ResearcherID Thomson Reuters  

Li, Shujun
Create a ResearcherID badge for this researcher View publications analytics for this researcher
Close
ResearcherID: A-9032-2008
Other Names: hooklee
URL: http://www.researcherid.com/rid/A-9032-2008
Subject: Computer Science; Engineering
Keywords: chaotic cryptography; multimedia security; human iterative proofs; secure multimedia computing; digital chaos; usable security; perceptual quality assessment
ORCID: http://orcid.org/0000-0001-5628-7328
My Institutions (more details)
Primary Institution:
Sub-org/Dept: Department of Computer Science; Surrey Centre for Cyber Security
Role:
Past Institutions: University of Konstanz, Germany; Xi'an Jiaotong university; City University of Hong Kong; The Hong Kong Polytechnic University; FernUniversität in Hagen
Description:
 
 

This list contains papers that I have authored.

publication(s)  
First Page Previous Page Page   of  10  Go Next Page Last Page
  Sort by:    Results per page: 
1.  Title: Can Humans Detect the Authenticity of Social Media Accounts? On the impact of verbal and non-verbal cues on credibility judgements of Twitter profiles
 Author(s): Sandy, C.; Rusconi, P.; Li, S. J.; et al.
 Source: 2017 3rd Ieee International Conference on Cybernetics Pages: 479-486 Published: 2017
 Times Cited: 0
added
26-Dec-17
2.  Title: Fast recovery of unknown coefficients in DCT-transformed images
 Author(s): Ong, S.; Li, S.; Wong, K.; et al.
 Source: Signal Processing: Image Communication Volume: 58 Pages: 1-13 Published: 2017
 Times Cited: 0
 DOI: 10.1016/j.image.2017.06.002 /  Author-provided URL : http://www.scopus.com/inward/record.url?eid=2-s2.0-85023641780&partnerID=MN8TOAR ...
added
26-Dec-17
3.  Title: Fast recovery of unknown coefficients in DCT-transformed images
 Author(s): Ong, S.; Li, S. J.; Wong, K.; et al.
 Source: Signal Processing-Image Communication Volume: 58 Pages: 1-13 Published: 2017
 Times Cited: 0
 DOI: 10.1016/j.image.2017.06.002
added
26-Dec-17
4.  Title: PPAndroid-benchmarker: Benchmarking privacy protection systems on android devices
 Author(s): Alqahtani, S.I.; Li, S.
 Conference: ACM International Conference Proceeding Series Volume: Part F130521 Year: 2017
 DOI: 10.1145/3098954.3098984 /  Author-provided URL : http://www.scopus.com/inward/record.url?eid=2-s2.0-85030315843&partnerID=MN8TOAR ...
added
26-Dec-17
5.  Title: PSV (Password security visualizer): From password checking to user education
 Author(s): Aljaffan, N.; Yuan, H.; Li, S.
 Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Volume: 10292 LNCS Pages: 191-211 Published: 2017
 DOI: 10.1007/978-3-319-58460-7_13 /  Author-provided URL : http://www.scopus.com/inward/record.url?eid=2-s2.0-85025131186&partnerID=MN8TOAR ...
added
26-Dec-17
6.  Title: Simulating human detection of phishing websites: An investigation into the applicability of ACT-R cognitive behaviour architecture model
 Author(s): Williams, N.; Li, S. J.; Ieee,
 Source: 2017 3rd Ieee International Conference on Cybernetics Pages: 471-478 Published: 2017
 Times Cited: 0
added
26-Dec-17
7.  Title: The Konstanz natural video database (KoNViD-1k)
 Author(s): Hosu, V.; Hahn, F.; Jenadeleh, M.; et al.
 Conference: 2017 9th International Conference on Quality of Multimedia Experience, QoMEX 2017 Year: 2017
 DOI: 10.1109/QoMEX.2017.7965673 /  Author-provided URL : http://www.scopus.com/inward/record.url?eid=2-s2.0-85026755425&partnerID=MN8TOAR ...
added
26-Dec-17
8.  Title: When eye-tracking meets cognitive modeling: Applications to cyber security systems
 Author(s): Yuan, H.; Li, S.; Rusconi, P.; et al.
 Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Volume: 10292 LNCS Pages: 251-264 Published: 2017
 DOI: 10.1007/978-3-319-58460-7_17 /  Author-provided URL : http://www.scopus.com/inward/record.url?eid=2-s2.0-85025117136&partnerID=MN8TOAR ...
added
26-Dec-17
9.  Title: Content-fragile commutative watermarking-encryption based on pixel entropy
 Author(s): Schmitz, R.; Li, S.; Grecos, C.; et al.
 Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Volume: 9386 Pages: 474-485 Published: 2015
 Times Cited: 0
 DOI: 10.1007/978-3-319-25903-1_41 /  Author-provided URL : http://www.scopus.com/inward/record.url?eid=2-s2.0-84949224058&partnerID=MN8TOAR ...
added
26-Dec-17
10.  Title: Digital Forensics Laboratories in Operation: How are Multimedia Data and Devices Handled?
 Author(s): Shjun Li; Anthony~T.S. Ho
 Source: Handbook of Digital Forensics of Multimedia Data and Devices Pages: 3-37 Published: 2015
added
26-Dec-17
publication(s)  
First Page Previous Page Page   of  10  Go Next Page Last Page
  Sort by:    Results per page: