Cyberspace of Shujun LI

Shortcuts

Categories

Books Journal Special Issue Edited emotion icon Peer-Reviewed Papers PhD Theses Book Chapters Preprints emotion icon Technical Reports Standardization Contributions Patents emotion icon Magazine/E-Letter Articles Other Early Papers emotion icon Scientific Software

Regarding Copyrights

The fulltext versions of publications posted here are the author's versions of the works. They are not for redistribution. For the definitive versions of the publications, follow the citation information and the hyperlink of each publication (which is formatted using the permanent DOI URL). If you want to reuse copyrighted material from any publication, contact the corresponding copyright owner. Note that many publications contain a detailed copyright declaration, which you should read carefully. This note will not be repeated below to avoid unnecessary redundancies.

Books

Monography

Cognitive Modeling for Automated Human Performance Evaluation at Scale Haiyue Yuan, Shujun Li and Patrice Rusconi, Cognitive Modeling for Automated Human Performance Evaluation at Scale (@Springer.com), part of Human–Computer Interaction Series book series (HCIS) and of SpringerBriefs in Human-Computer Interaction book sub series (BRIEFSHUMAN), ISBN 978-3-030-45704-4, 2020 BibTeX © Authors, under exclusive license to Springer

Edited Technical Books

Handbook of Digital Forensics of Multimedia Data and DevicesAnthony T. S. Ho and Shujun Li (Editors), Handbook of Digital Forensics of Multimedia Data and Devices (e-book @ MyLibrary; e-book @ Wiley, Apple iBooks, e-book @ Google Books, book @ Amazon), 680 pp. (e-book 704 pages), 16 chapters, ISBN: 978-1-118-64050-0 (e-book ISBN: 978-1-118-70579-7), September 2015 (Companion Website) BibTeX © John Wiley & Sons, Inc. and IEEE Press
LaTeX入门与提高陈志杰、赵书钦、李树钧、万福永,《LATEX入门与提高》(第二版),高等教育出版社,中国北京,2006年5月,ISBN:7-04-019379-5,238页,附ChinaTEX CD版光盘(20060111版)一张,定价:人民币44.8元 [在线销售地址]
Zhijie Chen, Shuqin Zhao, Shujun Li, Fuyong Wan, LATEX: From a Starter to a Master, 2nd edition, Higher Education Press, Beijing, China, May 2006, ISBN: 7-04-019379-5, 238 pages, with a ChinaTEX CD (built on 20060111), price: RMB 44.8 [online sale link]

Edited Conference Proceedings

The Seventh International Conference on Safety and Security with IoT: SaSeIoT 2023 Kim Phuc Tran, Shujun Li, Cédric Heuchenne and Thu Huong Truong (Editors), The Seventh International Conference on Safety and Security with IoT: SaSeIoT 2023, EAI/Springer Innovations in Communication and Computing (EAISICC), 2024 © Springer
Security and Privacy in Social Networks and Big Data: 9th International Symposium, SocialSec 2023, Canterbury, UK, August 14–16, 2023, Proceedings Budi Arief, Anna Monreale, Michael Sirivianos and Shujun Li (Editors), Security and Privacy in Social Networks and Big Data: 9th International Symposium, SocialSec 2023, Canterbury, UK, August 14–16, 2023, Proceedings, Lecture Notes in Computer Science (LNCS), volume 14097, 2023 © Springer
Network and System Security: 17th International Conference, NSS 2023, Canterbury, UK, August 14–16, 2023, ProceedingsShujun Li, Mark Manulis and Atsuko Miyaji (Editors), Network and System Security: 17th International Conference, NSS 2023, Canterbury, UK, August 14–16, 2023, Proceedings, Lecture Notes in Computer Science (LNCS), volume 13983, 2023 © Springer
Information and Communications Security: 24th International Conference, ICICS 2022, Canterbury, UK, September 5–8, 2022, ProceedingsCristina Alcaraz, Liqun Chen, Shujun Li and Pierangela Samarati (Editors), Information and Communications Security: 24th International Conference, ICICS 2022, Canterbury, UK, September 5–8, 2022, Proceedings, Lecture Notes in Computer Science (LNCS), volume 13407, 2022 © Springer
Security and Privacy in Communication Networks: 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part IJoaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar and Moti Yung (Editors), Security and Privacy in Communication Networks: 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part I, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), volume 398, 2021 © Springer
Security and Privacy in Communication Networks: 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part IIJoaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar and Moti Yung (Editors), Security and Privacy in Communication Networks: 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part II, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), volume 399, 2021 © Springer
Computer Security: ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020, Revised Selected PapersIoana Boureanu, Constantin Cătălin Drăgan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, Panagiotis Gouvas, Roger A. Hallman, Shujun Li, Victor Chang, Frank Pallas, Jörg Pohle and Angela Sasse (Editors), Computer Security: ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020, Revised Selected Papers (MPS 2020 @ ESORICS 2020), Lecture Notes in Computer Science (LNCS), volume 12580, 2020 © Springer
Proceedings of the 2nd International Workshop on Multimedia Privacy and SecurityRoger A. Hallman, Shujun Li and Victor Chang (Editors), Proceedings of the 2nd International Workshop on Multimedia Privacy and Security (MPS 2018 @ ACM CCS 2018), 2018 © ACM

Peer-Reviewed Papers

Note: The underlined names like "Shujun Li" and "Gonzalo Alvarez" denote corresponding authors (and presenters as well in case of conference papers). For MPEG standardization contributions, the underlined names include principal contributor(s)/editors and the presenter(s).

In Press

  1. Zhichao You, Xuewen Dong, Shujun Li, Ximeng Liu, Siqi Ma and Yulong Shen, "Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy," accepted to IEEE Transactions on Information Forensics & Security in November 2024 © IEEE

2024

  1. Nandita Pattnaik, Shujun Li and Jason R. C. Nurse, "Security and privacy perspectives of people living in shared home environments," Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 8, Issue CSCW2, Article Number 368, 39 pages, ACM, 2024, accepted to CSCW 2024 (27th ACM Conference on Computer-Supported Cooperative Work and Social Computing) BibTeX PDF arXiv.org Kent Academic Repository (KAR) Open Access © Authors
  2. Kai-Fung Chu, Haiyue Yuan, Jinsheng Yuan, Weisi Guo, Nazmiye Balta-Ozkan and Shujun Li, "A Survey of AI-Related Cyber Security Risks and Countermeasures in Mobility-as-a-Service," IEEE Intelligent Transportation Systems Magazine, Volume 16, Issue 6, pp. 37-55, 2024 BibTeX arXiv.org © IEEE
  3. Zhanbo Liang, Jie Guo, Weidong Qiu, Zheng Huang and Shujun Li, "When Graph Convolution Meets Double Attention: Online Privacy Disclosure Detection with Multi-Label Text Classification," Data Mining and Knowledge Discovery, Volume 38, pp. 1171-1192, 2024, Springer, to be presented at ECML-PKDD 2024 (36th European Conference on Machine Learning & 28th European Conference on Principles and Practice of Knowledge Discovery in Databases) in September 2024 BibTeX PDF arXiv.org Kent Academic Repository Open Access GitHub © Authors
  4. Ruiyuan Lin, Sheng Liu, Jun Jiang, Shujun Li, Chengqing Li and C.-C. Jay Kuo, "Recovering sign bits of DCT coefficients in digital images as an optimization problem," Journal of Visual Communication and Image Representation, Volume 98, Article Number 104045, 14 pages, 2024, Elsevier Inc. BibTeX PDF arXiv.org Kent Academic Repository Open Access GitHub © Authors
  5. Enes Altuncu, Virginia N. L. Franqueira and Shujun Li, "Deepfake: Definitions, Performance Metrics and Standards, Datasets, and a Meta-Review," Frontiers in Big Data, Section of Cybersecurity and Privacy as part of the Research Topic "Cybersecurity and Artificial Intelligence: Advances, Challenges, Opportunities, Threats", Volume 7, 23 page, Frontiers Media S.A., 2024 BibTeX PDF arXiv.org Open Access © authors
  6. Ali Alderete Peralta, Nazmiye Balta-Ozkan and Shujun Li, "The road not taken yet: A review of cyber security risks in mobility-as-a-service (MaaS) ecosystems and a research agenda," Research in Transportation Business & Management, Volume 56, Article Number 101162, 20 pages, 2024, Elsevier Ltd BibTeX © Authors

2023

  1. Nandita Pattnaik, Shujun Li and Jason R.C. Nurse, "A Survey of User Perspectives on Security and Privacy in a Home Networking Environment," ACM Computing Surveys, Volume 55, Number 9, Article Number 180, 38 pages, 2023, ACM BibTeX PDF arXiv.org Kent Academic Repository Open Access © Authors
  2. Nandita Pattnaik, Shujun Li and Jason R.C. Nurse, "Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on Twitter," Computers & Security, Volume 125, Article Number 103008, 15 pages, 2023, Elsevier Science B. V. BibTeX PDF arXiv.org Kent Academic Repository Open Access © Authors
  3. Rahime Belen Sağlam, Enes Altuncu, Yang Lu and Shujun Li, "A Systematic Literature Review of the Tension between the GDPR and Public Blockchain Systems," Blockchain: Research and Applications, Volume 4, Number 2, Article Number 100129, 23 pages, 2023, Elsevier Science B. V. on behalf of Zhejiang University Press BibTeX PDF arXiv.org Kent Academic Repository Open Access © Authors
  4. Ali Raza, Kim Phuc Tran, Ludovic Koehl and Shujun Li, "AnoFed: Adaptive anomaly detection for digital health using transformer-based federated learning and support vector data description," Engineering Applications of Artificial Intelligence, Volume 121, Article Number 106051, 16 pages, 2023 BibTeX PDF Kent Academic Repository © Elsevier Science B. V.
  5. Sharifah Roziah Binti Mohd Kassim, Shujun Li and Budi Arief, "Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions," Digital Threats: Research and Practice, Volume 4, Number 3, Article Number 45, 24 pages, ACM BibTeX PDF Kent Academic Repository Open Access © Authors

