1727 (2010) - [i25]Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang:
Cryptanalysis of the Convex Hull Click Human Identification Protocol. IACR Cryptol. ePrint Arch. 2010: 478 (2010)
2000 – 2009
- 2009
- [j23]A. B. Orue, Veronica Fernandez, Gonzalo Álvarez, G. Pastor, M. Romera, Fausto Montoya Vitini, Carmen Sánchez Ávila, Shujun Li:
Breaking a SC-CNN-Based Chaotic Masking Secure Communication System. Int. J. Bifurc. Chaos 19(4): 1329-1338 (2009) - [j22]Chengqing Li, Shujun Li, Guanrong Chen, Wolfgang A. Halang:
Cryptanalysis of an image encryption scheme based on a compound chaotic sequence. Image Vis. Comput. 27(8): 1035-1039 (2009) - [j21]Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Álvarez, Guanrong Chen:
On the security defects of an image encryption scheme. Image Vis. Comput. 27(9): 1371-1381 (2009) - [c15]Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong Wang:
On the Security of PAS (Predicate-Based Authentication Service). ACSAC 2009: 209-218 - [c14]Shujun Li, Roland Schmitz:
A novel anti-phishing framework based on honeypots. eCrime 2009: 1-13 - [c13]Huirong Chen, Rencan Peng, Shujun Li, Caixia Yu:
The Visualization of 3D Terrain Based on VRML. IFITA (3) 2009: 116-118 - [c12]Elise de Doncker, Karlis Kaugars, Shujun Li, Haisen S. Li, Yoshimitsu Shimizu, Junpei Fujimoto, Fukuko Yuasa, Tadashi Ishikawa, Nobuyuki Hamaguchi:
Interdisciplinary applications of mathematical modeling. ICIS 2009: 142-148 - [c11]Shujun Li, Guanrong Chen, Albert Cheung, Kwok-Tung Lo, Mohan S. Kankanhalli:
On the Security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables. PSIVT 2009: 898-909 - [i24]Chengqing Li, Shujun Li, Kwok-Tung Lo:
Breaking a new substitution-diffusion based image cipher using chaotic standard and logistic maps. CoRR abs/0907.0821 (2009) - [i23]Chengqing Li, Shujun Li, Kwok-Tung Lo, Kyandoghere Kyamakya:
A Differential Cryptanalysis of Yen-Chen-Wu Multimedia Cryptography System (MCS). CoRR abs/0908.2496 (2009) - [i22]Chengqing Li, Shujun Li, Kwok-Tung Lo:
Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps. CoRR abs/0912.3050 (2009) - [i21]Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong Wang:
On the Security of PAS (Predicate-based Authentication Service). IACR Cryptol. ePrint Arch. 2009: 476 (2009) - 2008
- [j20]Shujun Li, Zhenhai Liu:
A new trust region filter algorithm. Appl. Math. Comput. 204(1): 485-489 (2008) - [j19]Shujun Li, Chengqing Li, Guanrong Chen, Kwok-Tung Lo:
Cryptanalysis of the RCES/RSES image encryption scheme. J. Syst. Softw. 81(7): 1130-1143 (2008) - [j18]Shujun Li, Chengqing Li, Guanrong Chen, Nikolaos G. Bourbakis, Kwok-Tung Lo:
A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process. Image Commun. 23(3): 212-223 (2008) - [j17]Shujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Chen:
Cryptanalyzing an Encryption Scheme Based on Blind Source Separation. IEEE Trans. Circuits Syst. I Regul. Pap. 55-I(4): 1055-1063 (2008) - [j16]Shujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Chen:
Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion. IEEE Trans. Circuits Syst. Video Technol. 18(3): 338-349 (2008) - 2007
- [j15]Gonzalo Álvarez, Shujun Li, Luis Hernández Encinas:
Analysis of security problems in a medical image encryption system. Comput. Biol. Medicine 37(3): 424-427 (2007) - [j14]Shujun Li, Kwok-Tung Lo:
Security problems with improper implementations of improved FEA-M. J. Syst. Softw. 80(5): 791-794 (2007) - [j13]Shujun Li, Guanrong Chen, Albert Cheung, Bharat K. Bhargava, Kwok-Tung Lo:
On the Design of Perceptual MPEG-Video Encryption Algorithms. IEEE Trans. Circuits Syst. Video Technol. 17(2): 214-223 (2007) - [i20]Shujun Li, Gonzalo Álvarez, Zhong Li, Wolfgang A. Halang:
Analog Chaos-based Secure Communications and Cryptanalysis: A Brief Survey. CoRR abs/0710.5455 (2007) - [i19]David Arroyo, Chengqing Li, Shujun Li, Gonzalo Álvarez, Wolfgang A. Halang:
Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm. CoRR abs/0710.5465 (2007) - [i18]David Arroyo, Chengqing Li, Shujun Li, Gonzalo Álvarez:
Cryptanalysis of a computer cryptography scheme based on a filter bank. CoRR abs/0710.5471 (2007) - [i17]Chengqing Li, Shujun Li, Guanrong Chen, Wolfgang A. Halang:
Cryptanalysis of an Image Encryption Scheme Based on a Compound Chaotic Sequence. CoRR abs/0712.3964 (2007) - [i16]Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Álvarez, Guanrong Chen:
On the security defects of an image encryption scheme. IACR Cryptol. ePrint Arch. 2007: 397 (2007) - 2006
- [j12]Shujun Li, Guanrong Chen, Gonzalo Álvarez:
Return-Map Cryptanalysis Revisited. Int. J. Bifurc. Chaos 16(5): 1557-1568 (2006) - [j11]Gonzalo Álvarez, Shujun Li:
Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems. Int. J. Bifurc. Chaos 16(8): 2129-2151 (2006) - [j10]Shujun Li, Karlis Kaugars, Elise de Doncker:
Distributed Adaptive Multivariate Function Visualization. Int. J. Comput. Intell. Appl. 6(2): 273-288 (2006) - [j9]Shujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Chen:
Cryptanalysis of an image encryption scheme. J. Electronic Imaging 15(4): 043012 (2006) - [j8]Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang:
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA). J. Syst. Softw. 79(2): 253-258 (2006) - [j7]Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang:
Erratum to "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)" [The Journal of Systems and Software 79 (2006) 253-258]. J. Syst. Softw. 79(12): 1789 (2006) - [j6]Shujun Li, Elise de Doncker, Karlis Kaugars:
Pion: A Problem Solving Environment for Parallel Multivariate Integration. Scalable Comput. Pract. Exp. 7(3) (2006) - [c10]Shujun Li, Elise de Doncker, Karlis Kaugars, Haisen S. Li:
A Fast Integration Method and Its Application in a Medical Physics Problem. ICCSA (5) 2006: 789-797 - [i15]Shujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Chen:
Cryptanalysis of an Encryption Scheme Based on Blind Source Separation. CoRR abs/cs/0608024 (2006) - [i14]Chengqing Li, Shujun Li, Gonzalo Álvarez, Guanrong Chen, Kwok-Tung Lo:
Cryptanalysis of a chaotic block cipher with external key and its improved version. CoRR abs/nlin/0608020 (2006) - [i13]Shujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Chen:
Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion. IACR Cryptol. ePrint Arch. 2006: 215 (2006) - 2005
- [j5]Chengqing Li, Shujun Li, Guanrong Chen, Gang Chen, Lei Hu:
Cryptanalysis of a New Signal Security System for Multimedia Data Transmission. EURASIP J. Adv. Signal Process. 2005(8): 1277-1288 (2005) - [j4]Shujun Li, Guanrong Chen, Xuanqin Mou:
On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps. Int. J. Bifurc. Chaos 15(10): 3119-3151 (2005) - [c9]Shujun Li, Elise de Doncker, Karlis Kaugars:
On Iterated Numerical Integration. International Conference on Computational Science (1) 2005: 123-130 - [c8]Elise de Doncker, Shujun Li, Yoshimitsu Shimizu, Junpei Fujimoto, Fukuko Yuasa:
Regularization and Extrapolation Methods for Infrared Divergent Loop Integrals. International Conference on Computational Science (1) 2005: 165-171 - [c7]Chengqing Li, Xinxiao Li, Shujun Li, Guanrong Chen:
Cryptanalysis of a multistage encryption system. ISCAS (2) 2005: 880-883 - [c6]Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen:
Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher. ISNN (2) 2005: 630-636 - [c5]Daniel Socek, Shujun Li, Spyros S. Magliveras, Borko Furht:
Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption. SecureComm 2005: 406-407 - [i12]Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang:
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA). CoRR abs/cs/0501013 (2005) - [i11]Shujun Li, Guanrong Chen, Albert Cheung, Bharat K. Bhargava, Kwok-Tung Lo:
On the Design of Perceptual MPEG-Video Encryption Algorithms. CoRR abs/cs/0501014 (2005) - [i10]Shujun Li, Guanrong Chen, Albert Cheung, Kwok-Tung Lo:
Cryptanalysis of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables. CoRR abs/cs/0509035 (2005) - [i9]Shujun Li, Kwok-Tung Lo:
Security Problems with Improper Implementations of Improved FEA-M. CoRR abs/cs/0509036 (2005) - [i8]Shujun Li:
Permutation Polynomials modulo m. CoRR abs/math/0509523 (2005) - [i7]Shujun Li, Guanrong Chen, Gonzalo Álvarez:
Return-Map Cryptanalysis Revisited. CoRR abs/nlin/0501018 (2005) - [i6]Shujun Li, Heung-Yeung Shum:
Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI. IACR Cryptol. ePrint Arch. 2005: 268 (2005) - 2004
- [j3]Gonzalo Álvarez, Shujun Li:
Breaking network security based on synchronized chaos. Comput. Commun. 27(16): 1679-1681 (2004) - [j2]Shujun Li, Guanrong Chen, Xuanqin Mou:
On the security of the Yi-Tan-Siew chaotic cipher. IEEE Trans. Circuits Syst. II Express Briefs 51-II(12): 665-669 (2004) - [c4]Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen:
Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme. PCM (3) 2004: 418-425 - [i5]Chengqing Li, Shujun Li, Xiaofeng Liao, Guanrong Chen:
Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher. CoRR abs/cs/0412103 (2004) - [i4]Shujun Li, Guanrong Chen, Kwok-Wo Wong, Xuanqin Mou, Yuanlong Cai:
Problems of Baptista's chaotic cryptosystems and countermeasures for enhancement of their overall performances. CoRR cs.CR/0402004 (2004) - [i3]Shujun Li, Guanrong Chen, Xuanqin Mou:
On the Security of the Yi-Tan-Siew Chaos-Based Cipher. CoRR cs.CR/0402054 (2004) - [i2]Shujun Li, Chengqing Li, Guanrong Chen, Nikolaos G. Bourbakis, Kwok-Tung Lo:
A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. IACR Cryptol. ePrint Arch. 2004: 374 (2004) - [i1]Shujun Li, Chengqing Li, Guanrong Chen, Kwok-Tung Lo:
Cryptanalysis of RCES/RSES Image Encryption Scheme. IACR Cryptol. ePrint Arch. 2004: 376 (2004) - 2003
- [j1]Shujun Li, Xuanqin Mou, Boliya L. Yang, Zhen Ji, Jihong Zhang:
Problems with a Probabilistic Encryption Scheme Based on Chaotic Systems. Int. J. Bifurc. Chaos 13(10): 3063-3077 (2003) - 2002
- [c3]Shujun Li, Xuan Zheng:
On the security of an image encryption method. ICIP (2) 2002: 925-928 - 2001
- [c2]Shujun Li, Qi Li, Wenmin Li, Xuanqin Mou, Yuanlong Cai:
Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding. IMACC 2001: 205-221 - [c1]Shujun Li, Xuanqin Mou, Yuanlong Cai:
Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography. INDOCRYPT 2001: 316-329
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 00:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint