Skip to main content
Kent Academic Repository

Browse by Person (creator, editor, contributor, etc.)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date | No Grouping
Number of items: 12.

Article

Li, Chengqing and Feng, Bingbing and Li, Shujun and Kurths, Jurgen and Chen, Guanrong (2019) Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks. IEEE Transactions on Circuits and Systems I: Regular Papers, . pp. 1-14. ISSN 1549-8328. (doi:https://doi.org/10.1109/TCSI.2018.2888688) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Liu, Ximing and Li, Yingjiu and Deng, Robert H. and Chang, Bing and Li, Shujun (2019) When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. Computers and Security, 80 . pp. 90-107. ISSN 0167-4048. (doi:https://doi.org/10.1016/j.cose.2018.09.003) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Ong, SimYing and Li, Shujun and Wong, KokSheik and Tan, KuanYew (2017) Fast recovery of unknown coefficients in DCT-transformed images. Signal Processing: Image Communication, 58 . pp. 1-13. ISSN 0923-5965. (doi:https://doi.org/10.1016/j.image.2017.06.002) (Full text available)
[img]
Preview

?agalj, Mario and Perkovi?, Toni and Bugari?, Marin and Li, Shujun (2015) Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks. Pervasive and Mobile Computing, 20 . pp. 64-81. ISSN 1574-1192. (doi:https://doi.org/10.1016/j.pmcj.2014.09.002) (Full text available)
[img]
Preview

Asghar, Hassan Jameel and Steinfeld, Ron and Li, Shujun and Kaafa, Mohamed Ali and Pieprzyk, Josef (2015) On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices. IEEE Transactions on Information Forensics and Security, 10 (8). pp. 1643-1655. ISSN 1556-6013. (doi:https://doi.org/10.1109/TIFS.2015.2421875) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Conference or workshop item

Tussyadiah, Iis and Li, Shujun and Miller, Graham (2018) Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For. In: Pesonen, Juho and Neidhardt, Julia, eds. Information and Communication Technologies in Tourism 2019: Proceedings of the International Conference in Nicosia, Cyprus, January 30–February 1, 2019. Springer Nature Switzerland AG, Cham, Switzerland pp. 278-290. ISBN 978-3-030-05939-2. E-ISBN 978-3-030-05940-8. (doi:https://doi.org/10.1007/978-3-030-05940-8_22) (Full text available)
[img]
Preview

Li, Shujun and Ho, Anthony TS and Wang, Zichi and Zhang, Xinpeng (2018) Lost in the Digital Wild: Hiding Information in Digital Activities. In: Hallman, Roger and Li, Shujun and Chang, Victor, eds. MPS'18: 2nd International Workshop on Multimedia Privacy and Security Proceedings. ACM ISBN 978-1-4503-5988-7. (doi:https://doi.org/10.1145/3267357.3267365) (Full text available)
[img]
Preview

Aslan, Ça?r? B. and Sa?lam, Rahime Belen and Li, Shujun (2018) Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example. In: Proceedings of 9th International Conference on Social Media & Society. ACM ISBN 978-1-4503-6334-1. (doi:https://doi.org/10.1145/3217804.3217919) (Full text available)
[img]
Preview

Alqahtani, Saeed Ibrahim and Li, Shujun (2017) PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices. In: Fischer, Mathias, ed. Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, New York, NY, USA Article No. 19. ISBN 978-1-4503-5257-4. (doi:https://doi.org/10.1145/3098954.3098984) (Full text available)
[img]
Preview

Hosu, Vlad and Hahn, Franz and Jenadeleh, Mohsen and Lin, Hanhe and Men, Hui and Szirányi, Tamás and Li, Shujun and Saupe, Dietmar (2017) The Konstanz Natural Video Database (KoNViD-1k). In: 2017 Ninth International Conference on Quality of Multimedia Experience (QoMEX). Proceedings of the 2017 9th International Conference on Quality of Multimedia Experience. IEEE, Germany ISBN 978-1-5386-4025-8. E-ISBN 978-1-5386-4024-1. (doi:https://doi.org/10.1109/QoMEX.2017.7965673) (Full text available)
[img]
Preview

Aljaffan, Nouf and Yuan, Haiyue and Li, Shujun (2017) PSV (Password Security Visualizer): From Password Checking to User Education. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Lecture Notes in Computer Science, 10292. Springer International Publishing AG pp. 191-211. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:https://doi.org/10.1007/978-3-319-58460-7_13) (Full text available)
[img]
Preview

Yuan, Haiyue and Li, Shujun and Rusconi, Patrice and Aljaffan, Nouf (2017) When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Lecture Notes in Computer Science, 10292. Springer International Publishing AG pp. 251-264. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:https://doi.org/10.1007/978-3-319-58460-7_17) (Full text available)
[img]
Preview

This list was generated on Sat May 4 20:10:36 2019 BST.