Professor Shujun LI (李树钧) FBCS SrMIEEE MACM Director, Institute of Cyber Security for Society (iCSS) (an ACE-CSR and an ACE-CSE) Professor of Cyber Security and Head of Cyber Security Research Group, School of Computing University of Kent, Keynes College, Canterbury, Kent, CT2 7NP, UK Visiting Professor, Department of Computer Science University of Surrey, Guildford, Surrey, GU2 7XH, UK |
||
Email: hooklee@gmail.com (private), S.J.Li@kent.ac.uk (work) | ||
News and Quick Links
- Shortcurts:
- Announcement of prize winners: iCSS at the University of Kent, KMCC (Kent & Medway Cyber Cluster Ltd) and KMCS3 (Kent & Medway Cyber Security Student Society) jointly organised a CyberAnything Competition. All prize winners were announced on 22nd May 2024 at the iCSS-KMCC-ISC2-KMCS3 "Celebrating Cyber" event and the prize-winning submissions can be found at this page. An exhibition in September and October 2024 is planned based on the submissions.
- Two animated videos for cyber security awareness: Since 2022, iCSS researchers have been producing animated videos for cyber security awareness, as free resources for all. 1) In 2022, working with Scriberia, a school ICT teacher, two school pupils (9-year-olds) and a number of cyber security researchers at the University of Kent, iCSS made an animated video entitled "How to be a cyber superhero" for young children and schools to understand more about the interdisciplinary nature of cyber security, the diverse career options and the importance of continuous learning and collaboration. The video was also converted to an illustrated children's book and it can downloaded for free from here. A news story about it can be found here. 2) In 2023, working with SciAni and a number of cyber security researchers at the University of Kent, iCSS made a second animated video entitled "Why does cyber security matter for everyone?". It uses a number of real-world scenarios to inform the general public about online risks and how they can better protect themselves in the cyber world, or the Internet of Everything. A news story about it can be found here.
- New resource for children: The first animated video above has also been converted to a digital book free for all to use. Please download it from here.
- New resource (last updated on 21 January 2024): Shujun is maintaining an online bibliography of SoK (Systematization of Knowledge) papers, a new type of research papers made popular since IEEE S&P 2010. Welcome to use it and report missing entries.
Brief Biography (CV)
Shujun Li received his BE degree in Information Science and Engineering in 1997, and his PhD degree in Information and Communication Engineering in 2003 under supervision of Prof. Yuanlong Cai (蔡元龙) and Prof. Xuanqin Mou (牟轩沁), both from the Xi'an Jiaotong University (西安交通大学). During 2003 to 2005, he was a postdoctoral Research Assistant with the Department of Electronic Engineering, City University of Hong Kong (香港城市大学), under supervision of Prof. Guanrong (Ron) Chen (陈关荣). From 2005 to 2007, he was a postdoctoral fellow funded by The Hong Kong Polytechnic University (香港理工大学)'s Postdoctoral Fellowships Scheme, working at the Department of Electronic and Information Engineering with Dr. Kwok-Tung Lo (卢国栋). From 2007 to 2008, he was a Humboldt Research Fellow and doing his research at the FernUniversität in Hagen, Germany, hosted by Prof. Dr. Dr. Wolfgang A. Halang. From 2008 to 2011, he was a 5-Year Research Fellow at the Zukunftskolleg (Institute for Advanced Study), Universität Konstanz, Germany, and a junior faculty member of the Department of Computer and Information Science, working closely with Prof. Dr. Dietmar Saupe's group on Multimedia Signal Processing. In September 2011, he joined the Department of Computing (renamed to Department of Computer Science in August 2015), University of Surrey, UK, as a Senior Lecturer and then a Reader (Associate Professor). From 2014 to 2017, he was a Deputy Director of the Surrey Centre for Cyber Security (SCCS), leading the cross-cutting research theme Human Factors (known as Human-Centred Security between July 2014 and January 2017). Since November 2017, he has been a Professor of Cyber Security at the University of Kent, leading the Security Group of its School of Computing and the university-wide Kent Interdisciplinary Research Centre in Cyber Security (KirCCS). From January 2021, he has been the Founding Director of the Institute of Cyber Security for Society (iCSS), the third university-wide institute at the University of Kent.Since 2000, Shujun Li has published over 100 scientific papers with five Best Paper Awards and one Honorable Mention, and his research interests are mainly on cyber security (including usable security and user privacy, digital forensics and cyber crime, security and privacy in online social networks, mobile security and systems security in general, information hiding, human behavior/scam/crime/privacy aspects and AI/multimedia applications using distributed ledger techonologies, but NOT cryptography and purely theoretical aspects), data analytics and multimedia computing (including visual quality assessment and image/video coding), and human factors (including usability, human behaviors, and accessibility), applications (i.e., NOT theory) of artificial intelligence, education and learning since 2021. He also keeps his older research interests in applications of discrete optimization to multimedia computing especially recovering of unknown/missing/lost/manipulated information in digital images and videos (see here for a representative publication), and interdisciplinary topics betwen nonlinear science (chaos/fractals) and electronic engineering and computer science epecially digital degradation of chaotic systems in the digital domain (see here and here for two representative publications) and cryptanalysis of chaos-based secure communications schemes and digital ciphers. More about Shujun's research interests can be found here. Shujun Li is a Fellow of the BCS, a Senior Member of the IEEE, a Professional Member of the ACM and a Global Member of the Internet Society (ISOC). From 2009-2011 he was a member of MPEG (ISO/IEC JCT 1/SC 29/WG 11), and in 2012 was awarded an ISO/IEC Certificate of Appreciation for being the lead editor of ISO/IEC 23001-4:2011 "Information technology – MPEG systems technologies – Part 4: Codec configuration representation", the 2nd edition of the MPEG RVC standard.
Professional Activities
To Prospective Research (PhD/Visiting) Students
To Prospective RAs/RFs/VRs
Terms: RAs = (Postdoctoral) Research Assistants / Research Associates, RFs = (Postdoctoral) Research Fellows, VRs = Visiting ResearchersIf you have obtained your doctoral degree and want to do research with me as an RA/RF or a VR, please check the News section of this page and my Research page for research positions. When there are no open positions, you are still welcome to contact me as there are various research fellowship schemes I can help you apply.
Scientometrics
h-index
Self-Citations Excluded:h-index = 44 (estimated from data in ResearchGate)
Self-Citations Included:
h-index = 46 (estimated from data in ResearchGate)
h-index = 50 (estimated from data in Google Scholar Citations)
Erdös Number = 3
- Paul Erdős Prof. Charles K. Chui (崔锦泰) Prof. Guanrong Chen (陈关荣) Shujun Li
- Paul Erdős Prof. Ron C. Mullin Prof. Spyros S. Magliveras Shujun Li
Research Grants/Fellowships
Selected Publications
- Kai-Fung Chu, Haiyue Yuan, Jinsheng Yuan, Weisi Guo, Nazmiye Balta-Ozkan and Shujun Li, "A Survey of AI-Related Cyber Security Risks and Countermeasures in Mobility-as-a-Service," accepted to IEEE Intelligent Transportation Systems Magazine in July 2024 © IEEE
- Nandita Pattnaik, Shujun Li and Jason R. C. Nurse, "Security and privacy perspectives of people living in shared home environments," Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 8, Issue CSCW2, Article Number 368, 40 pages, ACM, 2024, accepted to CSCW 2024 (27th ACM Conference on Computer-Supported Cooperative Work and Social Computing) © Authors
- Enes Altuncu, Virginia N. L. Franqueira and Shujun Li, "Deepfake: Definitions, Performance Metrics and Standards, Datasets, and a Meta-Review," accepted to Section of Cybersecurity and Privacy of Frontiers in Big Data in August 2024 as part of the Research Topic "Cybersecurity and Artificial Intelligence: Advances, Challenges, Opportunities, Threats", to be published in Volume 7 © Frontiers Media S.A.
- Haiyue Yuan, Ali Raza, Nikolay Matyunin, Jibesh Patra and Shujun Li, "A Graph-Based Model for Vehicle-Centric Data Sharing Ecosystem," accepted to ITSC 2024 (27th IEEE International Conference on Intelligent Transportation Systems) in July 2024 © IEEE
- Haozhang Li, Yangde Wang, Weidong Qiu, Shujun Li and Peng Tang, "PassTSL: Modeling Human-Created Passwords through Two-Stage Learning," in Information Security and Privacy: 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15–17, 2024, Proceedings, Part III, Lecture Notes in Computer Science (LNCS), Volume 14897, pp. 404-423, 2024 © Springer
- Ruiyuan Lin, Sheng Liu, Jun Jiang, Shujun Li, Chengqing Li and C.-C. Jay Kuo, "Recovering sign bits of DCT coefficients in digital images as an optimization problem," Journal of Visual Communication and Image Representation, Volume 98, Article Number 104045, 14 pages, 2024, Elsevier Inc. © Authors
- Zhanbo Liang, Jie Guo, Weidong Qiu, Zheng Huang and Shujun Li, "When Graph Convolution Meets Double Attention: Online Privacy Disclosure Detection with Multi-Label Text Classification," Data Mining and Knowledge Discovery, Volume 38, pp. 1171-1192, 2024, Springer, to be presented at ECML-PKDD 2024 (36th European Conference on Machine Learning & 28th European Conference on Principles and Practice of Knowledge Discovery in Databases) in September 2024 © Authors
- Xin Yuan, Jie Guo, Weidong Qiu, Zheng Huang and Shujun Li, "Support or Refute: Analyzing the Stance of Evidence to Detect Out-of-Context Mis- and Disinformation," in Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing (EMNLP 2023), pp. 4268-4280, 2023 © ACL
- Rahime Belen Sağlam, Enes Altuncu, Yang Lu and Shujun Li, "A Systematic Literature Review of the Tension between the GDPR and Public Blockchain Systems," Blockchain: Research and Applications, Volume 4, Number 2, Article Number 100129, 23 pages, Elsevier Science B. V. on behalf of Zhejiang University Press © Authors
- Sam Parker, Haiyue Yuan and Shujun Li, "PassViz: A Visualisation System for Analysing Leaked Passwords," in Proceedings of the 2023 20th IEEE Symposium on Visualization for Cyber Security (VizSec 2023), pp. 33-42, 2023 © IEEE
- Jamie Knott, Haiyue Yuan, Matthew Boakes and Shujun Li, "Cyber Security and Online Safety Education for Schools in the UK: Looking through the Lens of Twitter Data," in Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing (SAC 2023), pp. 1603-1606, 2023 © ACM
- Enes Altuncu, Jason R.C. Nurse, Meryem Bagriacik, Sophie Kaleba, Haiyue Yuan, Lisa Bonheme and Shujun Li, "aedFaCT: Scientific Fact-Checking Made Easier via Semi-Automatic Discovery of Relevant Expert Opinions," in Workshop Proceedings of the 17th International AAAI Conference on Web and Social Media, Article Number 27, 10 pages, presented at MEDIATE 2023 (5th Workshop on News Media and Computational Journalism), co-located with ICWSM 2023 (17th International AAAI Conference on Web and Social Media), 2023 © AAAI
- Haiyue Yuan, Matthew Boakes, Xiao Ma, Dongmei Cao and Shujun Li, "Visualising Personal Data Flows: Insights from a Case Study of Booking.com," in Intelligent Information Systems: CAiSE Forum 2023, Zaragoza, Spain, June 12–16, 2023, Proceedings, Lecture Notes in Business Information Processing (LNBIP), Volume 477, pp. 52-60, 2023 © Springer Nature
- Ali Raza, Kim Phuc Tran, Ludovic Koehl and Shujun Li, "AnoFed: Adaptive anomaly detection for digital health using transformer-based federated learning and support vector data description," Engineering Applications of Artificial Intelligence, Volume 121, Article Number 106051, 16 pages, 2023 © Elsevier Science B. V.
