Items where Author, Editor or other role is "Li, Shujun"
Number of items: 73.
A
Altuncu, Enes, Franqueira, Virginia N. L., Li, Shujun (2024) Deepfake: definitions, performance metrics and standards, datasets, and a meta-review. Frontiers in Big Data, 7 . Article Number 1400024. ISSN 2624-909X. (doi:10.3389/fdata.2024.1400024) (KAR id:107255) |
Altuncu, Enes, Nurse, Jason R. C., Bagriacik, Meryem, Kaleba, Sophie, Yuan, Haiyue, Bonheme, Lisa, Li, Shujun (2023) aedFaCT: Scientific Fact-Checking Made Easier via Semi-Automatic Discovery of Relevant Expert Opinions. In: Workshop Proceedings of the 17th International AAAI Conference on Web and Social Media. . 27:1-27:10. Association for the Advancement of Artificial Intelligence (doi:10.36190/2023.27) (KAR id:101790) |
Altuncu, Enes and Franqueira, Virginia N. L. and Li, Shujun (2022) Deepfake: Definitions, Performance Metrics and Standards, Datasets and Benchmarks, and a Meta-Review. [Preprint] (doi:10.48550/arXiv.2208.10913) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:97945) |
Aslan, Çaǧri Burak, Li, Shujun, Çelebi, Fatih V., Tian, Hao (2020) The World of Defacers: Looking through the Lens of Their Activities on Twitter. IEEE Access, 8 . pp. 204132-204143. E-ISSN 2169-3536. (doi:10.1109/ACCESS.2020.3037015) (KAR id:84855) |
Aydın, Kübra, Sağlam, Rahime Belen, Li, Shujun, Bülbül, Abdullah (2020) When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter. In: Proceedings of the 13th International Conference on Security of Information and Networks. . 16:1-16:8. ACM ISBN 978-1-4503-8751-4. (doi:10.1145/3433174.3433586) (KAR id:89476) |
Alqahtani, Saeed Ibrahim, Li, Shujun, Yuan, Haiyue, Rusconi, Patrice (2020) Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More? EAI Endorsed Transactions on Security and Safety, 18 (e1). ISSN 2032-9393. (doi:10.4108/eai.13-7-2018.162797) (KAR id:79945) |
Aslan, Çağrı B. and Sağlam, Rahime Belen and Li, Shujun (2018) Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example. In: Proceedings of the 9th International Conference on Social Media and Society. ACM-ICPS International Conference Proceeding Series . ACM, New York, USA. ISBN 978-1-4503-6334-1. (doi:10.1145/3217804.3217919) (KAR id:66861) |
Alqahtani, Saeed Ibrahim, Li, Shujun (2017) PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices. In: Fischer, Mathias, ed. Proceedings of the 12th International Conference on Availability, Reliability and Security. . Article No. 19. ACM, New York, NY, USA ISBN 978-1-4503-5257-4. (doi:10.1145/3098954.3098984) (KAR id:69561) |
Aljaffan, Nouf and Yuan, Haiyue and Li, Shujun (2017) PSV (Password Security Visualizer): From Password Checking to User Education. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust 5th International Conference. Lecture Notes in Computer Science, 10292 . Springer International Publishing AG, pp. 191-211. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:10.1007/978-3-319-58460-7_13) (KAR id:69560) |
Asghar, Hassan Jameel, Steinfeld, Ron, Li, Shujun, Kaafa, Mohamed Ali, Pieprzyk, Josef (2015) On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices. IEEE Transactions on Information Forensics and Security, 10 (8). pp. 1643-1655. ISSN 1556-6013. E-ISSN 1556-6021. (doi:10.1109/TIFS.2015.2421875) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:69555) |
B
Belen-Saglam, Rahime, Altuncu, Enes, Lu, Yang, Li, Shujun (2023) A systematic literature review of the tension between the GDPR and public blockchain systems. Blockchain: Research and Applications, 4 (2). pp. 1-23. E-ISSN 2666-9536. (doi:10.1016/j.bcra.2023.100129) (KAR id:101787) |
Başkent, Can and Bhattacherjee, Sanjay and Shujun, Li (2022) Applications of Game Theory and Epistemic Logic to Fact-Checking. Technical report. University of Kent (Unpublished) (KAR id:97346) |
