Shujun Li

According to our database1, Shujun Li authored at least 133 papers between 2001 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
Designing ECG monitoring healthcare system with federated transfer learning and explainable AI.
Knowl. Based Syst., 2022

2021
CogTool+: Modeling Human Performance at Large Scale.
ACM Trans. Comput. Hum. Interact., 2021

Multi-Source Knowledge Reasoning for Data-Driven IoT Security.
Sensors, 2021

Audio steganography with less modification to the optimal matching CNV-QIM path with the minimal hamming distance expected value to a secret.
Multim. Syst., 2021

Special issue on low complexity methods for multimedia security.
Multim. Syst., 2021

It was hard to find the words: Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices.
CoRR, 2021

Lightweight Transformer in Federated Setting for Human Activity Recognition.
CoRR, 2021

Out of the Shadows: Analyzing Anonymous' Twitter Resurgence during the 2020 Black Lives Matter Protests.
CoRR, 2021

The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter.
CoRR, 2021

Remote Sensing Image Change Detection Based on Fully Convolutional Network With Pyramid Attention.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2021

Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

When Googling It Doesn't Work: The Challenge of Finding Security Advice for Smart Home Devices.
Proceedings of the Human Aspects of Information Security and Assurance, 2021

Detecting cyber security related Twitter accounts and different sub-groups: a multi-classifier approach.
Proceedings of the ASONAM '21: International Conference on Advances in Social Networks Analysis and Mining, Virtual Event, The Netherlands, November 8, 2021

2020
Cognitive Modeling for Automated Human Performance Evaluation at Scale
Human-Computer Interaction Series, Springer, ISBN: 978-3-030-45703-7, 2020

Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices.
IACR Cryptol. ePrint Arch., 2020

All about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks.
Comput. Secur., 2020

The World of Defacers: Looking Through the Lens of Their Activities on Twitter.
IEEE Access, 2020

Tension between GDPR and Public Blockchains: A Data-Driven Analysis of Online Discussions.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

Behind the Mask: A Computational Study of Anonymous' Presence on Twitter.
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020

From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

A Data-Driven Analysis of Blockchain Systems' Public Online Communications on GDPR.
Proceedings of the 2nd IEEE International Conference on Decentralized Applications and Infrastructures, 2020

2019
Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks.
IEEE Trans. Circuits Syst. I Regul. Pap., 2019

Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More?
EAI Endorsed Trans. Security Safety, 2019

Algorithm Selection for Image Quality Assessment.
CoRR, 2019

When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks.
Comput. Secur., 2019

Towards Improved Steganalysis: When Cover Selection is Used in Steganography.
IEEE Access, 2019

Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For.
Proceedings of the Information and Communication Technologies in Tourism 2019, 2019

From Data Disclosure to Privacy Nudges: A Privacy-Aware and User-Centric Personal Data Management Framework.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

A Socio-Technical and Co-evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs.
Secur. Commun. Networks, 2018

Data-driven multimedia forensics and security.
J. Vis. Commun. Image Represent., 2018

Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example.
Proceedings of the 9th International Conference on Social Media and Society, 2018

Lost in the Digital Wild: Hiding Information in Digital Activities.
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018

2nd International Workshop on Multimedia Privacy and Security.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Fast recovery of unknown coefficients in DCT-transformed images.
Signal Process. Image Commun., 2017

An oracle-based attack on CAPTCHAs protected against oracle attacks.
CoRR, 2017

The Konstanz natural video database (KoNViD-1k).
Proceedings of the Ninth International Conference on Quality of Multimedia Experience, 2017

When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

PSV (Password Security Visualizer): From Password Checking to User Education.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

Simulating Human Detection of Phishing Websites: An Investigation into the Applicability of the ACT-R Cognitive Behaviour Architecture Model.
Proceedings of the 3rd IEEE International Conference on Cybernetics, 2017

Can Humans Detect the Authenticity of Social Media Accounts? On the Impact of Verbal and Non-Verbal Cues on Credibility Judgements of Twitter Profiles.
Proceedings of the 3rd IEEE International Conference on Cybernetics, 2017

PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Privacy-preserving crowdsourced site survey in WiFi fingerprint-based localization.
EURASIP J. Wirel. Commun. Netw., 2016

"Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law.
CoRR, 2016

Influence of leg stiffness on payload capacity at high speed.
Proceedings of the 2016 IEEE International Conference on Robotics and Biomimetics, 2016

2015
On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices.
IEEE Trans. Inf. Forensics Secur., 2015

Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks.
Pervasive Mob. Comput., 2015

Content-Fragile Commutative Watermarking-Encryption Based on Pixel Entropy.
Proceedings of the Advanced Concepts for Intelligent Vision Systems, 2015

2014
A novel image restoration scheme based on structured side information and its application to image watermarking.
Signal Process. Image Commun., 2014

Special issue on threat detection, analysis and defense.
J. Inf. Secur. Appl., 2014

Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms.
Int. J. Multim. Data Eng. Manag., 2014

Algebraic Attacks on Human Identification Protocols.
IACR Cryptol. ePrint Arch., 2014

Enhanced perceptual image authentication with tamper localization and self-restoration.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014

jCAPTCHA: Accessible Human Validation.
Proceedings of the Computers Helping People with Special Needs, 2014

2013
Secure computing with the MPEG RVC framework.
Signal Process. Image Commun., 2013

Cryptanalysis of the convex hull click human identification protocol.
Int. J. Inf. Sec., 2013

Towards More Robust Commutative Watermarking-Encryption of Images.
Proceedings of the 2013 IEEE International Symposium on Multimedia, 2013

Performance benchmarking of RVC based multimedia specifications.
Proceedings of the IEEE International Conference on Image Processing, 2013

2012
On the Performance of Secret Entropy Coding: A Perspective Beyond Security.
Proceedings of the Autonomous Systems: Developments and Trends, 2012

Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks.
IACR Cryptol. ePrint Arch., 2012

A New Approach to Commutative Watermarking-Encryption.
Proceedings of the Communications and Multimedia Security, 2012

Leveling the Grid.
Proceedings of the 14th Meeting on Algorithm Engineering & Experiments, 2012

2011
Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers.
Proceedings of the Chaos-Based Cryptography - Theory, Algorithms and Applications, 2011

Neue Entwicklungen in der e-Banking Security.
Prax. Inf.verarb. Kommun., 2011

CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
IACR Cryptol. ePrint Arch., 2011

Breaking undercover: exploiting design flaws and nonuniform human behavior.
Proceedings of the Symposium On Usable Privacy and Security, 2011

Captchæcker: Reconfigurable CAPTCHAs based on automated security and usability analysis.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

Building multimedia security applications in the MPEG reconfigurable video coding (RVC) framework.
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011

On the security of a secure Lempel-Ziv-Welch (LZW) algorithm.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

Recovering missing coefficients in DCT-transformed images.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
A differential cryptanalysis of Yen-Chen-Wu multimedia cryptography system.
J. Syst. Softw., 2010

An improved DC recovery method from AC coefficients of DCT-transformed images.
Proceedings of the International Conference on Image Processing, 2010

Breaking Randomized Linear Generation Functions Based Virtual Password System.
Proceedings of IEEE International Conference on Communications, 2010

A method for automatic routing based on comprehensive evaluation on limiting conditions of maneuverability.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Breaking e-banking CAPTCHAs.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Cryptanalysis of an image encryption scheme based on a compound chaotic sequence.
Image Vis. Comput., 2009

On the security defects of an image encryption scheme.
Image Vis. Comput., 2009

Breaking a SC-CNN-Based Chaotic Masking Secure Communication System.
Int. J. Bifurc. Chaos, 2009

On the Security of PAS (Predicate-based Authentication Service).
IACR Cryptol. ePrint Arch., 2009

Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps
CoRR, 2009

A Differential Cryptanalysis of Yen-Chen-Wu Multimedia Cryptography System (MCS)
CoRR, 2009

Breaking a new substitution-diffusion based image cipher using chaotic standard and logistic maps
CoRR, 2009