2022

  1. Sarah Turner, Nandita Pattnaik, Jason R. C. Nurse and Shujun Li, "“You just assume it is in there, I guess”: Understanding UK families' application and knowledge of smart home cyber security," Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 6, Number CSCW2, Article Number 269, 34 pages, ACM, 2022, presented at CSCW 2022 (25th ACM Conference on Computer-Supported Cooperative Work and Social Computing) BibTeX PDF arXiv.org Kent Academic Repository (KAR) © Authors
  2. Yang Lu and Shujun Li, "From Data Flows to Privacy-Benefit Trade-offs: A User-Centric Semantic Model," Security and Privacy, Volume 5, Issue 4, Article Number e225, 24 pages, John Wiley & Sons, Inc., 2022 BibTeX PDF Kent Academic Repository Open Access © Authors
  3. Yang Lu, Shujun Li, Alex Freitas and Athina Ioannou, "How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis," EAI Endorsed Transactions on Security and Safety, Volume 8, Issue 30, Article Number e3, 20 pages, EAI, 2022, DOI: 10.4108/eai.21-12-2021.172440 BibTeX PDF Kent Academic Repository Open Access © Authors
  4. Ali Raza, Kim Phuc Tran, Ludovic Koehl and Shujun Li, "Designing ECG monitoring healthcare system with federated transfer learning and explainable AI," Knowledge-Based Systems, Volume 236, Article Number 107763, 17 pages, 2022 BibTeX PDF arXiv.org Kent Academic Repository © Elsevier Science B. V.
  5. Sharifah Roziah Binti Mohd Kassim, Shujun Li and Budi Arief, "How National CSIRTs Leverage Public Data, OSINT and Free Tools in Operational Practices: An Empirical Study," Cyber Security: A Peer-Reviewed Journal, Volume 5, Number 3, pp. 251-276, 2022 BibTeX PDF Kent Academic Repository © Henry Stewart Publications LLP
  6. Sharifah Roziah Binti Mohd Kassim, Shujun Li and Budi Arief, "Incident Response Practices Across National CSIRTs: Results from an Online Survey," OIC-CERT Journal of Cyber Security, Volume 4, Issue 1, pp. 67-84, 2022 BibTeX PDF Open Access © OIC-CERT

2021

  1. Haiyue Yuan, Shujun Li and Patrice Rusconi, "CogTool+: Modeling Human Performance at Large Scale," ACM Transactions on Computer-Human Interaction, Volume 28, Number 2, Article Number 7, 38 pages, ACM, 2021 BibTeX PDF Kent Academic Repository Ex Libris, University of Surrey Open Access GitHub © Authors
  2. Athina Ioannou, Iis Tussyadiah, Graham Miller, Shujun Li and Mario Weick, "Privacy nudges for disclosure of personal information: A systematic literature review and meta-analysis," PLoS ONE, Volume 16, Number 8, Article Number e0256822, 29 pages, PLoS, 2021 BibTeX PDF Kent Academic Repository Open Access © Authors

2020

  1. Çağrı B. Aslan, Shujun Li, Fatih V. Çelebi and Hao Tian, "The World of Defacers: Looking through the Lens of Their Activities on Twitter," IEEE Access, Volume 8, pp. 204132-204143, IEEE, 2020 BibTeX PDF Kent Academic Repository Open Access © Authors
  2. Carlos Javier Hernández-Castro, Shujun Li and María D. R-Moreno, "All About Uncertainties and Traps: Statistical Oracle-based Attacks on a New CAPTCHA Protection Against Oracle Attacks," Computers & Security, Volume 92, Article Number 101758, 12 pages, 2020 BibTeX PDF Kent Academic Repository © Elsevier Science B. V.

2019

  1. Chengqing Li, Bingbing Feng, Shujun Li, Jürgen Kurths and Guanrong Chen, "Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks," IEEE Transactions on Circuits and Systems I: Regular Papers, Volume 66, Number 6, pp. 2322-2335, 2019 BibTeX PDF Kent Academic Repository (2022 IEEE Transactions on Circuits and Systems Guillemin-Cauer Best Paper Award: 1 out of 3000+) © IEEE
  2. Ximing Liu, Yingjiu Li, Robert H. Deng, Bing Chang and Shujun Li, "When Human Cognitive Modeling Meets PINs: User-Independent Inter-Keystroke Timing Attacks," Computers & Security, Volume 80, pp. 90-107, 2019 BibTeX PDF arXiv.org Kent Academic Repository © Elsevier Science B. V.
  3. Zichi Wang, Shujun Li and Xinpeng Zhang, "Towards Improved Steganalysis: When Cover Selection is Used in Steganography," IEEE Access, Volume 7, pp. 168914-168921, IEEE, 2019 BibTeX PDF Kent Academic Repository Open Access © Authors
  4. Yang Lu, Athina Ioannou, Iis Tussyadiah and Shujun Li, "Segmenting travelers based on responses to nudging for information disclosure," e-Review of Tourism Research (second website), Volume 17, Number 3, pp. 394-406, 2019, part of research notes accepted to ENTER 2020 (27th IFITT International eTourism Conference) BibTeX PDF Kent Academic Repository Open Access © e-Review of Tourism Research
  5. Saeed Alqahtani, Shujun Li, Haiyue Yuan and Patrice Rusconi, "Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More?", EAI Endorsed Transactions on Security and Safety, Volume 6, Number 21, Article e1, 15 pages, EAI, 2019 BibTeX PDF Kent Academic Repository Open Access © Authors

2018

2017

  1. Simying Ong, Shujun Li, KokSheik Wong and KuanYew Tan, "Fast Recovery of Unknown Coefficients in DCT-Transformed Images," Signal Processing: Image Communication, Volume 58, pp. 1-13, 2017 BibTeX PDF Kent Academic Repository © Elsevier Science B. V.

2016

2015

  1. Hassan Jameel Asghar, Ron Steinfeld, Shujun Li, Mohamed Ali Kaafar and Josef Pieprzyk, "On the Linearization of Human Identification Protocols: Attacks based on Linear Algebra, Coding Theory and Lattices," IEEE Transactions on Information Forensics and Security, Volume 10, Number 8, pp. 1643-1655, 2015 [Full Edition: IACR ePrint 2014/767] BibTeX PDF © IEEE
  2. Mario Čagalja, Toni Perković, Marin Bugarić and Shujun Li, "Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks," Pervasive and Mobile Computing, Volume 20, pp. 64-81, 2015 BibTeX PDF © Elsevier Science B. V.

2014

  1. Roland Schmitz, Shujun Li, Christos Grecos and Xinpeng Zhang, "Towards Robust Invariant Commutative Watermarking-Encryption based on Image Histograms," International Journal of Multimedia Data Engineering and Management (IJMDEM), Volume 5, Number 4, pp. 36-52, 2014 BibTeX PDF © IGI Global
  2. Hui Wang, Anthony TS Ho and Shujun Li, "A Novel Image Restoration Scheme Based on Structured Side Information and Its Application to Image Watermarking," Signal Processing: Image Communication, Volume 29, Number 7, pp. 773-787, 2014 BibTeX PDF © Elsevier Science B. V.

2013

  1. Junaid Jameel Ahmad, Shujun Li, Richard Thavot and Marco Mattavelli, "Secure Computing with the MPEG RVC Framework," Signal Processing: Image Communication, Volume 28, Number 10 (special issue on Recent Advances on MPEG Codec Configuration Framework), pp. 1315-1334, 2013 BibTeX PDF © Elsevier Science B. V.
  2. Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk and Huaxiong Wang, "Cryptanalysis of the Convex Hull Click Human Identification Protocol," International Journal of Information Security, Volume 12, Number 2, pp. 83-96, 2013 BibTeX PDF © Springer

2012

2011

  1. Roland Schmitz and Shujun Li, "Neue Entwicklungen in der e-Banking Security," ("Recent Developments in e-Banking Security,") PIK - Praxis der Informationsverarbeitung und Kommunikation, Volume 34, Number 4, pp. 176-184, 2011 BibTeX © Walter de Gruyter GmbH & Co. KG
  2. Chengqing Li, Shujun Li and Kwok-Tung Lo, "Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps," Communications in Nonlinear Science and Numerical Simulation, Volume 16, Number 2, pp. 837-843, 2011 BibTeX PDF © Elsevier Science B. V.
  3. David Arroyo, Gonzalo Alvarez, José María Amigó and Shujun Li, "Cryptanalysis of a family of self-synchronizing chaotic stream ciphers," Communications in Nonlinear Science and Numerical Simulation, Volume 16, Number 2, pp. 805-813, 2011 BibTeX PDF © Elsevier Science B. V.

2010

  1. Chengqing Li, Shujun Li, Kwok-Tung Lo and Kyandoghere Kyamakya, "A differential cryptanalysis of Yen-Chen-Wu multimedia cryptography system," Journal of Systems and Software, Volume 83, Number 8, pp. 1443-1452, 2010 BibTeX PDF © Elsevier Science B. V.
  2. A.B. Orue, G. Alvarez, G. Pastor, M. Romera, F. Montoya and Shujun Li, "A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis," Communications in Nonlinear Science and Numerical Simulation, Volume 15, Number 11, pp. 3471-3483, 2010 BibTeX PDF © Elsevier Science B. V.
  3. David Arroyo, Shujun Li, Gonzalo Alvarez, José María Amigó and Rhouma Rhouma, "Comments on 'Image encryption with chaotically coupled chaotic maps'," Physica D: Nonlinear Phenomena, Volume 239, Number 12, pp. 1002-1006, 2010 BibTeX PDF © Elsevier Science B. V.

2009

  1. Rhouma Rhouma, Ercan Solak, David Arroyo, Shujun Li, Gonzalo Alvarez and Safya Belghitha, "Comment on “Modified Baptista type chaotic cryptosystem via matrix secret key” [Phys. Lett. A 372 (2008) 5427]," Physics Letters A, Volume 373, Number 37, pp. 3398-3400, 2009 BibTeX PDF © Elsevier Science B. V.
  2. A.B. Orue, V. Fernandez, G. Alvarez, G. Pastor, M. Romera, F. Montoya, C. Sanchez-Avila and Shujun Li, "Breaking a SC-CNN-based Chaotic Masking Secure Communication System," International Journal of Bifurcation and Chaos, Volume 19, Number 4, pp. 1329-1338, 2009 BibTeX PDF © World Scientific Publishing Co.
  3. David Arroyo, Gonzalo Alvarez, Shujun Li, Chengqing Li and Veronica Fernandez, "Cryptanalysis of a New Chaotic Cryptosystem Based on Ergodicity," International Journal of Modern Physics B, Volume 23, Number 5, pp. 651-659, 2009 BibTeX PDF © World Scientific Publishing Co.
  4. David Arroyo, Chengqing Li, Shujun Li, Gonzalo Alvarez and Wolfgang A. Halang, "Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm," Chaos, Solitons & Fractals, Volume 41, Number 5, pp. 2613-2616, 2009 BibTeX PDF © Elsevier Science B. V.
  5. G. Alvarez and Shujun Li, "Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption," Communications in Nonlinear Science and Numerical Simulation, Volume 14, Number 11, pp. 3743-3749, 2009 BibTeX PDF © Elsevier Science B. V.
  6. Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez and Guanrong Chen, "On the security defects of an image encryption scheme," Image and Vision Computing, Volume 27, Number 9, pp. 1371-1381, 2009 BibTeX PDF © Elsevier Science B. V.
  7. Chengqing Li, Shujun Li, Guanrong Chen and Wolfgang A. Halang, "Cryptanalysis of an image encryption scheme based on a compound chaotic sequence," Image and Vision Computing, Volume 27, Number 8, pp. 1035-1039, 2009 BibTeX PDF © Elsevier Science B. V.
  8. David Arroyo, Chengqing Li, Shujun Li, Gonzalo Alvarez, "Cryptanalysis of a computer cryptography scheme based on a filter bank," Chaos, Solitons & Fractals, Volume 41, Number 1, pp. 410-413, 2009 BibTeX PDF © Elsevier Science B. V.

2008

  1. David Arroyo, Rhouma Rhouma, Gonzalo Alvarez, Shujun Li and Veronica Fernandez, "On the security of a new image encryption scheme based on chaotic map lattices," Chaos, Volume 18, Number 3, art. Number 033112, 2008 BibTeX PDF © AIP
  2. A.B. Orue, V. Fernandez, G. Alvarez, G. Pastor, M. Romera, Shujun Li and F. Montoya, "Determination of the parameters for a Lorenz system and application to break the security of two-channel chaotic cryptosystems," Physics Letters A, Volume 372, Number 34, pp. 5588-5592, 2008 BibTeX PDF © Elsevier Science B. V.
  3. Shujun Li, Chengqing Li, Guanrong Chen and Kwok-Tung Lo, "Cryptanalysis of the RCES/RSES image encryption scheme," Journal of Systems and Software, Volume 81, Number 7, pp. 1130-1143, 2008 BibTeX PDF © Elsevier Science B. V.
  4. Shujun Li, Chengqing Li, Kwok-Tung Lo and Guanrong Chen, "Cryptanalyzing an Encryption Scheme Based on Blind Source Separation," IEEE Transactions on Circuits and Systems-I: Regular Papers, Volume 55, Number 4, pp. 1055-1063, 2008 BibTeX PDF © IEEE
  5. Shujun Li, Chengqing Li, Guanrong Chen, Nikolaos G. Bourbakis and Kwok-Tung Lo, "A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks," Signal Processing: Image Communication, Volume 23, Number 3, pp. 212-223, 2008 BibTeX PDF © Elsevier Science B. V.
  6. Shujun Li, Chengqing Li, Kwok-Tung Lo and Guanrong Chen, "Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion," IEEE Transactions on Circuits and Systems for Video Technology, Volume 18, Number 3, pp. 338-349, 2008 (Regular Transaction Paper) BibTeX PDF © IEEE
  7. Chengqing Li, Shujun Li, Gonzalo Álvarez, Guanrong Chen and Kwok-Tung Lo, "Cryptanalysis of a chaotic block cipher with external key and its improved version," Chaos, Solitons & Fractals, Volume 37, Number 1, pp. 299-307, 2008 BibTeX PDF © Elsevier Science B. V.
  8. David Arroyo, Gonzalo Alvarez, Shujun Li, Chengqing Li and Juana Nunez, "Cryptanalysis of a discrete-time synchronous chaotic encryption system," Physics Letters A, Volume 372, Number 7, pp. 1034-1039, 2008 BibTeX PDF © Elsevier Science B. V.

2007

  1. Chengqing Li, Shujun Li, Gonzalo Álvarez, Guanrong Chen and Kwok-Tung Lo, "Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations," Physics Letters A, Volume 369, Number 1-2, pp. 23-30, 2007 BibTeX PDF © Elsevier Science B. V.
  2. Shujun Li, Guanrong Chen, Albert Cheung, Bharat Bhargava and Kwok-Tung Lo, "On the Design of Perceptual MPEG-Video Encryption Algorithms," IEEE Transactions on Circuits and Systems for Video Technology, Volume 17, Number 2, pp. 214-223, 2007 (Regular Transaction Paper) BibTeX PDF © IEEE
  3. Gonzalo Álvarez, Shujun Li and Luis Hernandez, "Analysis of security problems in a medical image encryption system," Computers in Biology and Medicine, Volume 37, Number 3, pp. 424-427, 2007 BibTeX PDF © Elsevier Science B. V.
  4. Shujun Li and Kwok-Tung Lo, "Security problems with improper implementations of improved FEA-M," Journal of Systems and Software, Volume 80, Number 5, pp. 791-794, 2007 BibTeX PDF erratum © Elsevier Science B. V.

2006

  1. Shujun Li, Chengqing Li, Kwok-Tung Lo and Guanrong Chen, "Cryptanalysis of an image encryption scheme," Journal of Electronic Imaging, Volume 15, Number 4, Article Number 043012, 13 pages, 2006 BibTeX PDF © SPIE
  2. Gonzalo Álvarez and Shujun Li, "Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems," International Journal of Bifurcation and Chaos (Tutorial-Review Section), Volume 16, Number 8, pp. 2129-2151, 2006 BibTeX PDF erratum © World Scientific Publishing Co.
  3. Shujun Li, Guanrong Chen and Gonzalo Álvarez, "Return-Map Cryptanalysis Revisited," International Journal of Bifurcation and Chaos, Volume 16, Number 5, pp. 1557-1568, 2006 BibTeX PDF © World Scientific Publishing Co.
  4. Gonzalo Álvarez and Shujun Li, "Breaking an encryption scheme based on chaotic Baker map," Physics Letters A, Volume 352, Number 1-2, pp. 78-82, 2006 BibTeX PDF © Elsevier Science B. V.
  5. Chengqing Li, Shujun Li, Der-Chyuan Lou and Dan Zhang, "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)", Journal of Systems and Software, Volume 79, Number 2, pp. 253-258, 2006 BibTeX PDF erratum © Elsevier Science B. V.
  6. Chengqing Li, Shujun Li, Guanrong Chen and Dan Zhang, "Cryptanalysis of a data security protection scheme for VoIP," IEE Proceedings - Vision, Image & Signal Processing (now succeeded by IET Image Processing, IET Signal Processing and IET Computer Vision), Volume 153, Number 1, pp. 1-10, 2006 BibTeX PDF © IET (former IEE)

2005

  1. Shujun Li, Guanrong Chen and Xuanqin Mou, "On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps," International Journal of Bifurcation and Chaos (Tutorial-Review Section), Volume 15, Number 10, pp. 3119-3151, 2005 BibTeX PDF erratum © World Scientific Publishing Co.
  2. Kwok-wo Wong, Kwan-Pok Man, Shujun Li and Xiaofeng Liao, "A More Secure Chaotic Cryptographic Scheme based on the Dynamic Look-up Table," Circuits, Systems & Signal Processing, Volume 24, Number 5, pp. 571-584, 2005 BibTeX PDF © Birkhäuser Boston Inc. (Part of Springer)
  3. Gonzalo Álvarez, Luis Hernández, Jaime Muñóz, Fausto Montoya and Shujun Li, "Security analysis of communication system based on the synchronization of different order chaotic systems," Physics Letters A, Volume 345, Number 4-6, pp. 245-250, 2005 BibTeX PDF © Elsevier Science B. V.
  4. Chengqing Li, Shujun Li, Guanrong Chen, Gang Chen and Lei Hu, "Cryptanalysis of a New Signal Security System for Multimedia Data Transmission," EURASIP Journal on Applied Signal Processing, Volume 2005, Number 8, pp. 1277-1288, 2005 BibTeX PDF Open Access © Hindawi Publishing Corporation
  5. Shujun Li, Gonzalo Álvarez, Guanrong Chen and Xuanqin Mou, "Breaking a chaos-noise-based secure communication scheme," Chaos, Volume 15, Number 1, Article Number 013703, 10 pages, 2005 BibTeX PDF erratum © AIP
  6. Shujun Li, Gonzalo Álvarez and Guanrong Chen, "Breaking a chaos-based secure communication scheme designed by an improved modulation method," Chaos, Solitons & Fractals, Volume 25, Number 1, pp. 109-120, 2005 BibTeX PS erratum © Elsevier Science B. V.
  7. G. Álvarez, Shujun Li, F. Montoya, G. Pastor and M. Romera, "Breaking projective chaos synchronization secure communication using filtering and generalized synchronization," Chaos, Solitons & Fractals, Volume 24, Number 3, pp. 775-783, 2005 BibTeX PDF © Elsevier Science B. V.

2004

  1. Shujun Li, Guanrong Chen and Xuanqin Mou, "On the Security of the Yi-Tan-Siew Chaotic Cipher," IEEE Transactions on Circuits and Systems-II: Express Briefs, Volume 51, Number 12, pp. 665-669, 2004 BibTeX PDF © IEEE
  2. Shujun Li, Guanrong Chen, Kwok-Wo Wong, Xuanqin Mou and Yuanlong Cai, "Baptista-type chaotic cryptosystems: problems and countermeasures," Physics Letters A, Volume 332, Number 5-6, pp. 368-375, 2004 BibTeX PDF © Elsevier Science B. V.
  3. Gonzalo Álvarez and Shujun Li, "Breaking network security based on synchronized chaos," Computer Communications, Volume 27, Number 16, pp. 1679-1681, 2004 BibTeX PDF © Elsevier Science B. V.