Becker, Ingolf, Posner, Rebecca, Islam, Tasmina, Ekblom, Paul, Borrion, Hervé, McGuire, Michael, Li, Shujun (2021) Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation. In: Proceedings of 54th Hawaii International Conference on System Sciences (HICSS 2021). . pp. 5347-5356. University of Hawaiʻi at Mānoa, Mānoa, Hawaiʻi, USA E-ISBN 978-0-9981331-3-3. (doi:10125/71270) (KAR id:84858) |
C
Chousein, Zeynep, Tetik, Hacı Yakup, Sağlam, Rahime Belen, Bülbül, Abdullah, Li, Shujun (2020) Tension between GDPR and Public Blockchains: A Data-Driven Analysis of Online Discussions. In: Proceedings of the 13th International Conference on Security of Information and Networks. . 17:1-17:8. ACM ISBN 978-1-4503-8751-4. (doi:10.1145/3433174.3433587) (KAR id:89479) |
H
Heering, Maria Sophia, Yuan, Haiyue, Li, Shujun (2024) The Impact of Privacy and Security Attitudes and Concerns of Travellers on Their Willingness to Use Mobility-as-a-Service Systems. In: 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC). Proceedings of the 2023 IEEE 26th International Conference on Intelligent Transportation Systems. . pp. 5573-5578. IEEE ISBN 979-8-3503-9947-9. E-ISBN 979-8-3503-9946-2. (doi:10.1109/ITSC57777.2023.10422468) (KAR id:105030) |
Hernández-Castro, Carlos Javier, Li, Shujun, R-Moreno, María D. (2020) All about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks. Computers & Security, 92 . Article Number 101758. ISSN 0167-4048. (doi:10.1016/j.cose.2020.101758) (KAR id:80266) |
Hosu, Vlad, Hahn, Franz, Jenadeleh, Mohsen, Lin, Hanhe, Men, Hui, Szirányi, Tamás, Li, Shujun, Saupe, Dietmar (2017) The Konstanz Natural Video Database (KoNViD-1k). In: 2017 Ninth International Conference on Quality of Multimedia Experience (QoMEX). Proceedings of the 2017 9th International Conference on Quality of Multimedia Experience. . IEEE, Germany ISBN 978-1-5386-4025-8. E-ISBN 978-1-5386-4024-1. (doi:10.1109/QoMEX.2017.7965673) (KAR id:69606) |
I
Ioannou, Athina, Tussyadiah, Iis, Miller, Graham, Li, Shujun, Weick, Mario (2021) Privacy nudges for disclosure of personal information: A systematic literature review and meta-analysis. PLoS ONE, 16 (8). e0256822:1-e0256822:29. ISSN 1932-6203. (doi:10.1371/journal.pone.0256822) (KAR id:89955) |
Islam, Tasmina, Becker, Ingolf, Posner, Rebecca, Ekblom, Paul, McGuire, Michael, Borrion, Hervé, Li, Shujun (2019) A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems. In: Communications in Computer and Information Science. Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings. 1123. pp. 277-293. Springer, Singapore ISBN 978-981-15-1303-9. E-ISBN 978-981-15-1304-6. (doi:10.1007/978-981-15-1304-6_22) (KAR id:76678) |
J
Jones, Keenan and Altuncu, Enes and Franqueira, Virginia N. L. and Wang, Yichao and Li, Shujun (2022) A Comprehensive Survey of Natural Language Generation Advances from the Perspective of Digital Deception. [Preprint] (doi:10.48550/arXiv.2208.05757) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:97944) |
Jones, Keenan, Nurse, Jason R. C., Li, Shujun (2022) Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators. In: 16th International AAAI Conference on Web and Social Media (ICWSM-22), 6-9 June 2022, Atlanta, USA. (KAR id:93628) |
Jones, Keenan, Nurse, Jason R. C., Li, Shujun (2021) Out of the Shadows: Analyzing Anonymous’ Twitter Resurgence during the 2020 Black Lives Matter Protests. In: Proceedings of the 16th International AAAI Conference on Web and Social Media (ICWSM-22). . Association for the Advancement of Artificial Intelligence, USA (KAR id:89408) |
Jones, Keenan, Nurse, Jason R. C., Li, Shujun (2021) The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter. In: Workshop Proceedings of the 15th International AAAI Conference on Web and Social Media (ICWSM-21). . (KAR id:87962) |
Jones, Keenan, Nurse, Jason R. C., Li, Shujun (2020) Behind the Mask: A Computational Study of Anonymous' Presence on Twitter. In: 14th International AAAI Conference on Web and Social Media (ICWSM). . (KAR id:80660) |
K
Knott, Jamie, Yuan, Haiyue, Boakes, Matthew, Li, Shujun (2023) Cyber Security and Online Safety Education for Schools in the UK: Looking through the Lens of Twitter Data. In: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing. . 1603- 1606. ACM, New York, USA ISBN 978-1-4503-9517-5. (doi:10.1145/3555776.3577805) (KAR id:101794) |
L
Lin, Ruiyuan, Liu, Sheng, Jiang, Jun, Li, Shujun, Li, Chengqing, Kuo, C.-C. Jay (2024) Recovering sign bits of DCT coefficients in digital images as an optimization problem. Journal of Visual Communication and Image Representation, 98 . Article Number 104045. ISSN 1047-3203. (doi:10.1016/j.jvcir.2023.104045) (KAR id:106082) |
Liang, Zhanbo, Guo, Jie, Qiu, Weidong, Huang, Zheng, Li, Shujun (2024) When graph convolution meets double attention: online privacy disclosure detection with multi-label text classification. Data Mining and Knowledge Discovery, 38 (3). pp. 1171-1192. ISSN 1384-5810. (doi:10.1007/s10618-023-00992-y) (KAR id:104513) |
Lu, Yang, Li, Shujun, Freitas, Alex A., Ioannou, Athina (2022) How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis. EAI Endorsed Transactions on Security and Safety, 8 (30). pp. 1-20. ISSN 2032-9393. (doi:10.4108/eai.21-12-2021.172440) (KAR id:93892) |
Lu, Yang, Li, Shujun (2022) From Data Flows to Privacy-Benefit Trade-offs: A User-Centric Semantic Model. Security and Privacy, 5 (4). pp. 1-24. E-ISSN 2475-6725. (doi:10.1002/spy2.225) (KAR id:93764) |
Lu, Yang, Li, Shujun (2020) From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues. In: Scholar Space. Proceedings of the 53rd Hawaii International Conference on System Sciences. . University of Hawaii at Manoa, Haiwaii, USA ISBN 978-0-9981331-3-3. (doi:10.24251/HICSS.2020.799) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:76648) |
Lu, Yang, Ioannou, Athina, Tussyadiah, Iis, Li, Shujun (2019) Segmenting travelers based on responses to nudging for information disclosure. e-Review of Tourism Research, 17 (3). pp. 394-406. ISSN 1941-5842. (KAR id:79517) |
Lu, Yang, Li, Shujun, Ioannou, Athina, Tussyadiah, Iis (2019) From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework. In: Communications in Computer and Information Science. Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings. 1123. pp. 262-276. Springer, Singapore ISBN 978-981-15-1303-9. E-ISBN 978-981-15-1304-6. (doi:10.1007/978-981-15-1304-6_21) (KAR id:76677) |
Li, Chengqing, Feng, Bingbing, Li, Shujun, Kurths, Jurgen, Chen, Guanrong (2019) Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks. IEEE Transactions on Circuits and Systems I: Regular Papers, 66 (6). pp. 2322-2335. ISSN 1549-8328. (doi:10.1109/TCSI.2018.2888688) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:71415) |
Liu, Ximing, Li, Yingjiu, Deng, Robert H., Chang, Bing, Li, Shujun (2019) When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. Computers and Security, 80 . pp. 90-107. ISSN 0167-4048. (doi:10.1016/j.cose.2018.09.003) (KAR id:69553) |
Li, Shujun, Ho, Anthony T.S., Wang, Zichi, Zhang, Xinpeng (2018) Lost in the Digital Wild: Hiding Information in Digital Activities. In: Hallman, Roger and Li, Shujun and Chang, Victor, eds. MPS'18: 2nd International Workshop on Multimedia Privacy and Security Proceedings. CCS Computer and Communications Security . pp. 27-37. ACM, New York, USA ISBN 978-1-4503-5988-7. (doi:10.1145/3267357.3267365) (KAR id:69008) |
Liu, Junjie and Aljaffan, Nouf and Li, Shujun (2018) PassInfinity: A software prototype system. NA Electronic files. (Unpublished) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:80287) |
M
Mahaini, Mohamad Imad (2024) Community analysis of cyber security experts on Online Social Networks. Doctor of Philosophy (PhD) thesis, University of Kent,. (doi:10.22024/UniKent/01.02.106482) (KAR id:106482) |
Mohd Kassim, Sharifah Roziah Binti (2024) The study of the operational practices of national CSIRTS regarding the Use of free tools and public data in supporting computer security incident response. Doctor of Philosophy (PhD) thesis, University of Kent. (doi:10.22024/UniKent/01.02.105956) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:105956) |
Mohd Kassim, Sharifah Roziah Binti, Li, Shujun, Arief, Budi (2023) Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions. Digital Threats: Research and Practice, 4 (3). pp. 1-24. ISSN 2576-5337. (doi:10.1145/3609230) (KAR id:103162) |
Mahaini, Mohamad Imad, Li, Shujun (2023) Cyber Security Researchers on Online Social Networks: From the Lens of the UK’s ACEs-CSR on Twitter. In: Lecture Notes in Computer Science. Security and Privacy in Social Networks and Big Data: 9th International Symposium, SocialSec 2023, Canterbury, UK, August 14–16, 2023, Proceedings. Lecture Notes in Computer Science , 14097. pp. 129-148. Springer, Singapore E-ISBN 978-981-99-5177-2. (doi:10.1007/978-981-99-5177-2_8) (KAR id:102392) |
Mohd Kassim, Sharifah Roziah Binti, Shamsuddin, Solahuddin Bin, Li, Shujun, Arief, Budi (2022) How National CSIRTs Operate: Personal Observations and Opinions from MyCERT. In: Institute of Electrical and Electronics Engineers. 2022 IEEE Conference on Dependable and Secure Computing (DSC). . IEEE ISBN 978-1-6654-1815-7. (doi:10.1109/DSC54232.2022.9888803) (KAR id:97693) |
Mohd Kassim, Sharifah Roziah Binti, Li, Shujun, Arief, Budi (2022) Incident Response Practices Across National CSIRTs: Results from an Online Survey. OIC-CERT Journal of Cyber Security, 4 (1). pp. 67-84. ISSN 2636-9680. E-ISSN 2682-9266. (KAR id:94119) |
Mohd Kassim, Sharifah Roziah Binti, Li, Shujun, Arief, Budi (2022) How National CSIRTs Leverage Public Data, OSINT and Free Tools in Operational Practices: An Empirical Study. Cyber Security: A Peer-Reviewed Journal, 5 (3). pp. 251-276. ISSN 2398-5100. (KAR id:93768) |
Mahaini, Mohamad Imad, Li, Shujun (2021) Detecting Cyber Security Related Twitter Accounts and Different Sub-Groups: A Multi-Classifier Approach. In: ASONAM '21: Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. . ACM ISBN 978-1-4503-9128-3. (doi:10.1145/3487351.3492716) (KAR id:90995) |
Mahaini, Mohamad Imad, Li, Shujun, Sağlam, Rahime Belen (2019) Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example. In: ICPS: ACM International Conference Proceeding Series. Proceedings of the 14th International Conference on Availability, Reliability and Security. . ACM ISBN 978-1-4503-7164-3. (doi:10.1145/3339252.3339282) (KAR id:75253) |
O
Ong, SimYing, Li, Shujun, Wong, KokSheik, Tan, KuanYew (2017) Fast recovery of unknown coefficients in DCT-transformed images. Signal Processing: Image Communication, 58 . pp. 1-13. ISSN 0923-5965. (doi:10.1016/j.image.2017.06.002) (KAR id:69562) |
P
Pattnaik, Nandita (2024) Understanding security & privacy perspectives of non-expert users in modern homes with multiple users and multiple computing devices. Doctor of Philosophy (PhD) thesis, University of Kent,. (doi:10.22024/UniKent/01.02.107995) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:107995) |
Pattnaik, Nandita, Li, Shujun, Nurse, Jason R. C. (2024) Security and privacy perspectives of people living in shared home environments. In: CSCW'24: Computer-Supported Cooperative Work and Social Computing. 8. (In press) (doi:10.1145/3686907) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:106798) |
Parker, Sam, Yuan, Haiyue, Li, Shujun (2024) PassViz: A Visualisation System for Analysing Leaked Passwords. In: Proceedings of the 2023 20th IEEE Symposium on Visualization for Cyber Security. . pp. 33-42. IEEE ISBN 979-8-3503-1794-7. E-ISBN 979-8-3503-1793-0. (doi:10.1109/VizSec60606.2023.00011) (KAR id:102913) |
