Shujun Li
Orcid: 0000-0001-5628-7328
According to our database1,
Shujun Li
authored at least 176 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Effects of providing EFL learners with additional online and face-to-face practise opportunities to promote active learning in higher education.
J. Comput. Assist. Learn., June, 2024
When graph convolution meets double attention: online privacy disclosure detection with multi-label text classification.
Data Min. Knowl. Discov., May, 2024
Proc. ACM Hum. Comput. Interact., 2024
Recovering sign bits of DCT coefficients in digital images as an optimization problem.
J. Vis. Commun. Image Represent., 2024
A Survey of Artificial Intelligence-Related Cybersecurity Risks and Countermeasures in Mobility-as-a-Service.
IEEE Intell. Transp. Syst. Mag., 2024
A Comprehensive Study on GDPR-Oriented Analysis of Privacy Policies: Taxonomy, Corpus and GDPR Concept Classifiers.
CoRR, 2024
Detecting Machine-Generated Texts: Not Just "AI vs Humans" and Explainability is Complicated.
CoRR, 2024
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
AnoFed: Adaptive anomaly detection for digital health using transformer-based federated learning and support vector data description.
Eng. Appl. Artif. Intell., May, 2023
Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions.
DTRAP, 2023
A Survey of User Perspectives on Security and Privacy in a Home Networking Environment.
ACM Comput. Surv., 2023
The Use of Public Data and Free Tools in National CSIRTs' Operational Practices: A Systematic Literature Review.
CoRR, 2023
aedFaCT: Scientific Fact-Checking Made Easier via Semi-Automatic Discovery of Relevant Expert Opinions.
CoRR, 2023
Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on twitter.
Comput. Secur., 2023
Proceedings of the E-Business. Digital Empowerment for an Intelligent Future, 2023
Proceedings of the IEEE Symposium on Visualization for Cyber Security, 2023
Cyber Security Researchers on Online Social Networks: From the Lens of the UK's ACEs-CSR on Twitter.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2023
Cyber Security and Online Safety Education for Schools in the UK: Looking through the Lens of Twitter Data.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023
The Impact of Privacy and Security Attitudes and Concerns of Travellers on Their Willingness to Use Mobility-as-a-Service Systems.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023
Support or Refute: Analyzing the Stance of Evidence to Detect Out-of-Context Mis- and Disinformation.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023
Proceedings of the Intelligent Information Systems, 2023
2022
How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis.
EAI Endorsed Trans. Security Safety, 2022
Secur. Priv., 2022
"You Just Assume It Is In There, I Guess": Understanding UK Families' Application and Knowledge of Smart Home Cyber Security.
Proc. ACM Hum. Comput. Interact., 2022
Designing ECG monitoring healthcare system with federated transfer learning and explainable AI.
Knowl. Based Syst., 2022
Improving Performance of Automatic Keyword Extraction (AKE) Methods Using PoS-Tagging and Enhanced Semantic-Awareness.
CoRR, 2022
A Systematic Literature Review of the Tension between the GDPR and Public Blockchain Systems.
CoRR, 2022
Deepfake: Definitions, Performance Metrics and Standards, Datasets and Benchmarks, and a Meta-Review.
CoRR, 2022
A Comprehensive Survey of Natural Language Generation Advances from the Perspective of Digital Deception.
CoRR, 2022
Detection of Poisoning Attacks with Anomaly Detection in Federated Learning for Healthcare Applications: A Machine Learning Approach.
CoRR, 2022
"You Just Assume It Is In There, I Guess": UK Families' Application And Knowledge Of Smart Home Cyber Security.
CoRR, 2022
"Comments Matter and The More The Better!": Improving Rumor Detection with User Comments.
Proceedings of the IEEE International Conference on Trust, 2022
Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
Out of the Shadows: Analyzing Anonymous' Twitter Resurgence during the 2020 Black Lives Matter Protests.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
Proceedings of the Intelligent Robotics and Applications - 15th International Conference, 2022
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
"It was hard to find the words": Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
2021
ACM Trans. Comput. Hum. Interact., 2021
Audio steganography with less modification to the optimal matching CNV-QIM path with the minimal hamming distance expected value to a secret.
Multim. Syst., 2021
CoRR, 2021
Remote Sensing Image Change Detection Based on Fully Convolutional Network With Pyramid Attention.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2021
The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter.
Proceedings of the Workshop Proceedings of the 15th International AAAI Conference on Web and Social Media, 2021
Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
When Googling It Doesn't Work: The Challenge of Finding Security Advice for Smart Home Devices.
Proceedings of the Human Aspects of Information Security and Assurance, 2021
Detecting cyber security related Twitter accounts and different sub-groups: a multi-classifier approach.
Proceedings of the ASONAM '21: International Conference on Advances in Social Networks Analysis and Mining, Virtual Event, The Netherlands, November 8, 2021
2020
Human-Computer Interaction Series, Springer, ISBN: 978-3-030-45703-7, 2020
Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices.
IACR Cryptol. ePrint Arch., 2020
All about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks.
Comput. Secur., 2020
IEEE Access, 2020
Research on the Application of Blockchain Technology in the Field of Cross-border Logistics for Small and Medium-sized Enterprises.
Proceedings of the 19th Wuhan International Conference on E-Business, 2020
Tension between GDPR and Public Blockchains: A Data-Driven Analysis of Online Discussions.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020
When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020
From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
Proceedings of the 2nd IEEE International Conference on Decentralized Applications and Infrastructures, 2020
2019
IEEE Trans. Circuits Syst. I Regul. Pap., 2019
Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More?
EAI Endorsed Trans. Security Safety, 2019
When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks.
Comput. Secur., 2019
IEEE Access, 2019
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019
Proceedings of the Information and Communication Technologies in Tourism 2019, 2019
From Data Disclosure to Privacy Nudges: A Privacy-Aware and User-Centric Personal Data Management Framework.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019
A Socio-Technical and Co-evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs.
Secur. Commun. Networks, 2018
J. Vis. Commun. Image Represent., 2018
Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example.
Proceedings of the 9th International Conference on Social Media and Society, 2018
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Signal Process. Image Commun., 2017
Proceedings of the Ninth International Conference on Quality of Multimedia Experience, 2017
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
Simulating Human Detection of Phishing Websites: An Investigation into the Applicability of the ACT-R Cognitive Behaviour Architecture Model.
Proceedings of the 3rd IEEE International Conference on Cybernetics, 2017
Can Humans Detect the Authenticity of Social Media Accounts? On the Impact of Verbal and Non-Verbal Cues on Credibility Judgements of Twitter Profiles.
Proceedings of the 3rd IEEE International Conference on Cybernetics, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
EURASIP J. Wirel. Commun. Netw., 2016
"Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law.
CoRR, 2016
Proceedings of the 2016 IEEE International Conference on Robotics and Biomimetics, 2016
2015
On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices.
IEEE Trans. Inf. Forensics Secur., 2015
Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks.
Pervasive Mob. Comput., 2015
Proceedings of the Advanced Concepts for Intelligent Vision Systems, 2015
2014
A novel image restoration scheme based on structured side information and its application to image watermarking.
Signal Process. Image Commun., 2014
Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms.
Int. J. Multim. Data Eng. Manag., 2014
IACR Cryptol. ePrint Arch., 2014
Enhanced perceptual image authentication with tamper localization and self-restoration.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014
Proceedings of the Computers Helping People with Special Needs, 2014
2013
Proceedings of the 2013 IEEE International Symposium on Multimedia, 2013
Proceedings of the IEEE International Conference on Image Processing, 2013
2012
Proceedings of the Autonomous Systems: Developments and Trends, 2012
Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks.
IACR Cryptol. ePrint Arch., 2012
An objective method of measuring texture preservation for camcorder performance evaluation.
Proceedings of the Image Quality and System Performance IX, 2012
Proceedings of the Communications and Multimedia Security, 2012
Proceedings of the 14th Meeting on Algorithm Engineering & Experiments, 2012
2011
Proceedings of the Chaos-Based Cryptography - Theory, Algorithms and Applications, 2011
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Symposium On Usable Privacy and Security, 2011
Captchæcker: Reconfigurable CAPTCHAs based on automated security and usability analysis.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011
Building multimedia security applications in the MPEG reconfigurable video coding (RVC) framework.
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011
Proceedings of the 18th IEEE International Conference on Image Processing, 2011
hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers.
Proceedings of the Financial Cryptography and Data Security, 2011
2010
J. Syst. Softw., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the International Conference on Image Processing, 2010
Proceedings of IEEE International Conference on Communications, 2010
A method for automatic routing based on comprehensive evaluation on limiting conditions of maneuverability.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Image Vis. Comput., 2009
Int. J. Bifurc. Chaos, 2009
IACR Cryptol. ePrint Arch., 2009
Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps
CoRR, 2009
CoRR, 2009
Breaking a new substitution-diffusion based image cipher using chaotic standard and logistic maps
CoRR, 2009
Proceedings of the Advances in Image and Video Technology, Third Pacific Rim Symposium, 2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
Proceedings of the International Forum on Information Technology and Applications, 2009
Proceedings of the 2009 eCrime Researchers Summit, 2009
2008
IEEE Trans. Circuits Syst. Video Technol., 2008
IEEE Trans. Circuits Syst. I Regul. Pap., 2008
A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks.
Signal Process. Image Commun., 2008
2007
IEEE Trans. Circuits Syst. Video Technol., 2007
J. Syst. Softw., 2007
CoRR, 2007
CoRR, 2007
Comput. Biol. Medicine, 2007
2006
Scalable Comput. Pract. Exp., 2006
Erratum to "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)" [The Journal of Systems and Software 79 (2006) 253-258].
J. Syst. Softw., 2006
J. Syst. Softw., 2006
Int. J. Comput. Intell. Appl., 2006
Int. J. Bifurc. Chaos, 2006
CoRR, 2006
Proceedings of the Computational Science and Its Applications, 2006
2005
Int. J. Bifurc. Chaos, 2005
Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI.
IACR Cryptol. ePrint Arch., 2005
EURASIP J. Adv. Signal Process., 2005
CoRR, 2005
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005
Proceedings of the Computational Science, 2005
2004
IEEE Trans. Circuits Syst. II Express Briefs, 2004
Problems of Baptista's chaotic cryptosystems and countermeasures for enhancement of their overall performances
CoRR, 2004
CoRR, 2004
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004
2003
Int. J. Bifurc. Chaos, 2003
2002
Proceedings of the 2002 International Conference on Image Processing, 2002
2001
Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography.
Proceedings of the Progress in Cryptology, 2001
Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding.
Proceedings of the Cryptography and Coding, 2001