2003

  1. Shujun Li, Xuanqin Mou, Boliya L. Yang, Zhen Ji and Jihong Zhang, "Problems with a Probabilistic Encryption Scheme Based on Chaotic Systems," International Journal of Bifurcation and Chaos, Volume 13, Number 10, pp. 3063-3077, 2003 BibTeX PDF © World Scientific Publishing Co.
  2. Shujun Li, Xuanqin Mou, Yuanlong Cai, Zhen Ji and Jihong Zhang, "On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision," Computer Physics Communications, Volume 153, Number 1, pp. 52-58, 2003 BibTeX PDF © Elsevier Science B. V.
  3. Shujun Li, Xuanqin Mou, Zhen Ji, Jihong Zhang and Yuanlong Cai, "Performance analysis of Jakimoski-Kocarev attack on a class of chaotic cryptosystems," Physics Letters A, Volume 307, Number 1, pp. 22-28, 2003 BibTeX PDF erratum © Elsevier Science B. V.
  4. Shujun Li, Xuanqin Mou, Zhen Ji and Jihong Zhang, "Cryptanalysis of a Class of Chaotic Stream Ciphers (一类混沌流密码的分析)," Journal of Electronics & Information Technology (《电子与信息学报》), Volume 25, Number 4, pp. 473-478, 2003 PDF Open Access © Institute of Electronics, Chinese Academy of Sciences (中科院电子所)

2002

2001

  1. Shujun Li, Xuanqin Mou and Yuanlong Cai, "Improving security of a chaotic encryption approach," Physics Letters A, Volume 290, Number 3-4, pp. 127-133, 2001 BibTeX PDF © Elsevier Science B. V.

Reports

Book Chapters

  1. 李树钧、卢扬,“人工智能与网络空间安全:黑(攻)与白(防)? ”,《人工智能与未来社会发展》第八章,郭毅可主编,119-156页,2020年出版 © 科学技术文献出版社
    (Shujun Li and Yang Lu, "AI and Cyber Security: Black (Offence) and White (Defence)?" Chapter 8 of AI and Its Impact on Future Society, edited by Yi-Ke Guo, pp. 119-156, 2020 © Scientific and Technical Documentation Press)
  2. Roland Schmitz, Shujun Li, Christos Grecos and Xinpeng Zhang, "Commutative Watermarking-Encryption of Multimedia Data Based on Histograms," Chapter 6 of Intelligent Innovations in Multimedia Data Engineering and Management, edited by Siddhartha Bhattacharyya, pp. 141-163, 2018 BibTeX © IGI Global
  3. Shujun Li and Anthony T.S. Ho, "Digital Forensics Laboratories in Operation: How are Multimedia Data and Devices Handled?" Chapter 1 of Handbook of Digital Forensics of Multimedia Data and Devices, edited by Anthony T.S. Ho and Shujun Li, pp. 3-37, 2015 BibTeX PDF Open Access © John Wiley & Sons, Inc. and IEEE Press
  4. Shujun Li, Mandeep K. Dhami and Anthony T.S. Ho, "Standards and Best Practices in Digital and Multimedia Forensics," Chapter 2 of Handbook of Digital Forensics of Multimedia Data and Devices, edited by Anthony T.S. Ho and Shujun Li, pp. 38-93, 2015 BibTeX PDF Open Access © John Wiley & Sons, Inc. and IEEE Press
  5. Shujun Li, "Perceptual Encryption of Digital Images and Videos," in Perceptual Digital Imaging: Methods and Applications, edited by Rastislav Lukac, Chapter 14, pp. 431-468, 2012 BibTeX © CRC Press (part of Taylor & Francis Group, LLC)
  6. Shujun Li, "On the Performance of Secret Entropy Coding: A Perspective Beyond Security," in Autonomous Systems: Developments and Trends, edited by Herwig Unger, Kyandoghere Kyamaky and Janusz Kacprzyk, Studies in Computational Intelligence, Volume 391, pp. 389-401, 2011 BibTeX PDF © Springer
  7. Gonzalo Alvarez, José María Amigó, David Arroyo and Shujun Li, "Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers," in Chaos-Based Cryptography: Theory, Algorithms and Applications, edited by Ljupco Kocarev and Shiguo Lian, Studies in Computational Intelligence, Volume 354, pp. 257-295, 2011 BibTeX PDF © Springer
  8. Shujun Li, Zhong Li and Wolfgang A. Halang, "Multimedia Encryption," article in Encyclopedia of Multimedia Technology and Networking, edited by Margherita Pagani, Volume II, pp. 972-977, 2008 BibTeX © IGI Global
  9. Shujun Li, Guanrong Chen and Xuan Zheng, "Chaos-Based Encryption for Digital Images and Videos," Chapter 4 of Multimedia Security Handbook (online version), edited by Borko Furht and Darko Kirovski, pp. 133-167, 2004 BibTeX PDF © CRC Press (currently part of Taylor & Francis Group, LLC)
    This book was republished in 2006 by Auerbach Publications (also part of Taylor & Francis Group, LLC) with a different title "Multimedia Encryption and Authentication Techniques and Applications".