- Nandita Pattnaik, Shujun Li and Jason R.C. Nurse, "A Survey of User Perspectives on Security and Privacy in a Home Networking Environment," ACM Computing Surveys, Volume 55, Number 9, Article Number 180, 38 pages, 2023, ACM © Authors
- Nandita Pattnaik, Shujun Li and Jason R.C. Nurse, "Perspectives of Non-Expert Users on Cyber Security and Privacy: An Analysis of Online Discussions on Twitter," Computers & Security, Volume 125, Article Number 103008, 15 pages, 2023 © Elsevier Science B. V.
- Yang Xu, Jie Guo, Weidong Qiu, Zheng Huang, Enes Altuncu and Shujun Li, "“Comments Matter and The More The Better!”: Improving Rumor Detection with User Comments," in Proceedings of the 2022 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 383-390, 2022 © IEEE
- Haiyue Yuan and Shujun Li, "Cyber Security Risks of Net Zero Technologies," in Proceedings of the 2022 5th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022), invited paper, 11 pages, 2022 © IEEE
- Krysia Emily Waldock, Vince Miller, Shujun Li and Virginia N.L. Franqueira, "Pre-University Cyber Security Education: A report on developing cyber skills amongst children and young people," technical report, 159 pages, February 2022 © Global Forum on Cyber Expertise (GFCE)
- Sarah Turner, Nandita Pattnaik, Jason R. C. Nurse and Shujun Li, "“You just assume it is in there, I guess”: Understanding UK families' application and knowledge of smart home cyber security," Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 6, Number CSCW2, Article Number 269, 34 pages, ACM, 2022, accepted as a paper to be presented at CSCW 2022 (25th ACM Conference on Computer-Supported Cooperative Work and Social Computing) © Authors
- Keenan Jones, Jason R. C. Nurse and Shujun Li, "Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators," Proceedings of the 2022 16th AAAI International Conference on Web and Social Media, pp. 429-440, 2022 © AAAI
- Keenan Jones, Jason R. C. Nurse and Shujun Li, "Out of the Shadows: Analyzing Anonymous' Twitter Resurgence during the 2020 Black Lives Matter Protests," Proceedings of the 2022 16th AAAI International Conference on Web and Social Media, pp. 417-428, 2022 © AAAI
- Yang Lu and Shujun Li, "From Data Flows to Privacy-Benefit Trade-offs: A User-Centric Semantic Model," published online first at Security and Privacy, John Wiley & Sons Ltd, 2022 © Authors
- Yang Lu, Shujun Li, Alex Freitas and Athina Ioannou, "How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis," EAI Endorsed Transactions on Security and Safety, Volume 8, Issue 30, Article Number e3, 20 pages, EAI, 2022, DOI: 10.4108/eai.21-12-2021.172440 © Authors
- Ali Raza, Kim Phuc Tran, Ludovic Koehl and Shujun Li, "Designing ECG Monitoring Healthcare System with Federated Transfer Learning and Explainable AI," Knowledge-Based Systems, Volume 236, Article Number 107763, 17 pages, 2022 © Elsevier Science B. V.
- Sharifah Roziah Binti Mohd Kassim, Shujun Li and Budi Arief, "How National CSIRTs Leverage Public Data, OSINT and Free Tools in Operational Practices: An Empirical Study," Cyber Security: A Peer-Reviewed Journal, Volume 5, Number 3, pp. 251-276, 2022 © Henry Stewart Publications LLP
- Athina Ioannou, Iis Tussyadiah, Graham Miller, Shujun Li and Mario Weick, "Privacy nudges for disclosure of personal information: A systematic literature review and meta-analysis," PLoS ONE, Volume 16, Number 8, Article Number e0256822, 29 pages, PLoS, 2021 © Authors
- Haiyue Yuan, Shujun Li and Patrice Rusconi, "CogTool+: Modeling human performance at large scale," ACM Transactions on Computer-Human Interaction, Volume 28, Number 2, Article Number 7, 38 pages, ACM, 2021 © Authors