Pattnaik, Nandita, Li, Shujun, Nurse, Jason R. C. (2023) A Survey of User Perspectives on Security and Privacy in a Home Networking Environment. ACM Computing Surveys, 55 (9). 180:1-180:38. ISSN 0360-0300. E-ISSN 1557-7341. (doi:10.1145/3558095) (KAR id:98166) |
Pattnaik, Nandita, Li, Shujun, Nurse, Jason R. C. (2022) Perspectives of Non-Expert Users on Cyber Security and Privacy: An Analysis of Online Discussions on Twitter. Computers and Security, 125 . Article Number 103008. ISSN 0167-4048. (doi:10.1016/j.cose.2022.103008) (KAR id:96259) |
R
Raza, Ali (2023) Secure and Privacy-preserving Federated Learning with Explainable Artificial Intelligence for Smart Healthcare System. Doctor of Philosophy (PhD) thesis, University of Kent, University of Kent. (doi:10.22024/UniKent/01.02.102717) (KAR id:102717) |
Raza, Ali, Tran, Kim Phuc, Koehl, Ludovic, Li, Shujun (2023) Proof of Swarm Based Ensemble Learning for Federated Learning Applications. In: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing. . 152- 155. ACM, New York, USA ISBN 978-1-4503-9517-5. (doi:10.1145/3555776.3578601) (KAR id:101795) |
Raza, Ali, Tran, Kim Phuc, Koehl, Ludovic, Li, Shujun (2023) AnoFed: Adaptive anomaly detection for digital health usingtransformer-based federated learning and support vector data description. Engineering Applications of Artificial Intelligence, 121 . Article Number 106051. ISSN 0952-1976. (doi:10.1016/j.engappai.2023.106051) (KAR id:100363) |
Raza, Ali, Tran, Kim Phuc, Koehl, Ludovic, Li, Shujun (2022) Designing ECG Monitoring Healthcare System with Federated Transfer Learning and Explainable AI. Knowledge-Based Systems, 236 . Article Number 107763. ISSN 0950-7051. (doi:10.1016/j.knosys.2021.107763) (KAR id:92005) |
S
Sağlam, Rahime Belen, Aslan, Çağrı B., Li, Shujun, Dickson, Lisa, Pogrebna, Ganna (2020) A Data-Driven Analysis of Blockchain Systems' Public Online Communications on GDPR. In: Proceedings of 2020 2nd IEEE International Conference on Decentralized Applications and Infrastructures. . pp. 22-31. IEEE ISBN 978-1-7281-7022-0. (doi:10.1109/DAPPS49028.2020.00003) (KAR id:81277) |
Schmitz, Roland and Li, Shujun and Grecos, Christos and Zhang, Xinpeng (2018) Commutative Watermarking-Encryption of Multimedia Data Based on Histograms. In: Bhattacharyya, Siddhartha, ed. Intelligent Innovations in Multimedia Data Engineering and Management. First edition. IGI Global, USA, pp. 141-163. ISBN 978-1-5225-8783-5. E-ISBN 978-1-5225-7108-7. (doi:10.4018/978-1-5225-7107-0.ch006) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:74214) |
T
Turner, Sarah (2023) Approaches to Support Families' Engagement with Cyber Security for Home IoT Devices. Doctor of Philosophy (PhD) thesis, University of Kent,. (doi:10.22024/UniKent/01.02.104478) (KAR id:104478) |
Turner, Sarah, Pattnaik, Nandita, Nurse, Jason R. C., Li, Shujun (2022) "You Just Assume It Is In There, I Guess": UK Families' Application And Knowledge Of Smart Home Cyber Security. Proceedings of the ACM on Human-Computer Interaction, 6 (CSCW2). Article Number 269. E-ISSN 2573-0142. (doi:10.1145/3555159) (KAR id:95346) |
Turner, Sarah, Nurse, Jason R. C., Li, Shujun (2022) "It was hard to find the words": Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices. In: ACM Conference on Human Factors in Computing Systems (CHI). 2022 ACM CHI Conference on Human Factors in Computing Systems. . ACM ISBN 978-1-4503-9156-6. (doi:10.1145/3491101.3503577) (KAR id:92356) |
Turner, Sarah, Nurse, Jason R. C., Li, Shujun (2021) When Googling it doesn’t work: The challenge of finding security advice for smart home devices. In: Human Aspects of Information Security and Assurance. HAISA 2021. IFIP Advances in Information and Communication Technology. 613. Springer ISBN 978-3-030-81110-5. E-ISBN 978-3-030-81111-2. (doi:10.1007/978-3-030-81111-2_10) (KAR id:88357) |
Tussyadiah, Iis, Li, Shujun, Miller, Graham (2018) Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For. In: Pesonen, Juho and Neidhardt, Julia, eds. Information and Communication Technologies in Tourism 2019: Proceedings of the International Conference in Nicosia, Cyprus, January 30–February 1, 2019. . pp. 278-290. Springer Nature Switzerland AG, Cham, Switzerland ISBN 978-3-030-05939-2. E-ISBN 978-3-030-05940-8. (doi:10.1007/978-3-030-05940-8_22) (KAR id:71418) |
W
Waldock, Krysia Emily, Miller, Vincent, Li, Shujun, Franqueira, Virginia N. L. (2022) Pre-University Cyber Security Education: A report on developing cyber skills amongst children and young people. Global Forum on Cyber Expertise, 159 pp. (KAR id:96040) |
Wang, Hui and Ho, Anthony T.S. and Li, Shujun (2021) OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework. In: Computer Security ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020, Revised Selected Papers. Lecture Notes in Computer Science . Springer, Cham, Switzerland, pp. 243-260. ISBN 978-3-030-66503-6. E-ISBN 978-3-030-66504-3. (doi:10.1007/978-3-030-66504-3_15) (KAR id:84857) |
Wang, Zichi, Li, Shujun, Zhang, Xinpeng (2019) Towards Improved Steganalysis: When Cover Selection is Used in Steganography. IEEE Access, 7 . pp. 168914-168921. ISSN 2169-3536. (doi:10.1109/ACCESS.2019.2955113) (KAR id:79178) |
Wiiliams, Nick, Li, Shujun (2017) Simulating human detection of phishing websites: An investigation into the applicability of ACT-R cognitive behaviour architecture model. In: Proceedings of 2017 3rd IEEE International Conference on Cybernetics. . pp. 471-478. IEEE, USA ISBN 978-1-5386-2201-8. E-ISBN 978-1-5386-2200-1. (doi:10.1109/CYBConf.2017.7985810) (KAR id:74278) |
X
Xu, Yang, Guo, Jie, Qiu, Weidong, Huang, Zheng, Altuncu, Enes, Li, Shujun (2023) “Comments Matter and The More The Better!”: Improving Rumor Detection with User Comments. In: Proceedings of the 2022 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2022). . pp. 383-390. IEEE ISBN 978-1-6654-9425-0. (doi:10.1109/TrustCom56396.2022.00060) (KAR id:97593) |
Y
Yuan, Xin, Guo, Jie, Qiu, Weidong, Huang, Zheng, Li, Shujun (2023) Support or Refute: Analyzing the Stance of Evidence to Detect Out-of-Context Mis- and Disinformation. In: Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing. . pp. 4268-4280. Association for Computational Linguistics (doi:2023.emnlp-main.259) (KAR id:104246) |
Yuan, Haiyue, Boakes, Matthew, Ma, Xiao, Cao, Dongmei, Li, Shujun (2023) Visualising Personal Data Flows: Insights from a Case Study of Booking.com. In: Lecture Notes in Business Information Processing. Intelligent Information Systems: CAiSE Forum 2023, Zaragoza, Spain, June 12–16, 2023, Proceedings. 477. pp. 52-60. Springer Cham, Cham, Germany E-ISBN 978-3-031-34674-3. (doi:10.1007/978-3-031-34674-3_7) (KAR id:101789) |
Yuan, Haiyue, Li, Shujun, Rusconi, Patrice (2021) CogTool+: Modeling human performance at large scale. ACM Transactions on Computer-Human Interaction, 28 (2). Article Number 7. ISSN 1073-0516. E-ISSN 1557-7325. (doi:10.1145/3447534) (KAR id:87545) |
Yuan, Haiyue and Li, Shujun (2020) MATLAB software prototype for detecting vehicle convoys based on ANPR (Automated Number Plate Recognition) data. NA Electronic files. (Unpublished) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:80296) |
Yuan, Haiyue and Li, Shujun and Rusconi, Patrice and Aljaffan, Nouf (2017) When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust 5th International Conference. Lecture Notes in Computer Science . Springer, Cham, Switzerland, pp. 251-264. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:10.1007/978-3-319-58460-7_17) (KAR id:69559) |
Č
Čagalja, Mario, Perković, Toni, Bugarić, Marin, Li, Shujun (2015) Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks. Pervasive and Mobile Computing, 20 . pp. 64-81. ISSN 1574-1192. (doi:10.1016/j.pmcj.2014.09.002) (KAR id:69556) |