PhD Theses

Own PhD Thesis

Analyses and New Designs of Digital Chaotic Ciphers (数字化混沌密码的分析与设计)Shujun Li, "Analyses and New Designs of Digital Chaotic Ciphers (数字化混沌密码的分析与设计)," PhD thesis, School of Electronic and Information Engineering, Xi'an Jiaotong University, supervised by Prof. Yuanlong Cai and Prof. Xuanqin Mou, submitted in April 2003, defense passed on 13 June 2003, approved on 30 June 2003 (last modified on 16 November 2007, to correct minor errors and to update references) BibTeX PDF PDF slides (2004 Outstanding PhD Thesis Award, Education Department of Shaanxi Provincial Government (陕西省教育厅); 2004 Outstanding PhD Thesis Award, Xi'an Jiaotong University (西安交通大学))
Note: The survey on chaotic cryptography included in Chapter 2 of the thesis has been outdated to some extent, see the following two talks that Shujun LI delivered in 2005 for more information: Digital Chaotic Ciphers (PDF, 1.03MB), Analog Chaos-Based Secure Communications (PDF, 4.34MB). For an extended version of Chapter 3, see the paper "On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps" (PDF) published in International Journal of Bifurcation and Chaos in 2005.

PhD Theses Supervised as Principal Supervisor or Co-Supervisor

PhD Theses Supervised as Secondary Supervisor

Standardization Contributions

International Standard Co-Edited

Input Documents

2011

2010

2009

Output Documents

2011

2010

Magazine/E-Letter Articles

2022

2021

2020

2009

2004

Preprints Open Access

Author profile @ arXiv.org

False Information and AI-Generated Data

Privacy and Data Protection

Cyber Skills Development

User Authentication

Federated Learning

Incident Management

Intrusion Detection

Visual Quality Assessment

Multimedia Encryption

Cryptanalysis of Chaos-Based Secure Communications

Chaos Theory

Pure Mathematics

Other Early Papers

Scientific Software

Filed Patent Applications

Journal Special Issues Edited

Note: The underlined names like "Shujun Li" denote lead guest (co-)editor(s).

Published

Security and Communication NetworksGuangjie Liu, Weiwei Liu, Shujun Li and Jinwei Wang, Security and Communication Networks, Special Section on Intelligent Network Traffic Analysis, 2021-2022 © Wiley Hindawi Partnership
Multimedia SystemsGuorui Feng, Sheng Li, Haoliang Li and Shujun Li, Multimedia Systems, Special Issue on Low Complexity Methods for Multimedia Security (editorial), Volume 27, Issue 3, 2021 © Springer
Computers & SecurityShujun Li, Willy Susilo and Wei Wang, Computers & Security, Special Issue on Privacy in Computing with Big Data and AI, 2020 © Elsevier Science B. V.
Journal of Information Security and ApplicationsFagen Li, Shujun Li, and Fuchun Guo, Tsuyoshi Takagi, Mingwu Zhang & Lein Harn (Area Editors), Journal of Information Security and Applications, Special Issue on New Frontiers in Cyber Security, 2019 © Elsevier Science B. V.

Crime Science: An Interdisciplinary JournalShujun Li, Michael Levi, David Maimon, Kim-Kwang Raymond Choo and Gianluca Stringhini, Crime Science: An Interdisciplinary Journal, Special Section on Cybercrime: interdisciplinary approaches to cutting crime and victimisation in cyber space, 2018 and 2019 Open Access © BioMed Central Ltd
Journal of Visual Communication and Image RepresentationAnderson Rocha, Shujun Li, C.-C. Jay Kuo, Alessandro Piva and Jiwu Huang, Journal of Visual Communication and Image Representation, Special Issue on Data-driven Multimedia Forensics and Security (editorial), 2018 © Elsevier Science B. V.

Security and Communication NetworksDing Wang, Shujun Li and Qi Jiang, Security and Communication Networks, Special Section on User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs (editorial), 2018 Open Access © Wiley Hindawi Partnership

Journal of Information Security and ApplicationsShujun Li, Konrad Rieck and Alan Woodward, Journal of Information Security and Applications, Special Section on Threat Detection, Analysis & Defense (editorial), Volume 19, Number 3, pp. 163-244, 2014 BibTeX © Elsevier Science B. V.

Information Security Technical ReportShujun Li and Edgar Weippl, Information Security Technical Report (renamed to Journal of Information Security and Applications in May 2013), Special Issue: ARES 2012 7th International Conference on Availability, Reliability and Security (editorial), Volume 17, Number 4, pp. 129-252, 2013 BibTeX © Elsevier Science B. V.

Disclaimer

All information on this website is for personal use and Shujun Li is not responsible for any misuse of information provided. The listed links on any page do not indicate any personal recommendations for any purposes for the visitors of this website, as each link is included for a different reason meaningful for Shujun Li's personal use. Logo files of websites are used to facilitate recognition of the external links, and does not represent endorsement of the corresponding websites for the content of this website. If the use of any logo file violates the copyrights or policies of any individuals or organisations, please contact Shujun Li so that he can removes the logo file or the whole link. Please also help report broken links and broken images on this website.