Shujun Li

According to our database1, Shujun Li authored at least 93 papers between 2001 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks.
IEEE Trans. on Circuits and Systems, 2019

When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks.
Computers & Security, 2019

Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For.
Proceedings of the Information and Communication Technologies in Tourism 2019, 2019

Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs.
Security and Communication Networks, 2018

Data-driven multimedia forensics and security.
J. Visual Communication and Image Representation, 2018

Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example.
Proceedings of the 9th International Conference on Social Media and Society, 2018

Lost in the Digital Wild: Hiding Information in Digital Activities.
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018

2nd International Workshop on Multimedia Privacy and Security.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Fast recovery of unknown coefficients in DCT-transformed images.
Sig. Proc.: Image Comm., 2017

The Konstanz natural video database (KoNViD-1k).
Proceedings of the Ninth International Conference on Quality of Multimedia Experience, 2017

When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

PSV (Password Security Visualizer): From Password Checking to User Education.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

Simulating Human Detection of Phishing Websites: An Investigation into the Applicability of the ACT-R Cognitive Behaviour Architecture Model.
Proceedings of the 3rd IEEE International Conference on Cybernetics, 2017

Can Humans Detect the Authenticity of Social Media Accounts? On the Impact of Verbal and Non-Verbal Cues on Credibility Judgements of Twitter Profiles.
Proceedings of the 3rd IEEE International Conference on Cybernetics, 2017

PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Privacy-preserving crowdsourced site survey in WiFi fingerprint-based localization.
EURASIP J. Wireless Comm. and Networking, 2016

Influence of leg stiffness on payload capacity at high speed.
Proceedings of the 2016 IEEE International Conference on Robotics and Biomimetics, 2016

2015
On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices.
IEEE Trans. Information Forensics and Security, 2015

Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks.
Pervasive and Mobile Computing, 2015

Content-Fragile Commutative Watermarking-Encryption Based on Pixel Entropy.
Proceedings of the Advanced Concepts for Intelligent Vision Systems, 2015

2014
A novel image restoration scheme based on structured side information and its application to image watermarking.
Sig. Proc.: Image Comm., 2014

Special issue on threat detection, analysis and defense.
J. Inf. Sec. Appl., 2014

Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms.
IJMDEM, 2014

Algebraic Attacks on Human Identification Protocols.
IACR Cryptology ePrint Archive, 2014

Enhanced perceptual image authentication with tamper localization and self-restoration.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014

jCAPTCHA: Accessible Human Validation.
Proceedings of the Computers Helping People with Special Needs, 2014

2013
Secure computing with the MPEG RVC framework.
Sig. Proc.: Image Comm., 2013

Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Towards More Robust Commutative Watermarking-Encryption of Images.
Proceedings of the 2013 IEEE International Symposium on Multimedia, 2013

Performance benchmarking of RVC based multimedia specifications.
Proceedings of the IEEE International Conference on Image Processing, 2013

2012
On the Performance of Secret Entropy Coding: A Perspective Beyond Security.
Proceedings of the Autonomous Systems: Developments and Trends, 2012

CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
Proceedings of the Financial Cryptography and Data Security, 2012

A New Approach to Commutative Watermarking-Encryption.
Proceedings of the Communications and Multimedia Security, 2012

Leveling the Grid.
Proceedings of the 14th Meeting on Algorithm Engineering & Experiments, 2012

2011
Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers.
Proceedings of the Chaos-Based Cryptography - Theory, Algorithms and Applications, 2011

Neue Entwicklungen in der e-Banking Security.
Praxis der Informationsverarbeitung und Kommunikation, 2011

Breaking undercover: exploiting design flaws and nonuniform human behavior.
Proceedings of the Symposium On Usable Privacy and Security, 2011

Captchæcker: Reconfigurable CAPTCHAs based on automated security and usability analysis.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

On the security of a secure Lempel-Ziv-Welch (LZW) algorithm.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

Recovering missing coefficients in DCT-transformed images.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
A differential cryptanalysis of Yen-Chen-Wu multimedia cryptography system.
Journal of Systems and Software, 2010

Cryptanalysis of the Convex Hull Click Human Identification Protocol.
Proceedings of the Information Security - 13th International Conference, 2010

