Shortcuts
Categories
Books Journal Special Issue Edited Peer-Reviewed Papers PhD Theses Book Chapters Preprints Technical Reports Standardization Contributions Patents Magazine/E-Letter Articles Other Early Papers Scientific SoftwareRegarding Copyrights
The fulltext versions of publications posted here are the author's versions of the works. They are not for redistribution. For the definitive versions of the publications, follow the citation information and the hyperlink of each publication (which is formatted using the permanent DOI URL). If you want to reuse copyrighted material from any publication, contact the corresponding copyright owner. Note that many publications contain a detailed copyright declaration, which you should read carefully. This note will not be repeated below to avoid unnecessary redundancies.Books
Monography
Edited Technical Books
Zhijie Chen, Shuqin Zhao, Shujun Li, Fuyong Wan, LATEX: From a Starter to a Master, 2nd edition, Higher Education Press, Beijing, China, May 2006, ISBN: 7-04-019379-5, 238 pages, with a ChinaTEX CD (built on 20060111), price: RMB 44.8 [online sale link]
Edited Conference Proceedings
Peer-Reviewed Papers
Note: The underlined names like "Shujun Li" and "Gonzalo Alvarez" denote corresponding authors (and presenters as well in case of conference papers). For MPEG standardization contributions, the underlined names include principal contributor(s)/editors and the presenter(s).In Press
- Zhichao You, Xuewen Dong, Shujun Li, Ximeng Liu, Siqi Ma and Yulong Shen, "Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy," accepted to IEEE Transactions on Information Forensics & Security in November 2024 © IEEE
- Haiyue Yuan, Ali Raza, Nikolay Matyunin, Jibesh Patra and Shujun Li, "A Graph-Based Model for Vehicle-Centric Data Sharing Ecosystem," presented at ITSC 2024 (27th IEEE International Conference on Intelligent Transportation Systems) in September 2024 (paper abstract @ ITS Papercept), to be published in the conference proceedings © IEEE
2024
- Nandita Pattnaik, Shujun Li and Jason R. C. Nurse, "Security and privacy perspectives of people living in shared home environments," Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 8, Issue CSCW2, Article Number 368, 39 pages, ACM, 2024, accepted to CSCW 2024 (27th ACM Conference on Computer-Supported Cooperative Work and Social Computing) © Authors
- Kai-Fung Chu, Haiyue Yuan, Jinsheng Yuan, Weisi Guo, Nazmiye Balta-Ozkan and Shujun Li, "A Survey of AI-Related Cyber Security Risks and Countermeasures in Mobility-as-a-Service," IEEE Intelligent Transportation Systems Magazine, Volume 16, Issue 6, pp. 37-55, 2024 © IEEE
- Zhanbo Liang, Jie Guo, Weidong Qiu, Zheng Huang and Shujun Li, "When Graph Convolution Meets Double Attention: Online Privacy Disclosure Detection with Multi-Label Text Classification," Data Mining and Knowledge Discovery, Volume 38, pp. 1171-1192, 2024, Springer, to be presented at ECML-PKDD 2024 (36th European Conference on Machine Learning & 28th European Conference on Principles and Practice of Knowledge Discovery in Databases) in September 2024 © Authors
- Ruiyuan Lin, Sheng Liu, Jun Jiang, Shujun Li, Chengqing Li and C.-C. Jay Kuo, "Recovering sign bits of DCT coefficients in digital images as an optimization problem," Journal of Visual Communication and Image Representation, Volume 98, Article Number 104045, 14 pages, 2024, Elsevier Inc. © Authors
- Enes Altuncu, Virginia N. L. Franqueira and Shujun Li, "Deepfake: Definitions, Performance Metrics and Standards, Datasets, and a Meta-Review," Frontiers in Big Data, Section of Cybersecurity and Privacy as part of the Research Topic "Cybersecurity and Artificial Intelligence: Advances, Challenges, Opportunities, Threats", Volume 7, 23 page, Frontiers Media S.A., 2024 © authors
- Ali Alderete Peralta, Nazmiye Balta-Ozkan and Shujun Li, "The road not taken yet: A review of cyber security risks in mobility-as-a-service (MaaS) ecosystems and a research agenda," Research in Transportation Business & Management, Volume 56, Article Number 101162, 20 pages, 2024, Elsevier Ltd © Authors
- Haozhang Li, Yangde Wang, Weidong Qiu, Shujun Li and Peng Tang, "PassTSL: Modeling Human-Created Passwords through Two-Stage Learning," in Information Security and Privacy: 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15–17, 2024, Proceedings, Part III, Lecture Notes in Computer Science (LNCS), Volume 14897, pp. 404-423, 2024 © Springer
- Yining Yuan, Kevin McAreavey, Shujun Li and Weiru Liu, "Multi-Granular Evaluation of Diverse Counterfactual Explanations," in Proceedings of the 16th International Conference on Agents and Artificial Intelligence - Volume 2: ICAART (ICAART 2024), pp. 186-197, 2024 © SCITEPRESS
2023
- Nandita Pattnaik, Shujun Li and Jason R.C. Nurse, "A Survey of User Perspectives on Security and Privacy in a Home Networking Environment," ACM Computing Surveys, Volume 55, Number 9, Article Number 180, 38 pages, 2023, ACM © Authors
- Nandita Pattnaik, Shujun Li and Jason R.C. Nurse, "Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on Twitter," Computers & Security, Volume 125, Article Number 103008, 15 pages, 2023, Elsevier Science B. V. © Authors
- Rahime Belen Sağlam, Enes Altuncu, Yang Lu and Shujun Li, "A Systematic Literature Review of the Tension between the GDPR and Public Blockchain Systems," Blockchain: Research and Applications, Volume 4, Number 2, Article Number 100129, 23 pages, 2023, Elsevier Science B. V. on behalf of Zhejiang University Press © Authors
- Ali Raza, Kim Phuc Tran, Ludovic Koehl and Shujun Li, "AnoFed: Adaptive anomaly detection for digital health using transformer-based federated learning and support vector data description," Engineering Applications of Artificial Intelligence, Volume 121, Article Number 106051, 16 pages, 2023 © Elsevier Science B. V.
- Sharifah Roziah Binti Mohd Kassim, Shujun Li and Budi Arief, "Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions," Digital Threats: Research and Practice, Volume 4, Number 3, Article Number 45, 24 pages, ACM © Authors
- Xin Yuan, Jie Guo, Weidong Qiu, Zheng Huang and Shujun Li, "Support or Refute: Analyzing the Stance of Evidence to Detect Out-of-Context Mis- and Disinformation," in Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing (EMNLP 2023), pp. 4268-4280, 2023 © ACL
- Sam Parker, Haiyue Yuan and Shujun Li, "PassViz: A Visualisation System for Analysing Leaked Passwords," in Proceedings of the 2023 20th IEEE Symposium on Visualization for Cyber Security (VizSec 2023), pp. 33-42, 2023 © IEEE
- Maria Sophia Heering, Haiyue Yuan and Shujun Li, "The Impact of Privacy and Security Attitudes and Concerns of Travellers on Their Willingness to Use Mobility-as-a-Service Systems," in Proceedings of the 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC 2023), pp. 5573-5578, 2023 © IEEE
- Enes Altuncu, Jason R.C. Nurse, Meryem Bagriacik, Sophie Kaleba, Haiyue Yuan, Lisa Bonheme and Shujun Li, "aedFaCT: Scientific Fact-Checking Made Easier via Semi-Automatic Discovery of Relevant Expert Opinions," in Workshop Proceedings of the 17th International AAAI Conference on Web and Social Media (ICWSM 2023), Article Number 27, 10 pages, presented at MEDIATE 2023 (5th Workshop on News Media and Computational Journalism), co-located with ICWSM 2023, 2023 © AAAI
- Mohamad Imad Mahaini and Shujun Li, "Cyber Security Researchers on Online Social Networks: From the Lens of the UK’s ACEs-CSR on Twitter," in Security and Privacy in Social Networks and Big Data: 9th International Symposium, SocialSec 2023, Canterbury, UK, August 14–16, 2023, Proceedings, Lecture Notes in Computer Science (LNCS), Volume 14097, pp. 129-148, 2023 © Springer
- Haiyue Yuan, Matthew Boakes, Xiao Ma, Dongmei Cao and Shujun Li, "Visualising Personal Data Flows: Insights from a Case Study of Booking.com," in Intelligent Information Systems: CAiSE Forum 2023, Zaragoza, Spain, June 12–16, 2023, Proceedings, Lecture Notes in Business Information Processing (LNBIP), Volume 477, pp. 52-60, 2023 © Springer
- Jamie Knott, Haiyue Yuan, Matthew Boakes and Shujun Li, "Cyber Security and Online Safety Education for Schools in the UK: Looking through the Lens of Twitter Data," in Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing (SAC 2023), pp. 1603-1606, 2023 © ACM
- Ali Raza, Kim Phuc Tran, Ludovic Koehl and Shujun Li, "Proof of Swarm Based Ensemble Learning for Federated Learning Applications," in Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing (SAC 2023), pp. 152-155, 2023 © ACM
2022
- Sarah Turner, Nandita Pattnaik, Jason R. C. Nurse and Shujun Li, "“You just assume it is in there, I guess”: Understanding UK families' application and knowledge of smart home cyber security," Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 6, Number CSCW2, Article Number 269, 34 pages, ACM, 2022, presented at CSCW 2022 (25th ACM Conference on Computer-Supported Cooperative Work and Social Computing) © Authors
- Yang Lu and Shujun Li, "From Data Flows to Privacy-Benefit Trade-offs: A User-Centric Semantic Model," Security and Privacy, Volume 5, Issue 4, Article Number e225, 24 pages, John Wiley & Sons, Inc., 2022 © Authors
- Yang Lu, Shujun Li, Alex Freitas and Athina Ioannou, "How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis," EAI Endorsed Transactions on Security and Safety, Volume 8, Issue 30, Article Number e3, 20 pages, EAI, 2022, DOI: 10.4108/eai.21-12-2021.172440 © Authors
- Ali Raza, Kim Phuc Tran, Ludovic Koehl and Shujun Li, "Designing ECG monitoring healthcare system with federated transfer learning and explainable AI," Knowledge-Based Systems, Volume 236, Article Number 107763, 17 pages, 2022 © Elsevier Science B. V.
- Sharifah Roziah Binti Mohd Kassim, Shujun Li and Budi Arief, "How National CSIRTs Leverage Public Data, OSINT and Free Tools in Operational Practices: An Empirical Study," Cyber Security: A Peer-Reviewed Journal, Volume 5, Number 3, pp. 251-276, 2022 © Henry Stewart Publications LLP
- Sharifah Roziah Binti Mohd Kassim, Shujun Li and Budi Arief, "Incident Response Practices Across National CSIRTs: Results from an Online Survey," OIC-CERT Journal of Cyber Security, Volume 4, Issue 1, pp. 67-84, 2022 © OIC-CERT
- Keenan Jones, Jason R. C. Nurse and Shujun Li, "Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators," in Proceedings of the 2022 16th AAAI International Conference on Web and Social Media (ICWSM 2022), pp. 429-440, 2022 © AAAI
- Keenan Jones, Jason R. C. Nurse and Shujun Li, "Out of the Shadows: Analyzing Anonymous' Twitter Resurgence during the 2020 Black Lives Matter Protests," in Proceedings of the 2022 16th AAAI International Conference on Web and Social Media (ICWSM 2022), pp. 417-428, 2022 © AAAI
- Yang Xu, Jie Guo, Weidong Qiu, Zheng Huang, Enes Altuncu and Shujun Li, "“Comments Matter and The More The Better!”: Improving Rumor Detection with User Comments," in Proceedings of the 2022 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 383-390, 2022 © IEEE
- Sarah Turner, Jason R. C. Nurse and Shujun Li, "“It was hard to find the words”: Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices," in Extended Abstracts of the 2022 CHI Conference on Human Factors in Computing Systems, Article Number 34, 8 pages, ACM, 2022 © Authors
- Haiyue Yuan and Shujun Li, "Cyber Security Risks of Net Zero Technologies," in Proceedings of the 2022 5th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022), invited paper, 11 pages, 2022 © Crown (UK Government)
- Sharifah Roziah Binti Mohd Kassim, Solahuddin Bin Shamsuddin, Shujun Li and Budi Arief, "How National CSIRTs Operate: Personal Observations and Opinions from MyCERT," in Proceedings of the 2022 5th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022), Experience and Practice Track paper, 2 pages, 2022 (Best Paper Award of Experience and Practice Track, certificate) © IEEE
2021
- Haiyue Yuan, Shujun Li and Patrice Rusconi, "CogTool+: Modeling Human Performance at Large Scale," ACM Transactions on Computer-Human Interaction, Volume 28, Number 2, Article Number 7, 38 pages, ACM, 2021 © Authors
- Athina Ioannou, Iis Tussyadiah, Graham Miller, Shujun Li and Mario Weick, "Privacy nudges for disclosure of personal information: A systematic literature review and meta-analysis," PLoS ONE, Volume 16, Number 8, Article Number e0256822, 29 pages, PLoS, 2021 © Authors
- Ingolf Becker, Rebecca Posner, Tasmina Islam, Paul Ekblom, Hervé Borrion, Michael McGuire and Shujun Li, "Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation," in Proceedings of the 54th Hawaii International Conference on System Sciences (HICSS 2021), pp. 5347-5356, University of Hawaiʻi at Mānoa, 2021 (Best Paper Award of Location Intelligence Invited Track; Certificate) © Authors
- Mohamad Imad Mahaini and Shujun Li, "Detecting Cyber Security Related Twitter Accounts and Different Sub-Groups: A Multi-Classifier Approach," in Proceedings of the 2021 13th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2021; the paper as part of a co-located event FOSINT-SI 2021 - 2nd International Symposium on Foundations of Open Source Intelligence and Security Informatics, a co-located event), pages 599-606, ACM, 2021 Companion Web Page © Authors
- Sarah Turner, Jason R. C. Nurse and Shujun Li, "When Googling It Doesn’t Work: The Challenge of Finding Security Advice for Smart Home Devices," in Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings, IFIP Advances in Information and Communication Technology, Volume 613, pp. 115-126, 2021 © Springer
- Keenan Jones, Jason R. C. Nurse and Shujun Li, "The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter," in Workshop Proceedings of the 15th International AAAI Conference on Web and Social Media (Proceedings of Emoji 2021: 4th International Workshop on Emoji Understanding and Applications in Social Media), Article Number 4, 2021 © AAAI
2020
- Çağrı B. Aslan, Shujun Li, Fatih V. Çelebi and Hao Tian, "The World of Defacers: Looking through the Lens of Their Activities on Twitter," IEEE Access, Volume 8, pp. 204132-204143, IEEE, 2020 © Authors
- Carlos Javier Hernández-Castro, Shujun Li and María D. R-Moreno, "All About Uncertainties and Traps: Statistical Oracle-based Attacks on a New CAPTCHA Protection Against Oracle Attacks," Computers & Security, Volume 92, Article Number 101758, 12 pages, 2020 © Elsevier Science B. V.
- Keenan Jones, Jason R. C. Nurse and Shujun Li, "Behind the Mask: A Computational Study of Anonymous’ Presence on Twitter," in Proceedings of 14th International Conference on Web and Social Media (ICWSM 2020), pp. 327-338, 2020 (one of eight Honorable Mentions for Best Paper Award; acceptance rate of full papers: 72/298=24%) © AAAI
- Yang Lu and Shujun Li, "From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues," in Proceedings of the 53rd Hawaii International Conference on System Sciences (HICSS 2020), pp. 6528-6537, University of Hawaiʻi at Mānoa, 2020, DOI:10.24251/HICSS.2020.799 © Authors
- Rahime Belen Sağlam, Çağrı B. Aslan, Shujun Li, Lisa Dickson and Ganna Pogrebna, "A Data-Driven Analysis of Blockchain Systems' Public Online Communications on GDPR," in Proceedings of 2020 IEEE International Conference on Decentralized Applications and Infrastructures (IEEE DAPPS 2020), pp. 22-31, 2020 © IEEE
- Zeynep Chousein, Hacı Yakup Tetik, Rahime Belen Sağlam, Abdullah Bülbül and Shujun Li, "Tension between GDPR and Public Blockchains: A Data-Driven Analysis of Online Discussions," in Proceedings of 13th International Conference on Security of Information and Networks (SINCONF 2020), Article Number 17, 8 pages, 2020 © ACM
- Kübra Aydin, Rahime Belen Sağlam, Shujun Li and Abdullah Bülbül, "When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter," in Proceedings of 13th International Conference on Security of Information and Networks (SINCONF 2020), Article Number 16, 8 pages, 2020 © ACM
- Hui Wang, Anthony T.S. Ho and Shujun Li, "OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework," in Computer Security: ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020, Revised Selected Papers (MPS 2020, 3rd International Workshop on Multimedia Privacy and Security, co-located at ESORICS 2020, held virtually online, 18 September, 2020), Lecture Notes in Computer Science, Volume 12580, pp. 243-260, 2020 © Springer
2019
- Chengqing Li, Bingbing Feng, Shujun Li, Jürgen Kurths and Guanrong Chen, "Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks," IEEE Transactions on Circuits and Systems I: Regular Papers, Volume 66, Number 6, pp. 2322-2335, 2019 (2022 IEEE Transactions on Circuits and Systems Guillemin-Cauer Best Paper Award: 1 out of 3000+) © IEEE
- Ximing Liu, Yingjiu Li, Robert H. Deng, Bing Chang and Shujun Li, "When Human Cognitive Modeling Meets PINs: User-Independent Inter-Keystroke Timing Attacks," Computers & Security, Volume 80, pp. 90-107, 2019 © Elsevier Science B. V.
- Zichi Wang, Shujun Li and Xinpeng Zhang, "Towards Improved Steganalysis: When Cover Selection is Used in Steganography," IEEE Access, Volume 7, pp. 168914-168921, IEEE, 2019 © Authors
- Yang Lu, Athina Ioannou, Iis Tussyadiah and Shujun Li, "Segmenting travelers based on responses to nudging for information disclosure," e-Review of Tourism Research (second website), Volume 17, Number 3, pp. 394-406, 2019, part of research notes accepted to ENTER 2020 (27th IFITT International eTourism Conference) © e-Review of Tourism Research
- Saeed Alqahtani, Shujun Li, Haiyue Yuan and Patrice Rusconi, "Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More?", EAI Endorsed Transactions on Security and Safety, Volume 6, Number 21, Article e1, 15 pages, EAI, 2019 © Authors
- Mohamad Imad Mahaini, Shujun Li and Rahime Belen Sağlam, "Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example," in Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019), Article Number 30, 9 pages, ACM, 2019 © Authors
- Yang Lu, Shujun Li, Athina Ioannou and Iis Tussyadiah, "From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework," in Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings, Communications in Computer and Information Science, Volume 1123, pp. 262-276, 2019 © Springer
- Tasmina Islam, Ingolf Becker, Rebecca Posner, Paul Ekblom, Michael McGuire, Hervé Borrion and Shujun Li, "A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems," in Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings, Communications in Computer and Information Science, Volume 1123, pp. 277-293, 2019 © Springer
- Iis Tussyadiah, Shujun Li and Graham Miller, "Privacy protection in tourism: Where we are and where we should be heading for," in Information and Communication Technologies in Tourism 2019: Proceedings of the International Conference in Nicosia, Cyprus, January 30–February 1, 2019, pp. 278-290, 2019 © Springer
2018
- Shujun Li, Anthony T.S. Ho, Zichi Wang and Xinpeng Zhang, "Lost in the Digital Wild: Hiding Information in Digital Activities," in Proceedings of 2nd International Workshop on Multimedia Privacy and Security (MPS 2018, co-location with ACM CCS 2018), pp. 27-37, ACM, 2018 (acceptance rate of full papers: 6/18=33%) © Authors
- Çağrı B. Aslan, Rahime Belen Sağlam and Shujun Li, "Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example," in Proceedings of 9th International Conference on Social Media and Society (SMSociety 2018), pp. 236-240, ACM, 2018 © Authors
(Some results in the paper contain errors. Please see another more recent paper for more advanced classifiers Shujun and his another co-author developed based on this work.)