- Ingolf Becker, Rebecca Posner, Tasmina Islam, Paul Ekblom, Hervé Borrion, Michael McGuire and Shujun Li, "Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation," in Proceedings of the 54th Hawaii International Conference on System Sciences (HICSS 2021), pp. 5347-5356, University of Hawaiʻi at Mānoa, 2021 (Best Paper Award of Location Intelligence track) © Authors
- Çağrı B. Aslan, Shujun Li, Fatih V. Çelebi and Hao Tian, "The World of Defacers: Looking through the Lens of Their Activities on Twitter," IEEE Access, Volume 8, pp. 204132-204143, IEEE, 2020 © Authors
- Haiyue Yuan, Shujun Li and Patrice Rusconi, Cognitive Modeling for Automated Human Performance Evaluation at Scale (@Springer.com), part of Human–Computer Interaction Series book series (HCIS) and of SpringerBriefs in Human-Computer Interaction book sub series (BRIEFSHUMAN), ISBN 978-3-030-45704-4, 2020 © Springer
- Keenan Jones, Jason R. C. Nurse and Shujun Li, "Behind the Mask: A Computational Study of Anonymous’ Presence on Twitter," in Proceedings of 14th International Conference on Web and Social Media (ICWSM 2020), pp. 327-338, 2020 (one of eight Honourable Mentions for Best Paper Award; acceptance rate of full papers: 72/298=24%) © AAAI
- Rahime Belen Sağlam, Çağrı B. Aslan, Shujun Li, Lisa Dickson and Ganna Pogrebna, "A Data-Driven Analysis of Blockchain Systems' Public Online Communications on GDPR," in Proceedings of 2020 IEEE International Conference on Decentralized Applications and Infrastructures (IEEE DAPPS 2020), pp. 22-31, 2020 © IEEE
- Saeed Alqahtani, Shujun Li, Haiyue Yuan and Patrice Rusconi, "Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More?", EAI Endorsed Transactions on Security and Safety, Volume 18, EAI, 2020 © Authors
- 李树钧、卢扬,“人工智能与网络空间安全:黑(攻)与白(防)? ”,《人工智能与未来社会发展》第八章,郭毅可主编,119-156页,2020年出版 © 科学技术文献出版社
(Shujun Li and Yang Lu, "AI and Cyber Security: Black (Offence) and White (Defence)?" Chapter 8 of AI and Its Impact on Future Society, edited by Yi-Ke Guo, pp. 119-156, 2020 © Scientific and Technical Documentation Press) - Chengqing Li, Bingbing Feng, Shujun Li, Jürgen Kurths and Guanrong Chen, "Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks," IEEE Transactions on Circuits and Systems I: Regular Papers, Volume 66, Number 6, pp. 2322-2335, 2019 (Top 5 Most-Cited Papers at IEEETCASI as of January 22, 2022) © IEEE
- Ximing Liu, Yingjiu Li, Robert H. Deng, Bing Chang and Shujun Li, "When Human Cognitive Modeling Meets PINs: User-Independent Inter-Keystroke Timing Attacks," Computers & Security, Volume 80, pp. 90-107, 2019 © Elsevier Science B. V.
- Mohamad Imad Mahaini, Shujun Li and Rahime Belen Sağlam, "Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example," in Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019), Article Number 30, 9 pages, ACM, 2019 © Authors
- Yang Lu, Shujun Li, Athina Ioannou and Iis Tussyadiah, "From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework," in Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings, Communications in Computer and Information Science, Volume 1123, pp. 262-276 © Springer
- Tasmina Islam, Ingolf Becker, Rebecca Posner, Paul Ekblom, Michael McGuire, Hervé Borrion and Shujun Li, "A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems," in Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings, Communications in Computer and Information Science, Volume 1123, pp. 277-293 © Springer
- Shujun Li, Anthony T.S. Ho, Zichi Wang and Xinpeng Zhang, "Lost in the Digital Wild: Hiding Information in Digital Activities," in Proceedings of 2nd International Workshop on Multimedia Privacy and Security (MPS 2018, co-location with ACM CCS 2018 (25th ACM Conference on Computer and Communications Security)), pp. 27-37, ACM, 2018 (acceptance rate of full papers: 6/18=33%) © Authors