On the Security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables.
Proceedings of the Advances in Image and Video Technology, Third Pacific Rim Symposium, 2009

Interdisciplinary applications of mathematical modeling.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

The Visualization of 3D Terrain Based on VRML.
Proceedings of the International Forum on Information Technology and Applications, 2009

A novel anti-phishing framework based on honeypots.
Proceedings of the 2009 eCrime Researchers Summit, 2009

2008
Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion.
IEEE Trans. Circuits Syst. Video Technol., 2008

Cryptanalyzing an Encryption Scheme Based on Blind Source Separation.
IEEE Trans. Circuits Syst. I Regul. Pap., 2008

A new trust region filter algorithm.
Appl. Math. Comput., 2008

2007
On the Design of Perceptual MPEG-Video Encryption Algorithms.
IEEE Trans. Circuits Syst. Video Technol., 2007

Security problems with improper implementations of improved FEA-M.
J. Syst. Softw., 2007

Cryptanalysis of a computer cryptography scheme based on a filter bank
CoRR, 2007

Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm
CoRR, 2007

Analog Chaos-based Secure Communications and Cryptanalysis: A Brief Survey
CoRR, 2007

Analysis of security problems in a medical image encryption system.
Comput. Biol. Medicine, 2007

2006
Pion: A Problem Solving Environment for Parallel Multivariate Integration.
Scalable Comput. Pract. Exp., 2006

Erratum to "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)" [The Journal of Systems and Software 79 (2006) 253-258].
J. Syst. Softw., 2006

On the security of the Yen-Guo's domino signal encryption algorithm (DSEA).
J. Syst. Softw., 2006

Cryptanalysis of an image encryption scheme.
J. Electronic Imaging, 2006

Distributed Adaptive Multivariate Function Visualization.
Int. J. Comput. Intell. Appl., 2006

Return-Map Cryptanalysis Revisited.
Int. J. Bifurc. Chaos, 2006

Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems.
Int. J. Bifurc. Chaos, 2006

Cryptanalysis of a chaotic block cipher with external key and its improved version
CoRR, 2006

Cryptanalysis of an Encryption Scheme Based on Blind Source Separation
CoRR, 2006

A Fast Integration Method and Its Application in a Medical Physics Problem.
Proceedings of the Computational Science and Its Applications, 2006

2005
On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps.
Int. J. Bifurc. Chaos, 2005

Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI.
IACR Cryptol. ePrint Arch., 2005

Cryptanalysis of a New Signal Security System for Multimedia Data Transmission.
EURASIP J. Adv. Signal Process., 2005

Permutation Polynomials modulo m
CoRR, 2005

Cryptanalysis of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables
CoRR, 2005

Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Cryptanalysis of a multistage encryption system.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

On Iterated Numerical Integration.
Proceedings of the Computational Science, 2005

Regularization and Extrapolation Methods for Infrared Divergent Loop Integrals.
Proceedings of the Computational Science, 2005

2004
On the security of the Yi-Tan-Siew chaotic cipher.
IEEE Trans. Circuits Syst. II Express Briefs, 2004

Cryptanalysis of RCES/RSES Image Encryption Scheme.
IACR Cryptol. ePrint Arch., 2004

A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks.
IACR Cryptol. ePrint Arch., 2004

On the Security of the Yi-Tan-Siew Chaos-Based Cipher
CoRR, 2004

Problems of Baptista's chaotic cryptosystems and countermeasures for enhancement of their overall performances
CoRR, 2004

Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher
CoRR, 2004

Breaking network security based on synchronized chaos.
Comput. Commun., 2004

Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme.
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004

2003
Problems with a Probabilistic Encryption Scheme Based on Chaotic Systems.
Int. J. Bifurc. Chaos, 2003

2002
On the security of an image encryption method.
Proceedings of the 2002 International Conference on Image Processing, 2002

2001
Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography.
Proceedings of the Progress in Cryptology, 2001

Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding.
Proceedings of the Cryptography and Coding, 2001


  Loading...