- Roger A. Hallman, Shujun Li and Victor Chang, "2nd International Workshop on Multimedia Privacy and Security," workshop summary in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS 2018), pp. 2173-2174, ACM, 2018 © Authors
2017
- Simying Ong, Shujun Li, KokSheik Wong and KuanYew Tan, "Fast Recovery of Unknown Coefficients in DCT-Transformed Images," Signal Processing: Image Communication, Volume 58, pp. 1-13, 2017 © Elsevier Science B. V.
- Saeed Ibrahim Saeed Alqahtani and Shujun Li, "PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices," in Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES 2017), Article Number 19, ACM, 2017 (Acceptance rate of full papers: 24.21%) © Authors
- Vlad Hosu, Franz Hahn, Mohsen Jenadeleh, Hanhe Lin, Hui Men, Tamás Szirányi, Shujun Li and Dietmar Saupe, "The Konstanz Natural Video Database (KoNViD-1k)," in Proceedings of the 2017 9th International Conference on Quality of Multimedia Experience (QoMEX 2017), 2017 © IEEE
- Christopher Sandy, Patrice Rusconi and Shujun Li, "Can Humans Detect the Authenticity of Social Media Accounts? On the impact of verbal and non-verbal cues on credibility judgements of Twitter profile," in Proceedings of 2017 3rd IEEE International Conference on Cybernetics (CYBCONF 2017), pp. 479-486, 2017 © IEEE
- Nick Williams and Shujun Li, "Simulating human detection of phishing websites: An investigation into the applicability of ACT-R cognitive behaviour architecture model," in Proceedings of 2017 3rd IEEE International Conference on Cybernetics (CYBCONF 2017), pp. 471-478, 2017 © IEEE
- Haiyue Yuan, Shujun Li, Patrice Rusconi and Nouf Aljaffan, "When Eye-tracking Meets Cognitive Modeling: Applications to Cyber Security Systems," in Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Lecture Notes in Computer Science, Volume 10292, pp. 251-264, 2017 (Best Paper Award: 1/46≈2.2%, Certificate) © Springer
- Nouf Aljaffan, Haiyue Yuan and Shujun Li, "PSV (Password Security Visualizer): From Password Checking to User Education," in Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Lecture Notes in Computer Science, Volume 10292, pp. 191-211, 2017 © Springer
2016
- Dietmar Saupe, Franz Hahn, Vlad Hosu, Igor Zingman, Masud Rana and Shujun Li, "Crowd workers proven useful: A comparative study of subjective video quality assessment," short paper presented at 8th International Conference on Quality of Multimedia Experience (QoMEX 2016, 6-8 June 2016, Lisbon, Portugal) © Authors
- Haiyue Yuan, Shujun Li, Anthony T.S. Ho, Paul Palmer, Andy Lloyd and Graham Head, "Forensic Vehicle Convoy Analysis Using ANPR Data," poster presented at DFRWS EU 2016, 29-31 March 2016, Lausanne, Switzerland © Authors
2015
- Hassan Jameel Asghar, Ron Steinfeld, Shujun Li, Mohamed Ali Kaafar and Josef Pieprzyk, "On the Linearization of Human Identification Protocols: Attacks based on Linear Algebra, Coding Theory and Lattices," IEEE Transactions on Information Forensics and Security, Volume 10, Number 8, pp. 1643-1655, 2015 [Full Edition: IACR ePrint 2014/767] © IEEE
- Mario Čagalja, Toni Perković, Marin Bugarić and Shujun Li, "Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks," Pervasive and Mobile Computing, Volume 20, pp. 64-81, 2015 © Elsevier Science B. V.
- Roland Schmitz, Shujun Li, Christos Grecos and Xinpeng Zhang, "Content-Fragile Commutative Watermarking-Encryption Based on Pixel Entropy," in Advanced Concepts for Intelligent Vision Systems: 16th International Conference, ACIVS 2015, Catania, Italy, October 26–29, 2015, Proceedings, Lecture Notes in Computer Science, Volume 9386, pp. 474-485, 2015 © Springer
2014
- Roland Schmitz, Shujun Li, Christos Grecos and Xinpeng Zhang, "Towards Robust Invariant Commutative Watermarking-Encryption based on Image Histograms," International Journal of Multimedia Data Engineering and Management (IJMDEM), Volume 5, Number 4, pp. 36-52, 2014 © IGI Global
- Hui Wang, Anthony TS Ho and Shujun Li, "A Novel Image Restoration Scheme Based on Structured Side Information and Its Application to Image Watermarking," Signal Processing: Image Communication, Volume 29, Number 7, pp. 773-787, 2014 © Elsevier Science B. V.
- Fang Liu, Hui Wang, Lee-Ming Cheng, Anthony T.S. Ho and Shujun Li, "Enhanced Perceptual Image Authentication with Tamper Localization and Self-Restoration," in Proceedings of 2014 IEEE International Conference on Multimedia and Expo (ICME 2014, Chengdu, China, July 14-18, 2014) © IEEE
- Matthew Davidson, Karen Renaud and Shujun Li, "jCAPTCHA: Accessible Human Validation," in Computers Helping People with Special Needs: 14th International Conference, ICCHP 2014, Paris, France, July 9-11, 2014, Proceedings, Part I, Lecture Notes in Computer Science, Volume 8547, pp. 129-136, 2014 © Springer
2013
- Junaid Jameel Ahmad, Shujun Li, Richard Thavot and Marco Mattavelli, "Secure Computing with the MPEG RVC Framework," Signal Processing: Image Communication, Volume 28, Number 10 (special issue on Recent Advances on MPEG Codec Configuration Framework), pp. 1315-1334, 2013 © Elsevier Science B. V.
- Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk and Huaxiong Wang, "Cryptanalysis of the Convex Hull Click Human Identification Protocol," International Journal of Information Security, Volume 12, Number 2, pp. 83-96, 2013 © Springer
- Hassan Jameel Asghar, Shujun Li, Ron Steinfeld and Josef Pieprzyk, "Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks," in Proceedings of 20th Annual Network & Distributed System Security Symposium (NDSS 2013), 2013 (Acceptance rate: 47/250=18.8%) [Full Edition: IACR ePrint 2012/659] © Internet Society
- Junaid Jameel Ahmad, Shujun Li and Marco Mattavelli, "Performance Benchmarking of RVC Based Multimedia Specifications," in Proceedings of the 20th IEEE International Conference on Image Processing (ICIP 2013, Melbourne, Australia, September 15-18, 2013), pp. 4569-4572, 2013 © IEEE
- Roland Schmitz, Shujun Li, Christos Grecos and Xinpeng Zhang, "Towards More Robust Commutative Watermarking-Encryption of Images," in Proceedings of 15th IEEE International Symposium on Multimedia (ISM 2013, Anaheim, California, USA, December 9-11, 2013), pp. 283-286, 2013 © IEEE
- Kyriakos Kafas, Nouf Aljaffan and Shujun Li, "Poster: Visual Password Checker," presented at 9th Symposium On Usable Privacy and Security (SOUPS 2013), July 24-26, 2013, Newcastle, UK © Authors
2012
- Ainuddin Wahid Abdul Wahab, Anthony TS Ho and Shujun Li, "Inter-Camera Model Image Source Identification with Conditional Probability Features," in Proceedings of the IIEEJ Image Electronics and Visual Computing Workshop 2012 (IEVC 2012, Kuching, Malyasia, November 21-24, 2012), Paper ID 2P-2, 2012 (Best Paper Award: 3/95≈3.2%, Certificate) © IIEEJ (The Institute of Image Electronics Engineering of Japan, 日本画像電子学会)
- Roman Byshko and Shujun Li, "Characterization of iPhone Displays: A Comparative Study," in Proceedings of the 18th German Color Group Workshop on Color Image Processing (Tagungsband vor 18. Workshop Farbbildverarbeitung 2012, September 27-28, 2012 in Darmstadt, Germany), pp. 49-60, Technische Universität Darmstadt, 2012, ISBN: 978-3-00-039639-7 © Authors
- Roland Schmitz, Shujun Li, Christos Grecos and Xinpeng Zhang, "A New Approach to Commutative Watermarking-Encryption," in Communications and Multimedia Security: 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings, Lecture Notes in Computer Science, Volume 7394, pp. 117-130, 2012 © Springer
- Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi and Thomas Schneider, "CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm," in Financial Cryptography and Data Security: 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers, Lecture Notes in Computer Science, Volume 7397, pp. 299-313, Springer, 2012 (Acceptance rate: 23/88=26.1%) Campanion Web Page [Full Edition: IACR ePrint 2011/679] © Springer
- Kongfeng Zhu, Shujun Li and Dietmar Saupe, "An objective method of measuring texture preservation for camcorder performance evaluation," in Image Quality and System Performance IX (part of IS&T/SPIE Electronic Imaging 2012, Burlingame, CA, USA, January 22-26, 2012), Proceedings of SPIE, Volume 8293, Article Number 829304, 2012 © SPIE
- Sabine Cornelsen, Andreas Karrenbauer and Shujun Li, "Leveling the Grid," in Proceedings of the Meeting on Algorithm Engineering & Experiments, Kyoto, Japan, January 16, 2012 (ALENEX 2012), pp. 45-54, 2012 (acceptance rate: 15/48=31%) © SIAM
- Shujun Li, Ahmad-Reza Sadeghi, Sören Heisrath, Roland Schmitz and Junaid Jameel Ahmad, "hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers," in Financial Cryptography and Data Security: 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers, Lecture Notes in Computer Science, Volume 7035, pp. 235-249, Springer, 2012 (acceptance rate of long papers: 15/74=20.3%) Companion Web Page © Springer
2011
- Roland Schmitz and Shujun Li, "Neue Entwicklungen in der e-Banking Security," ("Recent Developments in e-Banking Security,") PIK - Praxis der Informationsverarbeitung und Kommunikation, Volume 34, Number 4, pp. 176-184, 2011 © Walter de Gruyter GmbH & Co. KG
- Chengqing Li, Shujun Li and Kwok-Tung Lo, "Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps," Communications in Nonlinear Science and Numerical Simulation, Volume 16, Number 2, pp. 837-843, 2011 © Elsevier Science B. V.