An improved DC recovery method from AC coefficients of DCT-transformed images.
Proceedings of the International Conference on Image Processing, 2010

Breaking Randomized Linear Generation Functions Based Virtual Password System.
Proceedings of IEEE International Conference on Communications, 2010

A method for automatic routing based on comprehensive evaluation on limiting conditions of maneuverability.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Breaking e-banking CAPTCHAs.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Cryptanalysis of an image encryption scheme based on a compound chaotic sequence.
Image Vision Comput., 2009

On the security defects of an image encryption scheme.
Image Vision Comput., 2009

Breaking a SC-CNN-Based Chaotic Masking Secure Communication System.
I. J. Bifurcation and Chaos, 2009

On the Security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables.
Proceedings of the Advances in Image and Video Technology, Third Pacific Rim Symposium, 2009

Interdisciplinary applications of mathematical modeling.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

The Visualization of 3D Terrain Based on VRML.
Proceedings of the International Forum on Information Technology and Applications, 2009

A novel anti-phishing framework based on honeypots.
Proceedings of the 2009 eCrime Researchers Summit, 2009

On the Security of PAS (Predicate-Based Authentication Service).
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion.
IEEE Trans. Circuits Syst. Video Techn., 2008

Cryptanalyzing an Encryption Scheme Based on Blind Source Separation.
IEEE Trans. on Circuits and Systems, 2008

A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks.
Sig. Proc.: Image Comm., 2008

Cryptanalysis of the RCES/RSES image encryption scheme.
Journal of Systems and Software, 2008

A new trust region filter algorithm.
Applied Mathematics and Computation, 2008

2007
On the Design of Perceptual MPEG-Video Encryption Algorithms.
IEEE Trans. Circuits Syst. Video Techn., 2007

Security problems with improper implementations of improved FEA-M.
Journal of Systems and Software, 2007

On the security defects of an image encryption scheme.
IACR Cryptology ePrint Archive, 2007

Analysis of security problems in a medical image encryption system.
Comp. in Bio. and Med., 2007

2006
Pion: A Problem Solving Environment for Parallel Multivariate Integration.
Scalable Computing: Practice and Experience, 2006

Erratum to "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)" [The Journal of Systems and Software 79 (2006) 253-258].
Journal of Systems and Software, 2006

On the security of the Yen-Guo's domino signal encryption algorithm (DSEA).
Journal of Systems and Software, 2006

Cryptanalysis of an image encryption scheme.
J. Electronic Imaging, 2006

Distributed Adaptive Multivariate Function Visualization.
International Journal of Computational Intelligence and Applications, 2006

Return-Map Cryptanalysis Revisited.
I. J. Bifurcation and Chaos, 2006

Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems.
I. J. Bifurcation and Chaos, 2006

Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion.
IACR Cryptology ePrint Archive, 2006

A Fast Integration Method and Its Application in a Medical Physics Problem.
Proceedings of the Computational Science and Its Applications, 2006

2005
On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps.
I. J. Bifurcation and Chaos, 2005

Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI.
IACR Cryptology ePrint Archive, 2005

Cryptanalysis of a New Signal Security System for Multimedia Data Transmission.
EURASIP J. Adv. Sig. Proc., 2005

Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Cryptanalysis of a multistage encryption system.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

On Iterated Numerical Integration.
Proceedings of the Computational Science, 2005

Regularization and Extrapolation Methods for Infrared Divergent Loop Integrals.
Proceedings of the Computational Science, 2005

2004
On the security of the Yi-Tan-Siew chaotic cipher.
IEEE Trans. on Circuits and Systems, 2004

Cryptanalysis of RCES/RSES Image Encryption Scheme.
IACR Cryptology ePrint Archive, 2004

A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks.
IACR Cryptology ePrint Archive, 2004

Breaking network security based on synchronized chaos.
Computer Communications, 2004

Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme.
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004

2003
Problems with a Probabilistic Encryption Scheme Based on Chaotic Systems.
I. J. Bifurcation and Chaos, 2003

2002
On the security of an image encryption method.
Proceedings of the 2002 International Conference on Image Processing, 2002

2001
Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography.
Proceedings of the Progress in Cryptology, 2001

Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding.
Proceedings of the Cryptography and Coding, 2001


  Loading...