default search action
Shujun Li
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j59]Zhanbo Liang, Jie Guo, Weidong Qiu, Zheng Huang, Shujun Li:
When graph convolution meets double attention: online privacy disclosure detection with multi-label text classification. Data Min. Knowl. Discov. 38(3): 1171-1192 (2024) - [j58]Kai-Fung Chu, Haiyue Yuan, Jinsheng Yuan, Weisi Guo, Nazmiye Balta-Ozkan, Shujun Li:
A Survey of Artificial Intelligence-Related Cybersecurity Risks and Countermeasures in Mobility-as-a-Service. IEEE Intell. Transp. Syst. Mag. 16(6): 37-55 (2024) - [j57]Jingrong Liu, Shujun Li, Wanfang Zhang:
Effects of providing EFL learners with additional online and face-to-face practise opportunities to promote active learning in higher education. J. Comput. Assist. Learn. 40(3): 1246-1260 (2024) - [j56]Ruiyuan Lin, Sheng Liu, Jun Jiang, Shujun Li, Chengqing Li, C.-C. Jay Kuo:
Recovering sign bits of DCT coefficients in digital images as an optimization problem. J. Vis. Commun. Image Represent. 98: 104045 (2024) - [j55]Nandita Pattnaik, Shujun Li, Jason R. C. Nurse:
Security and Privacy Perspectives of People Living in Shared Home Environments. Proc. ACM Hum. Comput. Interact. 8(CSCW2): 1-39 (2024) - [c82]Haozhang Li, Yangde Wang, Weidong Qiu, Shujun Li, Peng Tang:
PassTSL: Modeling Human-Created Passwords Through Two-Stage Learning. ACISP (3) 2024: 404-423 - [c81]Yining Yuan, Kevin McAreavey, Shujun Li, Weiru Liu:
Multi-Granular Evaluation of Diverse Counterfactual Explanations. ICAART (2) 2024: 186-197 - [c80]Chenxing Wei, Weiwei Yu, Shujun Li, Baoxin Xiao:
Research on Pose Adjustment Algorithm for Large Components Based on Parallel Robots. ICSR + BioMed 2024: 178-187 - [e8]Shujun Li, Kovila P. L. Coopamootoo, Michael Sirivianos:
European Interdisciplinary Cybersecurity Conference, EICC 2024, Xanthi, Greece, June 5-6, 2024. ACM 2024 [contents] - [i73]Jiazhou Ji, Ruizhe Li, Shujun Li, Jie Guo, Weidong Qiu, Zheng Huang, Chiyu Chen, Xiaoyu Jiang, Xinru Lu:
Detecting Machine-Generated Texts: Not Just "AI vs Humans" and Explainability is Complicated. CoRR abs/2406.18259 (2024) - [i72]Yangde Wang, Haozhang Li, Weidong Qiu, Shujun Li, Peng Tang:
PassTSL: Modeling Human-Created Passwords through Two-Stage Learning. CoRR abs/2407.14145 (2024) - [i71]Nandita Pattnaik, Shujun Li, Jason R. C. Nurse:
Security and Privacy Perspectives of People Living in Shared Home Environments. CoRR abs/2409.09363 (2024) - [i70]Peng Tang, Xin Li, Yuxin Chen, Weidong Qiu, Haochen Mei, Allison Holmes, Fenghua Li, Shujun Li:
A Comprehensive Study on GDPR-Oriented Analysis of Privacy Policies: Taxonomy, Corpus and GDPR Concept Classifiers. CoRR abs/2410.04754 (2024) - [i69]Haiyue Yuan, Ali Raza, Nikolay Matyunin, Jibesh Patra, Shujun Li:
A Graph-Based Model for Vehicle-Centric Data Sharing Ecosystem. CoRR abs/2410.22897 (2024) - [i68]Kai-Fung Chu, Haiyue Yuan, Jinsheng Yuan, Weisi Guo, Nazmiye Balta-Ozkan, Shujun Li:
A Survey of AI-Related Cyber Security Risks and Countermeasures in Mobility-as-a-Service. CoRR abs/2411.05681 (2024) - 2023
- [j54]Nandita Pattnaik, Shujun Li, Jason R. C. Nurse:
Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on twitter. Comput. Secur. 125: 103008 (2023) - [j53]Nandita Pattnaik, Shujun Li, Jason R. C. Nurse:
A Survey of User Perspectives on Security and Privacy in a Home Networking Environment. ACM Comput. Surv. 55(9): 180:1-180:38 (2023) - [j52]Sharifah Roziah Binti Mohd Kassim, Shujun Li, Budi Arief:
Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions. DTRAP 4(3): 45:1-45:24 (2023) - [j51]Ali Raza, Kim Phuc Tran, Ludovic Koehl, Shujun Li:
AnoFed: Adaptive anomaly detection for digital health using transformer-based federated learning and support vector data description. Eng. Appl. Artif. Intell. 121: 106051 (2023) - [c79]Haiyue Yuan, Matthew Boakes, Xiao Ma, Dongmei Cao, Shujun Li:
Visualising Personal Data Flows: Insights from a Case Study of Booking.com. CAiSE Forum 2023: 52-60 - [c78]Xin Yuan, Jie Guo, Weidong Qiu, Zheng Huang, Shujun Li:
Support or Refute: Analyzing the Stance of Evidence to Detect Out-of-Context Mis- and Disinformation. EMNLP 2023: 4268-4280 - [c77]Maria Sophia Heering, Haiyue Yuan, Shujun Li:
The Impact of Privacy and Security Attitudes and Concerns of Travellers on Their Willingness to Use Mobility-as-a-Service Systems. ITSC 2023: 5573-5578 - [c76]Ali Raza, Kim Phuc Tran, Ludovic Koehl, Shujun Li:
Proof of Swarm Based Ensemble Learning for Federated Learning Applications. SAC 2023: 152-155 - [c75]Jamie Knott, Haiyue Yuan, Matthew Boakes, Shujun Li:
Cyber Security and Online Safety Education for Schools in the UK: Looking through the Lens of Twitter Data. SAC 2023: 1603-1606 - [c74]Mohamad Imad Mahaini, Shujun Li:
Cyber Security Researchers on Online Social Networks: From the Lens of the UK's ACEs-CSR on Twitter. SocialSec 2023: 129-148 - [c73]Sam Parker, Haiyue Yuan, Shujun Li:
PassViz: An Interactive Visualisation System for Analysing Leaked Passwords. VizSec 2023: 33-42 - [c72]Shujun Li, Li Li, Yiwen Cui, Xueyan Wu:
Big Data-Based Recommendation Algorithm in E-commerce Personalized Marketing. WHICEB (1) 2023: 62-71 - [e7]Shujun Li, Mark Manulis, Atsuko Miyaji:
Network and System Security - 17th International Conference, NSS 2023, Canterbury, UK, August 14-16, 2023, Proceedings. Lecture Notes in Computer Science 13983, Springer 2023, ISBN 978-3-031-39827-8 [contents] - [e6]Budi Arief, Anna Monreale, Michael Sirivianos, Shujun Li:
Security and Privacy in Social Networks and Big Data - 9th International Symposium, SocialSec 2023, Canterbury, UK, August 14-16, 2023, Proceedings. Lecture Notes in Computer Science 14097, Springer 2023, ISBN 978-981-99-5176-5 [contents] - [i67]Haiyue Yuan, Matthew Boakes, Xiao Ma, Dongmei Cao, Shujun Li:
Visualising Personal Data Flows: Insights from a Case Study of Booking.com. CoRR abs/2304.09603 (2023) - [i66]Enes Altuncu, Jason R. C. Nurse, Meryem Bagriacik, Sophie Kaleba, Haiyue Yuan, Lisa Bonheme, Shujun Li:
aedFaCT: Scientific Fact-Checking Made Easier via Semi-Automatic Discovery of Relevant Expert Opinions. CoRR abs/2305.07796 (2023) - [i65]Yangde Wang, Weidong Qiu, Weicheng Zhang, Hao Tian, Shujun Li:
SE#PCFG: Semantically Enhanced PCFG for Password Analysis and Cracking. CoRR abs/2306.06824 (2023) - [i64]Sharifah Roziah Binti Mohd Kassim, Shujun Li, Budi Arief:
The Use of Public Data and Free Tools in National CSIRTs' Operational Practices: A Systematic Literature Review. CoRR abs/2306.07988 (2023) - [i63]Sam Parker, Haiyue Yuan, Shujun Li:
PassViz: A Visualisation System for Analysing Leaked Passwords. CoRR abs/2309.12968 (2023) - [i62]Xin Yuan, Jie Guo, Weidong Qiu, Zheng Huang, Shujun Li:
Support or Refute: Analyzing the Stance of Evidence to Detect Out-of-Context Mis- and Disinformation. CoRR abs/2311.01766 (2023) - [i61]Zhanbo Liang, Jie Guo, Weidong Qiu, Zheng Huang, Shujun Li:
When Graph Convolution Meets Double Attention: Online Privacy Disclosure Detection with Multi-Label Text Classification. CoRR abs/2311.15917 (2023) - [i60]Maria Sophia Heering, Haiyue Yuan, Shujun Li:
The Impact of Privacy and Security Attitudes and Concerns of Travellers on Their Willingness to Use Mobility-as-a-Service Systems. CoRR abs/2312.00519 (2023) - 2022
- [j50]Ali Raza, Kim Phuc Tran, Ludovic Koehl, Shujun Li:
Designing ECG monitoring healthcare system with federated transfer learning and explainable AI. Knowl. Based Syst. 236: 107763 (2022) - [j49]Sarah Turner, Nandita Pattnaik, Jason R. C. Nurse, Shujun Li:
"You Just Assume It Is In There, I Guess": Understanding UK Families' Application and Knowledge of Smart Home Cyber Security. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-34 (2022) - [j48]Yang Lu, Shujun Li:
From data flows to privacy-benefit trade-offs: A user-centric semantic model. Secur. Priv. 5(4) (2022) - [j47]Yang Lu, Shujun Li, Alex Alves Freitas, Athina Ioannou:
How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis. EAI Endorsed Trans. Security Safety 8(30): 3 (2022) - [c71]Sarah Turner, Jason R. C. Nurse, Shujun Li:
"It was hard to find the words": Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices. CHI Extended Abstracts 2022: 34:1-34:8 - [c70]Sharifah Roziah Binti Mohd Kassim, Solahuddin Bin Shamsuddin, Shujun Li, Budi Arief:
How National CSIRTs Operate: Personal Observations and Opinions from MyCERT. DSC 2022: 1-2 - [c69]Haiyue Yuan, Shujun Li:
Cyber Security Risks of Net Zero Technologies. DSC 2022: 1-11 - [c68]Xianglong Wu, Qirong Tang, Fang Wang, Ruiqin Guo, Qing Zhu, Shujun Li, Deyu Tu, Qingyun Liu:
A Robot-Assisted System for Dental Implantation. ICIRA (4) 2022: 15-28 - [c67]Keenan Jones, Jason R. C. Nurse, Shujun Li:
Out of the Shadows: Analyzing Anonymous' Twitter Resurgence during the 2020 Black Lives Matter Protests. ICWSM 2022: 417-428 - [c66]Keenan Jones, Jason R. C. Nurse, Shujun Li:
Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators. ICWSM 2022: 429-440 - [c65]Yang Xu, Jie Guo, Weidong Qiu, Zheng Huang, Enes Altuncu, Shujun Li:
"Comments Matter and The More The Better!": Improving Rumor Detection with User Comments. TrustCom 2022: 383-390 - [e5]Cristina Alcaraz, Liqun Chen, Shujun Li, Pierangela Samarati:
Information and Communications Security - 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022, Proceedings. Lecture Notes in Computer Science 13407, Springer 2022, ISBN 978-3-031-15776-9 [contents] - [i59]Keenan Jones, Jason R. C. Nurse, Shujun Li:
Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators. CoRR abs/2203.09813 (2022) - [i58]Nandita Pattnaik, Shujun Li, Jason R. C. Nurse:
Perspectives of Non-Expert Users on Cyber Security and Privacy: An Analysis of Online Discussions on Twitter. CoRR abs/2206.02156 (2022) - [i57]Sarah Turner, Nandita Pattnaik, Jason R. C. Nurse, Shujun Li:
"You Just Assume It Is In There, I Guess": UK Families' Application And Knowledge Of Smart Home Cyber Security. CoRR abs/2206.03930 (2022) - [i56]Ali Raza, Shujun Li, Kim Phuc Tran, Ludovic Koehl:
Detection of Poisoning Attacks with Anomaly Detection in Federated Learning for Healthcare Applications: A Machine Learning Approach. CoRR abs/2207.08486 (2022) - [i55]Keenan Jones, Enes Altuncu, Virginia N. L. Franqueira, Yichao Wang, Shujun Li:
A Comprehensive Survey of Natural Language Generation Advances from the Perspective of Digital Deception. CoRR abs/2208.05757 (2022) - [i54]Nandita Pattnaik, Shujun Li, Jason R. C. Nurse:
A Survey of User Perspectives on Security and Privacy in a Home Networking Environment. CoRR abs/2208.08193 (2022) - [i53]Enes Altuncu, Virginia N. L. Franqueira, Shujun Li:
Deepfake: Definitions, Performance Metrics and Standards, Datasets and Benchmarks, and a Meta-Review. CoRR abs/2208.10913 (2022) - [i52]Haiyue Yuan, Enes Altuncu, Shujun Li, Can Baskent:
Graphical Models of False Information and Fact Checking Ecosystems. CoRR abs/2208.11582 (2022) - [i51]Rahime Belen Saglam, Enes Altuncu, Yang Lu, Shujun Li:
A Systematic Literature Review of the Tension between the GDPR and Public Blockchain Systems. CoRR abs/2210.04541 (2022) - [i50]Ruiyuan Lin, Sheng Liu, Jun Jiang, Shujun Li, Chengqing Li, C.-C. Jay Kuo:
Recovering Sign Bits of DCT Coefficients in Digital Images as an Optimization Problem. CoRR abs/2211.01096 (2022) - [i49]Enes Altuncu, Jason R. C. Nurse, Yang Xu, Jie Guo, Shujun Li:
Improving Performance of Automatic Keyword Extraction (AKE) Methods Using PoS-Tagging and Enhanced Semantic-Awareness. CoRR abs/2211.05031 (2022) - [i48]Jamie Knott, Haiyue Yuan, Matthew Boakes, Shujun Li:
Cyber Security and Online Safety Education for Schools in the UK: Looking through the Lens of Twitter Data. CoRR abs/2212.13742 (2022) - [i47]Ali Raza, Kim Phuc Tran, Ludovic Koehl, Shujun Li:
Proof of Swarm Based Ensemble Learning for Federated Learning Applications. CoRR abs/2212.14050 (2022) - 2021
- [j46]Guorui Feng, Sheng Li, Haoliang Li, Shujun Li:
Special issue on low complexity methods for multimedia security. Multim. Syst. 27(3): 301-302 (2021) - [j45]Xinhao Sun, Kaixi Wang, Shujun Li:
Audio steganography with less modification to the optimal matching CNV-QIM path with the minimal hamming distance expected value to a secret. Multim. Syst. 27(3): 341-352 (2021) - [j44]Shuqin Zhang, Guangyao Bai, Hong Li, Peipei Liu, Minzhi Zhang, Shujun Li:
Multi-Source Knowledge Reasoning for Data-Driven IoT Security. Sensors 21(22): 7579 (2021) - [j43]Haiyue Yuan, Shujun Li, Patrice Rusconi:
CogTool+: Modeling Human Performance at Large Scale. ACM Trans. Comput. Hum. Interact. 28(2): 15:1-15:38 (2021) - [c64]Mohamad Imad Mahaini, Shujun Li:
Detecting cyber security related Twitter accounts and different sub-groups: a multi-classifier approach. ASONAM 2021: 599-606 - [c63]Sarah Turner, Jason R. C. Nurse, Shujun Li:
When Googling It Doesn't Work: The Challenge of Finding Security Advice for Smart Home Devices. HAISA 2021: 115-126 - [c62]Ingolf Becker, Rebecca Posner, Tasmina Islam, Paul Ekblom, Hervé Borrion, Michael McGuire, Shujun Li:
Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation. HICSS 2021: 1-10 - [c61]Keenan Jones, Jason R. C. Nurse, Shujun Li:
The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter. ICWSM Workshops 2021 - [c60]Shujun Li, Lianzhi Huo:
Remote Sensing Image Change Detection Based on Fully Convolutional Network With Pyramid Attention. IGARSS 2021: 4352-4355 - [e4]Joaquín García-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung:
Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 398, Springer 2021, ISBN 978-3-030-90018-2 [contents] - [e3]Joaquín García-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung:
Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 399, Springer 2021, ISBN 978-3-030-90021-2 [contents] - [i46]Keenan Jones, Jason R. C. Nurse, Shujun Li:
The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter. CoRR abs/2105.03168 (2021) - [i45]Ali Raza, Kim Phuc Tran, Ludovic Koehl, Shujun Li:
Designing ECG Monitoring Healthcare System with Federated Transfer Learning and Explainable AI. CoRR abs/2105.12497 (2021) - [i44]Keenan Jones, Jason R. C. Nurse, Shujun Li:
Out of the Shadows: Analyzing Anonymous' Twitter Resurgence during the 2020 Black Lives Matter Protests. CoRR abs/2107.10554 (2021) - [i43]Sarah Turner, Jason R. C. Nurse, Shujun Li:
When Googling it doesn't work: The challenge of finding security advice for smart home devices. CoRR abs/2108.03107 (2021) - [i42]Ali Raza, Kim Phuc Tran, Ludovic Koehl, Shujun Li, Xianyi Zeng, Khaled Benzaidi:
Lightweight Transformer in Federated Setting for Human Activity Recognition. CoRR abs/2110.00244 (2021) - [i41]Sarah Turner, Jason R. C. Nurse, Shujun Li:
It was hard to find the words: Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices. CoRR abs/2112.09035 (2021) - 2020
- [b1]Haiyue Yuan, Shujun Li, Patrice Rusconi:
Cognitive Modeling for Automated Human Performance Evaluation at Scale. Human-Computer Interaction Series, Springer 2020, ISBN 978-3-030-45703-7, pp. 1-97 - [j42]Çagri B. Aslan, Shujun Li, Fatih V. Çelebi, Hao Tian:
The World of Defacers: Looking Through the Lens of Their Activities on Twitter. IEEE Access 8: 204132-204143 (2020) - [j41]Carlos Javier Hernández-Castro, Shujun Li, María D. R.-Moreno:
All about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks. Comput. Secur. 92: 101758 (2020) - [c59]Rahime Belen Saglam, Çagri B. Aslan, Shujun Li, Lisa Dickson, Ganna Pogrebna:
A Data-Driven Analysis of Blockchain Systems' Public Online Communications on GDPR. DAPPS 2020: 22-31 - [c58]Hui Wang, Anthony T. S. Ho, Shujun Li:
OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 243-260 - [c57]Yang Lu, Shujun Li:
From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues. HICSS 2020: 1-10 - [c56]Keenan Jones, Jason R. C. Nurse, Shujun Li:
Behind the Mask: A Computational Study of Anonymous' Presence on Twitter. ICWSM 2020: 327-338 - [c55]Kubra Aydin, Rahime Belen Saglam, Shujun Li, Abdullah Bulbul:
When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter. SIN 2020: 16:1-16:8 - [c54]Zeynep Chousein, Haci Yakup Tetik, Rahime Belen Saglam, Abdullah Bülbül, Shujun Li:
Tension between GDPR and Public Blockchains: A Data-Driven Analysis of Online Discussions. SIN 2020: 17:1-17:8 - [c53]Shujun Li, Bin Li, Li Li, Shu Wang:
Research on the Application of Blockchain Technology in the Field of Cross-border Logistics for Small and Medium-sized Enterprises. WHICEB 2020: 52 - [e2]Ioana Boureanu, Constantin Catalin Dragan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, Panagiotis Gouvas, Roger A. Hallman, Shujun Li, Victor Chang, Frank Pallas, Jörg Pohle, M. Angela Sasse:
Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12580, Springer 2020, ISBN 978-3-030-66503-6 [contents] - [i40]Keenan Jones, Jason R. C. Nurse, Shujun Li:
Behind the Mask: A Computational Study of Anonymous' Presence on Twitter. CoRR abs/2006.08273 (2020) - [i39]Matthieu Monteiro, Kumara Kahatapitiya, Hassan Jameel Asghar, Kanchana Thilakarathna, Thierry Rakotoarivelo, Dali Kaafar, Shujun Li, Ron Steinfeld, Josef Pieprzyk:
Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices. IACR Cryptol. ePrint Arch. 2020: 261 (2020)
2010 – 2019
- 2019
- [j40]Zichi Wang, Shujun Li, Xinpeng Zhang:
Towards Improved Steganalysis: When Cover Selection is Used in Steganography. IEEE Access 7: 168914-168921 (2019) - [j39]Ximing Liu, Yingjiu Li, Robert H. Deng, Bing Chang, Shujun Li:
When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. Comput. Secur. 80: 90-107 (2019) - [j38]Saeed Ibrahim Alqahtani, Shujun Li, Haiyue Yuan, Patrice Rusconi:
Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More? EAI Endorsed Trans. Security Safety 6(21): e1 (2019) - [j37]Chengqing Li, Bingbing Feng, Shujun Li, Jürgen Kurths, Guanrong Chen:
Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks. IEEE Trans. Circuits Syst. I Regul. Pap. 66-I(6): 2322-2335 (2019) - [c52]Mohamad Imad Mahaini, Shujun Li, Rahime Belen Saglam:
Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example. ARES 2019: 30:1-30:9 - [c51]Yang Lu, Shujun Li, Athina Ioannou, Iis Tussyadiah:
From Data Disclosure to Privacy Nudges: A Privacy-Aware and User-Centric Personal Data Management Framework. DependSys 2019: 262-276 - [c50]Tasmina Islam, Ingolf Becker, Rebecca Posner, Paul Ekblom, Michael McGuire, Hervé Borrion, Shujun Li:
A Socio-Technical and Co-evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems. DependSys 2019: 277-293 - [c49]Iis Tussyadiah, Shujun Li, Graham Miller:
Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For. ENTER 2019: 278-290 - [c48]Qianwen Wei, Shujun Li, Wei Li, Hong Li, Mingsheng Wang:
Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain. WASA 2019: 358-369 - [i38]Markus Wagner, Hanhe Lin, Shujun Li, Dietmar Saupe:
Algorithm Selection for Image Quality Assessment. CoRR abs/1908.06911 (2019) - [i37]Yang Lu, Shujun Li, Athina Ioannou, Iis Tussyadiah:
From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework. CoRR abs/1909.09942 (2019) - 2018
- [j36]Anderson Rocha, Shujun Li, C.-C. Jay Kuo, Alessandro Piva, Jiwu Huang:
Data-driven multimedia forensics and security. J. Vis. Commun. Image Represent. 55: 447-448 (2018) - [j35]Ding Wang, Shujun Li, Qi Jiang:
User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs. Secur. Commun. Networks 2018: 6150491:1-6150491:2 (2018) - [c47]Shujun Li, Anthony T. S. Ho, Zichi Wang, Xinpeng Zhang:
Lost in the Digital Wild: Hiding Information in Digital Activities. MPS@CCS 2018: 27-37 - [c46]Roger A. Hallman, Shujun Li, Victor Chang:
2nd International Workshop on Multimedia Privacy and Security. CCS 2018: 2173-2174 - [c45]Çagri B. Aslan, Rahime Belen Saglam, Shujun Li:
Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example. SMSociety 2018: 236-240 - [e1]Roger A. Hallman, Shujun Li, Victor Chang:
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, MPS@CCS 2018, Toronto, ON, Canada, October 15, 2018. ACM 2018, ISBN 978-1-4503-5988-7 [contents] - [i36]Shujun Li, Anthony T. S. Ho, Zichi Wang, Xinpeng Zhang:
Lost in the Digital Wild: Hiding Information in Digital Activities. CoRR abs/1809.02888 (2018) - [i35]Ximing Liu, Yingjiu Li, Robert H. Deng, Bing Chang, Shujun Li:
When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. CoRR abs/1810.07665 (2018) - 2017
- [j34]