- David Arroyo, Gonzalo Alvarez, José María Amigó and Shujun Li, "Cryptanalysis of a family of self-synchronizing chaotic stream ciphers," Communications in Nonlinear Science and Numerical Simulation, Volume 16, Number 2, pp. 805-813, 2011 © Elsevier Science B. V.
- Toni Perković, Asma Mumtaz, Yousra Javed, Shujun Li, Syed Ali Khayam and Mario Čagalj, "Breaking Undercover: Exploiting Design Flaws and Nonuniform Human Behavior," in Proceedings of 7th Symposium On Usable Privacy and Security (SOUPS 2011, Carnegie Mellon University in Pittsburgh, PA, USA, July 20-22, 2011), Article Number 5, ACM, 2011, DOI: 10.1145/2078827.2078834 (acceptance rate: 15/45=33.3%) © Authors
- Shujun Li, Andreas Karrenbauer, Dietmar Saupe and C.-C. Jay Kuo, "Recovering Missing Coefficients in DCT-Transformed Images," in Proceedings of 2011 18th IEEE International Conference on Image Processing (ICIP 2011, Brussels, Belgium, September 11-14, 2011), pp. 1537-1540, 2011 Companion Web Page (Media Coverage: Vision Systems Design) © IEEE
- Hassan Jammel Asghar, Shujun Li, Josef Pieprzyk and Huaxiong Wang, "Cryptanalysis of the Convex Hull Click Human Identification Protocol," in Information Security: 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, Lecture Notes in Computer Science, Volume 6531, pp. 24-30, 2011 (acceptance rate: 37/134=27.6%) [Full Edition: IACR ePrint 2010/478] © Springer
- Junaid Jameel Ahmad, Shujun Li, Ihab Amer and Marco Mattavelli, "Building Multimedia Security Applications in the MPEG Reconfigurable Video Coding (RVC) Framework," in Proceedings of 13th ACM Workshop on Multimedia and Security (ACM MM&Sec 2011, Buffalo, NY, USA, September 29-30, 2011), pp. 121-130, 2011 © ACM
- Shujun Li, Chengqing Li and C.-C. Jay Kuo, "On the Security of a Secure Lempel-Ziv-Welch (LZW) Algorithm," in Proceedings of 2011 IEEE International Conference on Multimedia and Expo (ICME 2011, Barcelona, Spain, July 11-15, 2011), 2011 © IEEE
- Yousra Javed, Maliha Nazir, Muhammad Murtaza Khan, Syed Ali Khayam and Shujun Li, "Captchæcker: Reconfigurable CAPTCHAs Based on Automated Security and Usability Analysis," in Proceedings of 2011 4th Symposium on Configuration Analytics and Automation (SafeConfig 2011, October 31 - November 1, 2011, Arlington, VA, USA), 2011 (acceptance rate: 10/29=34.5%) © IEEE
- Maliha Nazir, Yousra Javed, Muhammad Murtaza Khan, Syed Ali Khayam and Shujun Li, "Poster: Captchæcker – Automating Usability-Security Evaluation of Textual CAPTCHAs," in Proceedings of 7th Symposium On Usable Privacy and Security (SOUPS 2011, Carnegie Mellon University in Pittsburgh, PA, USA, July 20-22, 2011), 2011 © Authors
2010
- Chengqing Li, Shujun Li, Kwok-Tung Lo and Kyandoghere Kyamakya, "A differential cryptanalysis of Yen-Chen-Wu multimedia cryptography system," Journal of Systems and Software, Volume 83, Number 8, pp. 1443-1452, 2010 © Elsevier Science B. V.
- A.B. Orue, G. Alvarez, G. Pastor, M. Romera, F. Montoya and Shujun Li, "A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis," Communications in Nonlinear Science and Numerical Simulation, Volume 15, Number 11, pp. 3471-3483, 2010 © Elsevier Science B. V.
- David Arroyo, Shujun Li, Gonzalo Alvarez, José María Amigó and Rhouma Rhouma, "Comments on 'Image encryption with chaotically coupled chaotic maps'," Physica D: Nonlinear Phenomena, Volume 239, Number 12, pp. 1002-1006, 2010 © Elsevier Science B. V.
- Shujun Li, Syed Amier Haider Shah, Muhammad Asad Usman Khan, Syed Ali Khayam, Ahmad-Reza Sadeghi and Roland Schmitz, "Breaking e-Banking CAPTCHAs," in Proceedings of 26th Annual Computer Security Applications Conference (ACSAC 2010, Austin, TX, USA, December 6-10, 2010), pp. 171-180, 2010 (acceptance rate: 39/227=17.2%) Companion Web Page (Media Coverage: Infosec Island, LLC) © ACM
- Shujun Li, Junaid Jameel Ahmad, Dietmar Saupe and C.-C. Jay Kuo, "An Improved DC Recovery Method from AC Coefficients of DCT-Transformed Images," in Proceedings of 2010 17th IEEE International Conference on Image Processing (ICIP 2010, Hong Kong, China, September 26-29, 2010), pp. 2085-2088, 2010 Companion Web Page © IEEE
- David Arroyo, José María Amigó, Shujun Li and Gonzalo Alvarez, "On the inadequacy of unimodal maps for cryptographic applications," in Proceedings of 11th Spanish Meeting on Cryptology and Information Security (RECSI 2010, Tarragona, Spain, September 7-10, 2010), pp. 37-42, 2010 © Universitat Rovira i Virgili
- Shujun Li, Syed Ali Khayam, Ahmad-Reza Sadeghi and Roland Schmitz, "Breaking Randomized Linear Generation Functions based Virtual Password System," in Proceedings of 35th IEEE International Conference on Communications (ICC 2010, Communication and Information Systems Security Symposium, Cape Town, South Africa, May 23-27, 2010), IEEE, 2010 © IEEE
- Shujun Li, Ahmad-Reza Sadeghi and Roland Schmitz, "hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers," poster, in Financial Cryptography and Data Security: 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers. Proceedings, Lecture Notes in Computer Science, Volume 6052, p. 429, 2010 © Springer
2009
- Rhouma Rhouma, Ercan Solak, David Arroyo, Shujun Li, Gonzalo Alvarez and Safya Belghitha, "Comment on “Modified Baptista type chaotic cryptosystem via matrix secret key” [Phys. Lett. A 372 (2008) 5427]," Physics Letters A, Volume 373, Number 37, pp. 3398-3400, 2009 © Elsevier Science B. V.
- A.B. Orue, V. Fernandez, G. Alvarez, G. Pastor, M. Romera, F. Montoya, C. Sanchez-Avila and Shujun Li, "Breaking a SC-CNN-based Chaotic Masking Secure Communication System," International Journal of Bifurcation and Chaos, Volume 19, Number 4, pp. 1329-1338, 2009 © World Scientific Publishing Co.
- David Arroyo, Gonzalo Alvarez, Shujun Li, Chengqing Li and Veronica Fernandez, "Cryptanalysis of a New Chaotic Cryptosystem Based on Ergodicity," International Journal of Modern Physics B, Volume 23, Number 5, pp. 651-659, 2009 © World Scientific Publishing Co.
- David Arroyo, Chengqing Li, Shujun Li, Gonzalo Alvarez and Wolfgang A. Halang, "Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm," Chaos, Solitons & Fractals, Volume 41, Number 5, pp. 2613-2616, 2009 © Elsevier Science B. V.
- G. Alvarez and Shujun Li, "Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption," Communications in Nonlinear Science and Numerical Simulation, Volume 14, Number 11, pp. 3743-3749, 2009 © Elsevier Science B. V.
- Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez and Guanrong Chen, "On the security defects of an image encryption scheme," Image and Vision Computing, Volume 27, Number 9, pp. 1371-1381, 2009 © Elsevier Science B. V.
- Chengqing Li, Shujun Li, Guanrong Chen and Wolfgang A. Halang, "Cryptanalysis of an image encryption scheme based on a compound chaotic sequence," Image and Vision Computing, Volume 27, Number 8, pp. 1035-1039, 2009 © Elsevier Science B. V.
- David Arroyo, Chengqing Li, Shujun Li, Gonzalo Alvarez, "Cryptanalysis of a computer cryptography scheme based on a filter bank," Chaos, Solitons & Fractals, Volume 41, Number 1, pp. 410-413, 2009 © Elsevier Science B. V.
- Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz and Huaxiong Wang, "On the Security of PAS (Predicate-based Authentication Service)," in Proceedings of 25th Annual Computer Security Applications Conference (ACSAC 2009, Honolulu, Hawaii, USA, December 7-11, 2009), pp. 209-218, 2009 (acceptance rate: 44/224=19.6%) [IACR ePrint 2009/476] © IEEE
- Shujun Li and Roland Schmitz, "A Novel Anti-Phishing Framework Based on Honeypots," in Proceedings of 4th Annual APWG eCrime Researchers Summit (eCrime 2009 or eCRS 2009, Tacoma, WA, USA, October 20 & 21, 2009) (acceptance rate: 35%) Companion Web Page © IEEE
- Shujun Li, Guanrong Chen, Albert Cheung, Kwok-Tung Lo and Mohan Kankanhalli, "On the Security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables," in Advances in Image and Video Technology: Third Pacific Rim Symposium, PSIVT 2009, Tokyo, Japan, January 13-16, 2009. Proceedings, Lecture Notes in Computer Science, Volume 5414, pp. 898-909, 2009 © Springer
- David Arroyo, Gonzalo Alvarez and Shujun Li, "Some Hints for the Design of Digital Chaos-Based Cryptosystems: Lessons Learned from Cryptanalysis," in Analysis and Control of Chaotic Systems, Volume 2 (Proceedings of IFAC CHAOS 2009, 2nd IFAC Meeting on Analysis and Control of Chaotic Systems, Queen Mary, University of London, UK, June 22-24, 2009), pp. 171-175, 2009 © IFAC
2008
- David Arroyo, Rhouma Rhouma, Gonzalo Alvarez, Shujun Li and Veronica Fernandez, "On the security of a new image encryption scheme based on chaotic map lattices," Chaos, Volume 18, Number 3, art. Number 033112, 2008 © AIP
- A.B. Orue, V. Fernandez, G. Alvarez, G. Pastor, M. Romera, Shujun Li and F. Montoya, "Determination of the parameters for a Lorenz system and application to break the security of two-channel chaotic cryptosystems," Physics Letters A, Volume 372, Number 34, pp. 5588-5592, 2008 © Elsevier Science B. V.
- Shujun Li, Chengqing Li, Guanrong Chen and Kwok-Tung Lo, "Cryptanalysis of the RCES/RSES image encryption scheme," Journal of Systems and Software, Volume 81, Number 7, pp. 1130-1143, 2008 © Elsevier Science B. V.
- Shujun Li, Chengqing Li, Kwok-Tung Lo and Guanrong Chen, "Cryptanalyzing an Encryption Scheme Based on Blind Source Separation," IEEE Transactions on Circuits and Systems-I: Regular Papers, Volume 55, Number 4, pp. 1055-1063, 2008 © IEEE
- Shujun Li, Chengqing Li, Guanrong Chen, Nikolaos G. Bourbakis and Kwok-Tung Lo, "A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks," Signal Processing: Image Communication, Volume 23, Number 3, pp. 212-223, 2008 © Elsevier Science B. V.
- Shujun Li, Chengqing Li, Kwok-Tung Lo and Guanrong Chen, "Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion," IEEE Transactions on Circuits and Systems for Video Technology, Volume 18, Number 3, pp. 338-349, 2008 (Regular Transaction Paper) © IEEE
- Chengqing Li, Shujun Li, Gonzalo Álvarez, Guanrong Chen and Kwok-Tung Lo, "Cryptanalysis of a chaotic block cipher with external key and its improved version," Chaos, Solitons & Fractals, Volume 37, Number 1, pp. 299-307, 2008 © Elsevier Science B. V.
- David Arroyo, Gonzalo Alvarez, Shujun Li, Chengqing Li and Juana Nunez, "Cryptanalysis of a discrete-time synchronous chaotic encryption system," Physics Letters A, Volume 372, Number 7, pp. 1034-1039, 2008 © Elsevier Science B. V.
2007
- Chengqing Li, Shujun Li, Gonzalo Álvarez, Guanrong Chen and Kwok-Tung Lo, "Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations," Physics Letters A, Volume 369, Number 1-2, pp. 23-30, 2007 © Elsevier Science B. V.
- Shujun Li, Guanrong Chen, Albert Cheung, Bharat Bhargava and Kwok-Tung Lo, "On the Design of Perceptual MPEG-Video Encryption Algorithms," IEEE Transactions on Circuits and Systems for Video Technology, Volume 17, Number 2, pp. 214-223, 2007 (Regular Transaction Paper) © IEEE
- Gonzalo Álvarez, Shujun Li and Luis Hernandez, "Analysis of security problems in a medical image encryption system," Computers in Biology and Medicine, Volume 37, Number 3, pp. 424-427, 2007 © Elsevier Science B. V.
- Shujun Li and Kwok-Tung Lo, "Security problems with improper implementations of improved FEA-M," Journal of Systems and Software, Volume 80, Number 5, pp. 791-794, 2007 © Elsevier Science B. V.
- Shujun Li, Gonzalo Álvarez, Zhong Li and Wolfgang A. Halang, "Analog Chaos-based Secure Communications and Cryptanalysis: A Brief Survey," in Online Proceedings of 3rd International IEEE Scientific Conference on Physics and Control (PhysCon 2007), September 3rd-7th 2007 at the University of Potsdam, edited by Jürgen Kurths, Alexander Fradkov and Guanrong Chen, 2007 © Authors
2006
- Shujun Li, Chengqing Li, Kwok-Tung Lo and Guanrong Chen, "Cryptanalysis of an image encryption scheme," Journal of Electronic Imaging, Volume 15, Number 4, Article Number 043012, 13 pages, 2006 © SPIE
- Gonzalo Álvarez and Shujun Li, "Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems," International Journal of Bifurcation and Chaos (Tutorial-Review Section), Volume 16, Number 8, pp. 2129-2151, 2006 © World Scientific Publishing Co.
- Shujun Li, Guanrong Chen and Gonzalo Álvarez, "Return-Map Cryptanalysis Revisited," International Journal of Bifurcation and Chaos, Volume 16, Number 5, pp. 1557-1568, 2006 © World Scientific Publishing Co.
- Gonzalo Álvarez and Shujun Li, "Breaking an encryption scheme based on chaotic Baker map," Physics Letters A, Volume 352, Number 1-2, pp. 78-82, 2006 © Elsevier Science B. V.
- Chengqing Li, Shujun Li, Der-Chyuan Lou and Dan Zhang, "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)", Journal of Systems and Software, Volume 79, Number 2, pp. 253-258, 2006 © Elsevier Science B. V.
- Chengqing Li, Shujun Li, Guanrong Chen and Dan Zhang, "Cryptanalysis of a data security protection scheme for VoIP," IEE Proceedings - Vision, Image & Signal Processing (now succeeded by IET Image Processing, IET Signal Processing and IET Computer Vision), Volume 153, Number 1, pp. 1-10, 2006 © IET (former IEE)
2005
- Shujun Li, Guanrong Chen and Xuanqin Mou, "On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps," International Journal of Bifurcation and Chaos (Tutorial-Review Section), Volume 15, Number 10, pp. 3119-3151, 2005 © World Scientific Publishing Co.
- Kwok-wo Wong, Kwan-Pok Man, Shujun Li and Xiaofeng Liao, "A More Secure Chaotic Cryptographic Scheme based on the Dynamic Look-up Table," Circuits, Systems & Signal Processing, Volume 24, Number 5, pp. 571-584, 2005 © Birkhäuser Boston Inc. (Part of Springer)
- Gonzalo Álvarez, Luis Hernández, Jaime Muñóz, Fausto Montoya and Shujun Li, "Security analysis of communication system based on the synchronization of different order chaotic systems," Physics Letters A, Volume 345, Number 4-6, pp. 245-250, 2005 © Elsevier Science B. V.
- Chengqing Li, Shujun Li, Guanrong Chen, Gang Chen and Lei Hu, "Cryptanalysis of a New Signal Security System for Multimedia Data Transmission," EURASIP Journal on Applied Signal Processing, Volume 2005, Number 8, pp. 1277-1288, 2005 © Hindawi Publishing Corporation
- Shujun Li, Gonzalo Álvarez, Guanrong Chen and Xuanqin Mou, "Breaking a chaos-noise-based secure communication scheme," Chaos, Volume 15, Number 1, Article Number 013703, 10 pages, 2005 © AIP
- Shujun Li, Gonzalo Álvarez and Guanrong Chen, "Breaking a chaos-based secure communication scheme designed by an improved modulation method," Chaos, Solitons & Fractals, Volume 25, Number 1, pp. 109-120, 2005 © Elsevier Science B. V.
- G. Álvarez, Shujun Li, F. Montoya, G. Pastor and M. Romera, "Breaking projective chaos synchronization secure communication using filtering and generalized synchronization," Chaos, Solitons & Fractals, Volume 24, Number 3, pp. 775-783, 2005 © Elsevier Science B. V.
- Chengqing Li, Shujun Li, Dan Zhang and Guanrong Chen, "Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher," in Advances in Neural Networks - ISNN 2005: Second International Symposium on Neural Networks, Chongqing, China, May 30 - June 1, 2005, Proceedings, Part II, Lecture Notes in Computer Science, Volume 3497, pp. 630-636, 2005 © Springer
- Chengqing Li, Xinxiao Li, Shujun Li and Guanrong Chen, "Cryptanalysis of a Multistage Encryption System," in Proceedings of 2005 IEEE International Symposium on Circuits and Systems (ISCAS 2005, Kobe, Japan, May 23-26, 2005), pp. 880-883, 2005 © IEEE Copyright Declaration
- Daniel Socek, Shujun Li, Spyros S. Magliveras and Borko Furht, "Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption," in Proceedings of the First IEEE/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2005, Athens, Greece, September 5-9, 2005), pp. 406-408 (short paper), 2005 © IEEE Computer Society
2004
- Shujun Li, Guanrong Chen and Xuanqin Mou, "On the Security of the Yi-Tan-Siew Chaotic Cipher," IEEE Transactions on Circuits and Systems-II: Express Briefs, Volume 51, Number 12, pp. 665-669, 2004 © IEEE
- Shujun Li, Guanrong Chen, Kwok-Wo Wong, Xuanqin Mou and Yuanlong Cai, "Baptista-type chaotic cryptosystems: problems and countermeasures," Physics Letters A, Volume 332, Number 5-6, pp. 368-375, 2004 © Elsevier Science B. V.
- Gonzalo Álvarez and Shujun Li, "Breaking network security based on synchronized chaos," Computer Communications, Volume 27, Number 16, pp. 1679-1681, 2004 © Elsevier Science B. V.
- Chengqing Li, Shujun Li, Dan Zhang and Guanrong Chen, "Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme," in Advances in Multimedia Information Processing - PCM 2004: 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30 - December 3, 2004. Proceedings, Part III, Lecture Notes in Computer Science, Volume 3333, pp. 418-425, Springer-Verlag, Berlin, 2004 © Springer
2003
- Shujun Li, Xuanqin Mou, Boliya L. Yang, Zhen Ji and Jihong Zhang, "Problems with a Probabilistic Encryption Scheme Based on Chaotic Systems," International Journal of Bifurcation and Chaos, Volume 13, Number 10, pp. 3063-3077, 2003 © World Scientific Publishing Co.
- Shujun Li, Xuanqin Mou, Yuanlong Cai, Zhen Ji and Jihong Zhang, "On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision," Computer Physics Communications, Volume 153, Number 1, pp. 52-58, 2003 © Elsevier Science B. V.
- Shujun Li, Xuanqin Mou, Zhen Ji, Jihong Zhang and Yuanlong Cai, "Performance analysis of Jakimoski-Kocarev attack on a class of chaotic cryptosystems," Physics Letters A, Volume 307, Number 1, pp. 22-28, 2003 © Elsevier Science B. V.
- Shujun Li, Xuanqin Mou, Zhen Ji and Jihong Zhang, "Cryptanalysis of a Class of Chaotic Stream Ciphers (一类混沌流密码的分析)," Journal of Electronics & Information Technology (《电子与信息学报》), Volume 25, Number 4, pp. 473-478, 2003 © Institute of Electronics, Chinese Academy of Sciences (中科院电子所)
2002
- Shujun Li and Xuan Zheng, "On the Security of an Image Encryption Method," in Proceedings of 2002 IEEE International Conference on Image Processing (ICIP 2002, Rochester, NY, USA, September 22-25, 2002), Volume 2 of 3, pp. 925-928, 2002 © IEEE Copyright Declaration
- Shujun Li and Xuan Zheng, "Cryptanalysis of a Chaotic Image Encryption Method," in Proceedings of 2002 IEEE International Symposium on Circuits and Systems (ISCAS 2002, Scottsdale, Arizona, May 26-29, 2002), Volume 2 of 5, pp. 708-711, 2002 © IEEE Copyright Declaration
- Shujun Li, Xuan Zheng, Xuanqin Mou and Yuanlong Cai, "Chaotic Encryption Scheme for Real-Time Digital Video," in Real-Time Imaging VI (part of proceedings of IS&T/SPIE's 14th Annual Symposium on Electronic Imaging, San Jose, CA, USA, January 20-25, 2002), Proceedings of SPIE, Volume 4666, pp. 149-160, 2002 © SPIE - The International Society for Optical Engineering
Note that the CVES system proposed in this paper is not sufficiently secure against chosen-plaintext attack. See Chapter 9 of Shujun Li's PhD thesis for an enhanced edition without this security flaw.
2001
- Shujun Li, Xuanqin Mou and Yuanlong Cai, "Improving security of a chaotic encryption approach," Physics Letters A, Volume 290, Number 3-4, pp. 127-133, 2001 © Elsevier Science B. V.
- Shujun Li, Qi Li, Wenmin Li, Xuanqin Mou and Yuanlong Cai, "Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding," in Cryptography and Coding: 8th IMA International Conference Cirencester, UK, December 17-19, 2001. Proceedings, Lecture Notes in Computer Science, Volume 2260, pp. 205-221, 2001 © Springer
- Shujun Li, Xuanqin Mou and Yuanlong Cai, "Pseudo-Random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography," in Progress in Cryptology — INDOCRYPT 2001: Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001. Proceedings, Lecture Notes in Computer Science, Volume 2247, pp. 316-329, 2001 © Springer
Reports
- Virginia N.L. Franqueira, Shujun Li and others (as co-editors), Digital Data Deception Technology Watch Newsletters, 12 issues (including coverage on Chinese research papers and resources), 2020-22 © Institute of Cyber Security for Society (iCSS), University of Kent
- Krysia Emily Waldock, Shujun Li and Virginia N.L. Franqueira (survey co-designers and co-analysts), "Cyber Security in UK Schools Report 2022: How well protected are schools and colleges in England and Wales?" technical report, 21 pages, April 2022, sponsored by Bitdefender © SWGfL
- Haiyue Yuan and Shujun Li, "Cyber Security Risks of Net Zero Technologies," technical report, 28 pages, April 2022 © DCMS (Department for Digital, Culture, Media and Sport), UK Government
- Krysia Emily Waldock, Vince Miller, Shujun Li and Virginia N.L. Franqueira, "Pre-University Cyber Security Education: A report on developing cyber skills amongst children and young people," technical report, 159 pages, February 2022, work funded by Global Affairs Canada © Global Forum on Cyber Expertise (GFCE)
- Shujun Li (project co-lead and main report editor) and others, "Impact of COVID-19 on Chinese Applicants' Decisions to Study in the UK: A survey report," technical report, 33 pages, June 2020 © Association of British Chinese Professors (ABCP)
- Mandeep K. Dhami, Shujun Li, Ahmad Natour and Anthony Ho, "Digital Forensics – Standards," technical report, 80 pages, June 2012 © Home Office, UK Government (A substantially updated version of this report appeared as a book chapter in 2015.)
Book Chapters
- 李树钧、卢扬,“人工智能与网络空间安全:黑(攻)与白(防)? ”,《人工智能与未来社会发展》第八章,郭毅可主编,119-156页,2020年出版 © 科学技术文献出版社
(Shujun Li and Yang Lu, "AI and Cyber Security: Black (Offence) and White (Defence)?" Chapter 8 of AI and Its Impact on Future Society, edited by Yi-Ke Guo, pp. 119-156, 2020 © Scientific and Technical Documentation Press) - Roland Schmitz, Shujun Li, Christos Grecos and Xinpeng Zhang, "Commutative Watermarking-Encryption of Multimedia Data Based on Histograms," Chapter 6 of Intelligent Innovations in Multimedia Data Engineering and Management, edited by Siddhartha Bhattacharyya, pp. 141-163, 2018 © IGI Global
- Shujun Li and Anthony T.S. Ho, "Digital Forensics Laboratories in Operation: How are Multimedia Data and Devices Handled?" Chapter 1 of Handbook of Digital Forensics of Multimedia Data and Devices, edited by Anthony T.S. Ho and Shujun Li, pp. 3-37, 2015 © John Wiley & Sons, Inc. and IEEE Press
- Shujun Li, Mandeep K. Dhami and Anthony T.S. Ho, "Standards and Best Practices in Digital and Multimedia Forensics," Chapter 2 of Handbook of Digital Forensics of Multimedia Data and Devices, edited by Anthony T.S. Ho and Shujun Li, pp. 38-93, 2015 © John Wiley & Sons, Inc. and IEEE Press
- Shujun Li, "Perceptual Encryption of Digital Images and Videos," in Perceptual Digital Imaging: Methods and Applications, edited by Rastislav Lukac, Chapter 14, pp. 431-468, 2012 © CRC Press (part of Taylor & Francis Group, LLC)
- Shujun Li, "On the Performance of Secret Entropy Coding: A Perspective Beyond Security," in Autonomous Systems: Developments and Trends, edited by Herwig Unger, Kyandoghere Kyamaky and Janusz Kacprzyk, Studies in Computational Intelligence, Volume 391, pp. 389-401, 2011 © Springer
- Gonzalo Alvarez, José María Amigó, David Arroyo and Shujun Li, "Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers," in Chaos-Based Cryptography: Theory, Algorithms and Applications, edited by Ljupco Kocarev and Shiguo Lian, Studies in Computational Intelligence, Volume 354, pp. 257-295, 2011 © Springer
- Shujun Li, Zhong Li and Wolfgang A. Halang, "Multimedia Encryption," article in Encyclopedia of Multimedia Technology and Networking, edited by Margherita Pagani, Volume II, pp. 972-977, 2008 © IGI Global
- Shujun Li, Guanrong Chen and Xuan Zheng, "Chaos-Based Encryption for Digital Images and Videos," Chapter 4 of Multimedia Security Handbook (online version), edited by Borko Furht and Darko Kirovski, pp. 133-167, 2004 © CRC Press (currently part of Taylor & Francis Group, LLC)
This book was republished in 2006 by Auerbach Publications (also part of Taylor & Francis Group, LLC) with a different title "Multimedia Encryption and Authentication Techniques and Applications".
PhD Theses
Own PhD Thesis
Shujun Li, "Analyses and New Designs of Digital Chaotic Ciphers (数字化混沌密码的分析与设计)," PhD thesis, School of Electronic and Information Engineering, Xi'an Jiaotong University, supervised by Prof. Yuanlong Cai and Prof. Xuanqin Mou, submitted in April 2003, defense passed on 13 June 2003, approved on 30 June 2003 (last modified on 16 November 2007, to correct minor errors and to update references) (2004 Outstanding PhD Thesis Award, Education Department of Shaanxi Provincial Government (陕西省教育厅); 2004 Outstanding PhD Thesis Award, Xi'an Jiaotong University (西安交通大学))Note: The survey on chaotic cryptography included in Chapter 2 of the thesis has been outdated to some extent, see the following two talks that Shujun LI delivered in 2005 for more information: Digital Chaotic Ciphers (, 1.03MB), Analog Chaos-Based Secure Communications (, 4.34MB). For an extended version of Chapter 3, see the paper "On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps" () published in International Journal of Bifurcation and Chaos in 2005.
PhD Theses Supervised as Principal Supervisor or Co-Supervisor
- Sharifah Roziah Binti Mohd Kassim, "The study of the operational practices of national CSIRTS regarding the Use of free tools and public data in supporting computer security incident response," University of Kent, UK, 2024
- Ali Raza, "Secure and Privacy-preserving Federated Learning with Explainable Artificial Intelligence for Smart Healthcare System," University of Kent, UK, 2023
- Saeed Ibrahim Saeed Alqahtani, "Mobile privacy leakage detection and prevention: from technical solutions to user experience," University of Surrey, UK, 2020
- Nouf Aljaffan, "Password security and usability: from password checkers to a new framework for user authentication," University of Surrey, UK, 2018
- Junaid Jameel Ahmad, "Secure Computing with the MPEG RVC Framework," University of Konstanz, Germany, 2012
PhD Theses Supervised as Secondary Supervisor
- Sarah Turner, "Approaches to Support Families' Engagement with Cyber Security for Home IoT Devices," University of Kent, UK, 2023 (principal supervisor Dr Jason Nurse)
Standardization Contributions
International Standard Co-Edited
- ISO/IEC 23001-4:2011 "Information technology – MPEG systems technologies – Part 4: Codec configuration representation", 2nd edition of the MPEG RVC (Reconfigurable Video Coding) standard, as lead editor (awarded an ISO/IEC Certificate of Appreciation for this work)
Input Documents
2011
- Junaid Jameel Ahmad and Shujun Li, "Extending the Comparative Study on the Performance of C Code Automatically Generated by ORCC from RVC-CAL Code to a Resource-Constrained Embedded System," ISO/IEC JTC1/SC29/WG11, MPEG2011/m21289, 97th MPEG Meeting, Torino, Italy, July 2011
- Junaid Jameel Ahmad and Shujun Li, "Performance Benchmarking of C Code Automatically Generated by ORCC from RVC-CAL Code on a Quad-Core Machine," ISO/IEC JTC1/SC29/WG11, MPEG2011/m21250, 97th MPEG Meeting, Torino, Italy, July 2011
- Junaid Jameel Ahmad and Shujun Li, "Evaluating the Support of Handling Huge XDF Networks by the Open RVC-CAL Compiler (ORCC) and the Graphiti-Editor," ISO/IEC JTC1/SC29/WG11, MPEG2011/m21249, 97th MPEG Meeting, Torino, Italy, July 2011
- Junaid Jameel Ahmad, Shujun Li, Endri Bezati and Marco Mattavelli, "Building Joint Image Encryption-Encoding (JIEE) and Compressed Domain Image Watermarking Systems in the RVC Framework," ISO/IEC JTC1/SC29/WG11, MPEG2011/m21188, 97th MPEG Meeting, Torino, Italy, July 2011
- Junaid Jameel Ahmad, Shujun Li, Ihab Amer and Marco Mattavelli, "Building Joint MPEG-4 AVC Video Encryption-Encoding (JVEE) System in the RVC Framework," ISO/IEC JTC1/SC29/WG11, MPEG2011/m21185, 97th MPEG Meeting, Torino, Italy, July 2011
- Junaid Jameel Ahmad and Shujun Li, "A comparative study on the performance of C code automatically generated by ORCC from RVC-CAL code," ISO/IEC JTC1/SC29/WG11, MPEG2011/m19383, 95th MPEG Meeting, Daegu, South Korea, January 2011
2010
- Marco Mattavelli, Mickaël Raulet, Shujun Li and Jörn W. Janneck, "Proposed requirements for RVC and RGC specification languages and solution," ISO/IEC JTC1/SC29/WG11, MPEG2010/m18614, 94th MPEG Meeting, Guangzhou, China, October 2010
- Jörn W. Janneck, Marco Mattavelli, Matthieu Wipliez, Mickaël Raulet, Shujun Li, Johan Eker, Carl Von Platen, Ghislain Roquier, Ihab Amer, Christophe Lucarz, Pascal Faure and Junaid Jameel Ahmad, "A proposal of RVC-CAL extensions for improved support of I/O processing," ISO/IEC JTC1/SC29/WG11, MPEG2010/m18460, 94th MPEG Meeting, Guangzhou, China, October 2010
- Jörn W. Janneck, Mickael Raulet, Matthieu Wiplietz, Johan Eker, Ghislain Roquier, Ihab Amer, Christophe Lucarz, Shujun Li, Junaid Jameel Ahmad and Marco Mattavelli, "Writing dataflow networks components (FUs) with different models of computations using RVC-CAL: a tutorial," ISO/IEC JTC1/SC29/WG11, MPEG2010/m18458, 94th MPEG Meeting, Guangzhou, China, October 2010
- Junaid Jameel Ahmad, Shujun Li, Marco Mattavelli, Matthieu Wipliez, Mickaël Raulet, "Crypto Tools Library (CTL): Applying RVC-CAL to Multimedia Security Applications," ISO/IEC JTC1/SC29/WG11, MPEG2010/m18404, 94th MPEG Meeting, Guangzhou, China, October 2010
- Shujun Li, Marco Mattavelli, Mickaël Raulet, Matthieu Wipliez, Jörn W. Janneck, Johan Eker, Carl Von Platen, Ghislain Roquier, Beilu Shao, Christophe Lucarz and Pascal Faure, "Proposed corrections and new changes to ISO/IEC 23001-4:2009," ISO/IEC JTC1/SC29/WG11, MPEG2010/m17806, 93rd MPEG Meeting, Geneva, Switzerland, July 2010
2009
- Shujun Li, Junaid Jameel Ahmad, Ihab Amer and Marco Mattavelli, "Extending RVC for Wireless Multimedia Sensor Networks and Cryptography Applications," ISO/IEC JTC1/SC29/WG11, MPEG2009/m16989, 90th MPEG Meeting, Xi'an, China, October 2009
Output Documents
2011
- Mickaël Raulet and Shujun Li, "Text of ISO/IEC 23001-4:201X/PDAM 1 CAL Language Extensions," ISO/IEC JTC1/SC29/WG11, MPEG2011/w12370, 98th MPEG Meeting, Geneva, Switzerland, November/December 2011
- Shujun Li, Marco Mattavelli and Mickaël Raulet, "Text of ISO/IEC 23001-4:201x 2nd edition," ISO/IEC JTC1/SC29/WG11, MPEG2011/w12181, 97th MPEG Meeting, Torino, Italy, July 2011
- Mickaël Raulet and Shujun Li, "WD4 of ISO/IEC 23001-4/Amd.1 CAL Extensions," ISO/IEC JTC1/SC29/WG11, MPEG2011/w12180, 97th MPEG Meeting, Torino, Italy, July 2011
- Mickaël Raulet and Shujun Li, "WD3 of ISO/IEC 23001-4/Amd.1 CAL Extensions," ISO/IEC JTC1/SC29/WG11, MPEG2011/w11983, 96th MPEG Meeting, Geneva, Switzerland, March 2011
- Shujun Li, Marco Mattavelli and Mickaël Raulet, "Text of ISO/IEC 23001-4/COR1," ISO/IEC JTC1/SC29/WG11, MPEG2011/w11813, 95th MPEG Meeting, Daegu, South Korea, January 2011
2010
- Hwa Seon Shin, Kazuo Sugimoto, Ihab Amer, Marco Mattavelli, Gwo Giun Lee and Shujun Li, "Description of Core Experiments in RVC (Reconfigurable Video Coding)," ISO/IEC JTC1/SC29/WG11, MPEG2010/w11628, 94th MPEG Meeting, Guangzhou, China, October 2010
- Mickaël Raulet and Shujun Li, "Working Draft of ISO/IEC 23001-4/Amd.1," ISO/IEC JTC1/SC29/WG11, MPEG2010/w11623, 94th MPEG Meeting, Guangzhou, China, October 2010
- Shujun Li, Mickaël Raulet and Marco Mattavelli, "Text of ISO/IEC 23001-4/DCOR1," ISO/IEC JTC1/SC29/WG11, MPEG2010/w11622, 94th MPEG Meeting, Guangzhou, China, October 2010
- Shujun Li, "Process for Extending MPEG RVC VTL and Corresponding Verification Testing Procedures," ISO/IEC JTC1/SC29/WG11, MPEG2010/w11474, 93rd MPEG Meeting, Geneva, Switzerland, July 2010
- Hwa Seon Shin, Kazuo Sugimoto, Ihab Amer, Marco Mattavelli, Gwo Giun Lee and Shujun Li, "Description of Core Experiments in RVC," ISO/IEC JTC1/SC29/WG11, MPEG2010/w11473, 93rd MPEG Meeting, Geneva, Switzerland, July 2010
- Shujun Li, "Defect Report on ISO/IEC 23001-4," ISO/IEC JTC1/SC29/WG11, MPEG2010/w11469, 93rd MPEG Meeting, Geneva, Switzerland, July 2010
Magazine/E-Letter Articles
2022
- Shujun Li, Sarah Turner, Rahime Belen-Saglam and Virginia N. L. Franqueira, "Online battles: combatting false information and reducing online risks," Futurum Careers, Issue 18, Part I, pp. 12-15, 2023, DOI:10.33424/FUTURUM302, released under the Creative Commons license: Attribution-NonCommercial 4.0 International (CC BY-NC 4.0)
2021
- Shujun Li and Rahime Belen Sağlam, "When the GDPR Meets (Public) Blockchains: Looking through the Lens of Public Communications to Users," PenTest Magazine, Issue 3 on "Privilege Escalation in Practice", pp. 72-76, 2021 © Authors
2020
- Shujun Li and Jason Nurse, "How to Beat the Cybercriminals and Stay Safe Online," Futurum Careers, Issue 4, pp. 32-33, 2020, DOI:10.33424/FUTURUM43, released under the Creative Commons license: Attribution-NonCommercial 4.0 International (CC BY-NC 4.0)
2009
- Shujun Li, "Encryption-Friendly Multimedia Coding and Communications: Is it Necessary and Possible?" E-Letter of IEEE Communications Society's Technical Committee on Multimedia Communications, Volume 4, Number 1, pp. 15-18, February 2009
2004
- Ming Yang, Nikolaos Bourbakis and Shujun Li, "Data-Image-Video Encryption," IEEE Potentials, Volume 23, Number 3, pp. 28-34, August-September, 2004 © IEEE
Note that the security evaluations listed in the tables of this article are about ciphertext-only attacks, i.e., about the brute-force attack of the secret key. Many image and video ciphers are actually insecure against known/chosen-plaintext attacks.
Preprints
Author profile @False Information and AI-Generated Data
- Jiazhou Ji, Ruizhe Li, Shujun Li, Jie Guo, Weidong Qiu, Zheng Huang, Chiyu Chen, Xiaoyu Jiang and Xinru Lu, "Detecting Machine-Generated Texts: Not Just 'AI vs Humans' and Explainability is Complicated," arXiv:2406.18259 [cs.CL], submitted on 26 June 2024
- Haiyue Yuan, Enes Altuncu, Shujun Li and Can Baskent, "Graphical Models of False Information and Fact Checking Ecosystems," arXiv:2210.04541 [cs.CR], submitted on 10 October 2022
- Keenan Jones, Enes Altuncu, Virginia N. L. Franqueira, Yichao Wang and Shujun Li, "A Comprehensive Survey of Natural Language Generation Advances from the Perspective of Digital Deception," arXiv:2208.05757 [cs.CL], submitted on 11 August 2022
- Can Başkent, Sanjay Bhattacherjee and Shujun Li, "Applications of Game Theory and Epistemic Logic to Fact-Checking," technical report, KAR (Kent Academic Repository), id:97346, submitted on 9 October 2022
Privacy and Data Protection
- Peng Tang, Xin Li, Yuxin Chen, Weidong Qiu, Haochen Mei, Allison Holmes, Fenghua Li and Shujun Li, "A Comprehensive Study on GDPR-Oriented Analysis of Privacy Policies: Taxonomy, Corpus and GDPR Concept Classifiers ," arXiv:2410.04754v1 [cs.CR], submitted on 7 October 2024
Cyber Skills Development
- Krysia Waldock, Virginia N.L. Franqueira, Vincent Miller and Shujun Li, "Pre-University Cyber Security Education: A Global Comparison of National Curricula," SSRN preprint ID 4932552, submitted on 19 September 2024
User Authentication
- Yangde Wang, Weidong Qiu, Weicheng Zhang, Hao Tian and Shujun Li, "SE#PCFG: Semantically Enhanced PCFG for Password Analysis and Cracking," arXiv:2306.06824 [cs.CR], submitted on 12 June 2023
- Shujun Li and Heung-Yeung Shum, "Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI," IACR's Cryptology ePrint Archive: Report 2005/268, received on 12 Aug 2005 (an early version has been appeared online in Elesevier Science's Comuter Science Preprint Archive, Volume 2004, Number 3, pp. 21-69, 2004)
- Shujun Li and Heung-Yeung Shum, "Secure Human-Computer Identification against Peeping Attacks (SecHCI): A Survey," technical report, Jan. 2003 (an early version has been published online in Elesevier Science's Comuter Science Preprint Archive, Volume 2003, Number 1, pp. 5-57, 2003)
Federated Learning
- Ali Raza, Shujun Li, Kim-Phuc Tran and Ludovic Koehl, "Detection of Poisoning Attacks with Anomaly Detection in Federated Learning for Healthcare Applications: A Machine Learning Approach," arXiv:2207.08486 [cs.LG], first submitted on 18 July 2022 (v1), revised on 9 May 2023 (v2)
- Ali Raza, Kim Phuc Tran, Ludovic Koehl, Shujun Li, Xianyi Zeng and Khaled Benzaidi, "Lightweight Transformer in Federated Setting for Human Activity Recognition," arXiv:2110.00244 [cs.CV], first submitted on 1 October 2021 (v1), last revised on 4 November 2022 (v3)
Incident Management
- Sharifah Roziah Binti Mohd Kassim, Shujun Li and Budi Arief, "The Use of Public Data and Free Tools in National CSIRTs' Operational Practices: A Systematic Literature Review," arXiv:2306.07988 [cs.DL], submitted on 9 June 2023
Intrusion Detection
- Aamo Iorliam, Santosh Tirunagari, Anthony T.S. Ho, Shujun Li, Adrian Waller and Norman Poh, "'Flow Size Difference' Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law," arXiv:1609.04214 [cs.CR], first submitted on 14 September 2016 (v1), revised on 20 January 2017 (v2)
Visual Quality Assessment
- Markus Wagner, Hanhe Lin, Shujun Li and Dietmar Saupe, "Algorithm Selection for Image Quality Assessment," arXiv:1908.06911, submitted on 19 August 2019
Multimedia Encryption
- Ruiyuan Lin, Sheng Liu, Jun Jiang, Shujun Li, Chengqing Li and C.-C. Jay Kuo, "Recovering Sign Bits of DCT Coefficients in Digital Images as an Optimization Problem," arXiv:2211.01096 [cs.CV], submitted on 2 November 2022
- Shujun Li and Bharat Bhargava, "A Note on 'MPEG Video Encryption Algorithms'," a short note on the result given in the Appendix of [Multimedia Tools and Applications, 24: 57–79, 2004], August 2004
Cryptanalysis of Chaos-Based Secure Communications
- Gonzalo Alvarez and Shujun Li, "Estimating short-time period to break different types of chaotic modulation based secure communications," arXiv:nlin/0406039 [nlin.CD], submitted on 18 Jun 2004
Chaos Theory
- Shujun Li, "When Chaos Meets Computers," arXiv:nlin/0405038, first submitted on 14 May 2004 (v1), revised on 12 December 2005 (v3)
- Gonzalo Álvarez, Shujun Li, Jinhu Lü and Guanrong Chen, "Inherent Frequency and Spatial Decomposition of the Lorenz Chaotic Attractor," arXiv:nlin/0406031, first submitted on 16 June 2004 (v1), revised on 17 June 2004 (v2)
Pure Mathematics
- Shujun Li, "Permutation Polynomials modulo m," arXiv:math.NT/0509523, first submitted on 22 September 2005 (v1), revised on 1 December 2005 (v6)
- Shujun Li, "Null Polynomials modulo m," arXiv:math.NT/0510217, first submitted on 11 October 2005 (v1), revised on 14 November 2005 (v2)
- Shujun Li, "Evaluating Determinants of Two Classes of Special Matrices," arXiv:math.NT/0509350, first submitted on 15 September 2005 (v1), last revised on 13 October 2005 (v5)
Other Early Papers
- Shujun Li, Peng Wang, Xuanqin Mu and Yuanlong Cai, "Research on Non-Linear Dynamic Systems Employing Color Space," in 2000 5th International Conference on Signal Processing Proceedings (WCC-ICSP 2000, 21-25 August, 2000, Beijing, China), Volume 1 of 3, pp. 285-289, 2000 © Publishing House of Electronics Industry (电子工业出版社) and IEEE
- Shujun Li, Zhen Ji, Xuanqin Mou and Yifeng Jiang, "The Implement of Remote Medical Treatment by Internet & RAS (利用Internet和RAS实现远程医疗)", Chinese Journal of Medical Instrumentation (《中国医疗器械杂志》), Volume 23, Number 1, pp. 19-23 & 33, 1999
- Yifeng Jiang, Zhen Ji, Xuanqin Mou and Shujun Li, "The Design and Implement of PACS (医用数字影像设备PACS组件的设计)", Chinese Journal of Medical Instrumentation (《中国医疗器械杂志》), Volume 23, Number 2, pp. 63-67, 1999
- Shujun Li, Zhen Ji, Xuanqin Mou and Yifeng Jiang, "The Design of RAS (Remote Access Service) Client on Windows Platform (Windows远程访问服务(RAS)客户程序的设计)", Application Research of Computers (《计算机应用研究》), Volume 15, Number 2(J), pp. 178-180, 1998
Scientific Software
- Junaid Jameel Ahmad and Shujun Li, "Crypto Tools Library (CTL) based on RVC-CAL," 2010-2012
- Shujun Li, "mpegSyntaxer - Visual Syntax Viewer of MPEG-1/2 Videos," version 1.0 beta, a joint product of the Centre for Chaos and Complex Networks (CCCN) and the Applied R&D Centres, City University of Hong Kong, 2005 © City University of Hong Kong
- Shujun Li, SecHCI: Secure Human-Computer Identification System against Peeping (Observer) Attacks 2002, last updated on 24 July, 2004
- Shujun Li, ChinaTEX Project: TEX/LATEX Tools, Packages and Templates, 2001-present
Filed Patent Applications
- Shujun Li and Nouf Aljaffan (as co-inventors), "Improved Authentication," Publication Number WO/2018/130852, International Application Number PCT/GB2018/050098, published on 19 July 2018, original GB application filed on 13 January 2017 (Application Number 1700649.5)
- Shujun Li and Anthony T S Ho (as co-inventors), "Hiding Information in a Digital Environment", Publication Number WO/2016/075459, International Application Number PCT/GB2015/053412, GB application filed on 11th November 2014, international application filed on 11th November 2015, published by WIPO (World Intellectual Property Organization) on 19th May 2016, European patent application filed on 9 June 2017 (Application Number 15794630.2)