Browse by Person (creator, editor, contributor, etc.)
Up a level |
Jump to: Article | Conference or workshop item
Number of items: 12.
Article
Li, Chengqing and Feng, Bingbing and Li, Shujun and Kurths, Jurgen and Chen, Guanrong (2019) Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks. IEEE Transactions on Circuits and Systems I: Regular Papers, . pp. 1-14. ISSN 1549-8328. (doi:https://doi.org/10.1109/TCSI.2018.2888688) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) |
Liu, Ximing and Li, Yingjiu and Deng, Robert H. and Chang, Bing and Li, Shujun (2019) When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. Computers and Security, 80 . pp. 90-107. ISSN 0167-4048. (doi:https://doi.org/10.1016/j.cose.2018.09.003) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) |
Ong, SimYing and Li, Shujun and Wong, KokSheik and Tan, KuanYew (2017) Fast recovery of unknown coefficients in DCT-transformed images. Signal Processing: Image Communication, 58 . pp. 1-13. ISSN 0923-5965. (doi:https://doi.org/10.1016/j.image.2017.06.002) (Full text available) |
?agalj, Mario and Perkovi?, Toni and Bugari?, Marin and Li, Shujun (2015) Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks. Pervasive and Mobile Computing, 20 . pp. 64-81. ISSN 1574-1192. (doi:https://doi.org/10.1016/j.pmcj.2014.09.002) (Full text available) |
Asghar, Hassan Jameel and Steinfeld, Ron and Li, Shujun and Kaafa, Mohamed Ali and Pieprzyk, Josef (2015) On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices. IEEE Transactions on Information Forensics and Security, 10 (8). pp. 1643-1655. ISSN 1556-6013. (doi:https://doi.org/10.1109/TIFS.2015.2421875) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) |
Conference or workshop item
Tussyadiah, Iis and Li, Shujun and Miller, Graham (2018) Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For. In: Pesonen, Juho and Neidhardt, Julia, eds. Information and Communication Technologies in Tourism 2019: Proceedings of the International Conference in Nicosia, Cyprus, January 30–February 1, 2019. Springer Nature Switzerland AG, Cham, Switzerland pp. 278-290. ISBN 978-3-030-05939-2. E-ISBN 978-3-030-05940-8. (doi:https://doi.org/10.1007/978-3-030-05940-8_22) (Full text available) |
Li, Shujun and Ho, Anthony TS and Wang, Zichi and Zhang, Xinpeng (2018) Lost in the Digital Wild: Hiding Information in Digital Activities. In: Hallman, Roger and Li, Shujun and Chang, Victor, eds. MPS'18: 2nd International Workshop on Multimedia Privacy and Security Proceedings. ACM ISBN 978-1-4503-5988-7. (doi:https://doi.org/10.1145/3267357.3267365) (Full text available) |
Aslan, Ça?r? B. and Sa?lam, Rahime Belen and Li, Shujun (2018) Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example. In: Proceedings of 9th International Conference on Social Media & Society. ACM ISBN 978-1-4503-6334-1. (doi:https://doi.org/10.1145/3217804.3217919) (Full text available) |
Alqahtani, Saeed Ibrahim and Li, Shujun (2017) PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices. In: Fischer, Mathias, ed. Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, New York, NY, USA Article No. 19. ISBN 978-1-4503-5257-4. (doi:https://doi.org/10.1145/3098954.3098984) (Full text available) |
Hosu, Vlad and Hahn, Franz and Jenadeleh, Mohsen and Lin, Hanhe and Men, Hui and Szirányi, Tamás and Li, Shujun and Saupe, Dietmar (2017) The Konstanz Natural Video Database (KoNViD-1k). In: 2017 Ninth International Conference on Quality of Multimedia Experience (QoMEX). Proceedings of the 2017 9th International Conference on Quality of Multimedia Experience. IEEE, Germany ISBN 978-1-5386-4025-8. E-ISBN 978-1-5386-4024-1. (doi:https://doi.org/10.1109/QoMEX.2017.7965673) (Full text available) |
Aljaffan, Nouf and Yuan, Haiyue and Li, Shujun (2017) PSV (Password Security Visualizer): From Password Checking to User Education. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Lecture Notes in Computer Science, 10292. Springer International Publishing AG pp. 191-211. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:https://doi.org/10.1007/978-3-319-58460-7_13) (Full text available) |
Yuan, Haiyue and Li, Shujun and Rusconi, Patrice and Aljaffan, Nouf (2017) When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Lecture Notes in Computer Science, 10292. Springer International Publishing AG pp. 251-264. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:https://doi.org/10.1007/978-3-319-58460-7_17) (Full text available) |