- Haiyue Yuan, Shujun Li, Patrice Rusconi and Nouf Aljaffan, "When Eye-tracking Meets Cognitive Modeling: Applications to Cyber Security Systems," in Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Lecture Notes in Computer Science, Volume 10292, pp. 251-264, 2017 (Best Paper Award: 1/46≈2.2%, Certificate) © Springer
- Nouf Aljaffan, Haiyue Yuan and Shujun Li, "PSV (Password Security Visualizer): From Password Checking to User Education," in Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Lecture Notes in Computer Science, Volume 10292, pp. 191-211, 2017 © Springer
- Vlad Hosu, Franz Hahn, Mohsen Jenadeleh, Hanhe Lin, Hui Men, Tamás Szirányi, Shujun Li and Dietmar Saupe, "The Konstanz Natural Video Database (KoNViD-1k)," in Proceedings of the 2017 9th International Conference on Quality of Multimedia Experience (QoMEX 2017), 2017 © IEEE
- Aamo Iorliam, Santosh Tirunagari, Anthony T.S. Ho, Shujun Li, Adrian Waller and Norman Poh, "'Flow Size Difference' Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law," arXiv:1609.04214 [cs.CR], first submitted on 14 September 2016 (v1), revised on 20 January 2017 (v2)
- Anthony T. S. Ho and Shujun Li (Editors), Handbook of Digital Forensics of Multimedia Data and Devices, 680 pages (e-book 704 pages), 16 chapters, ISBN: 978-1-118-64050-0 (e-book ISBN: 978-1-118-70579-7), John Wiley & Sons, Inc. and IEEE Press, September 2015 (Companion Website)
- Hassan Jameel Asghar, Ron Steinfeld, Shujun Li, Mohamed Ali Kaafar and Josef Pieprzyk, "On the Linearization of Human Identification Protocols: Attacks based on Linear Algebra, Coding Theory and Lattices," IEEE Transactions on Information Forensics and Security, Volume 10, Number 8, pp. 1643-1655, 2015 [Full Edition: IACR ePrint 2014/767] © IEEE
- Sabine Cornelsen, Andreas Karrenbauer and Shujun Li, "Leveling the Grid," in Proceedings of the Meeting on Algorithm Engineering & Experiments, Kyoto, Japan, January 16, 2012 (ALENEX 2012), pp. 45-54, 2012 (Acceptance rate: 15/48=31%) © SIAM
- Shujun Li, "Perceptual Encryption of Digital Images and Videos," in Perceptual Digital Imaging: Methods and Applications, edited by Rastislav Lukac, Chapter 14, pp. 431-468, 2012 © CRC Press (part of Taylor & Francis Group, LLC)
- Shujun Li, Andreas Karrenbauer, Dietmar Saupe and C.-C. Jay Kuo, "Recovering Missing Coefficients in DCT-Transformed Images," in Proceedings of 2011 18th IEEE International Conference on Image Processing (ICIP 2011, Brussels, Belgium, September 11-14, 2011), pp. 1537-1540, 2011 Companion Web Page (Media Coverage: Vision Systems Design) © IEEE
- Toni Perković, Asma Mumtaz, Yousra Javed, Shujun Li, Syed Ali Khayam and Mario Čagalj, "Breaking Undercover: Exploiting Design Flaws and Nonuniform Human Behavior," in Proceedings of 7th Symposium On Usable Privacy and Security (SOUPS 2011, Carnegie Mellon University in Pittsburgh, PA, USA, July 20-22, 2011), ACM, 2011, DOI: 10.1145/2078827.2078834 (Acceptance rate: 15/45=33.3%) © Authors
- Shujun Li, Ahmad-Reza Sadeghi, Sören Heisrath, Roland Schmitz and Junaid Jameel Ahmad, "hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers," in Financial Cryptography and Data Security: 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers, Lecture Notes in Computer Science, Volume 7035, pp. 235-249, Springer, 2012 (Acceptance rate of long papers: 15/74=20.3%) Companion Web Page © Springer
- Shujun Li, Syed Amier Haider Shah, Muhammad Asad Usman Khan, Syed Ali Khayam, Ahmad-Reza Sadeghi and Roland Schmitz, "Breaking e-Banking CAPTCHAs," in Proceedings of 26th Annual Computer Security Applications Conference (ACSAC 2010, Austin, TX, USA, December 6-10, 2010), pp. 171-180, 2010 (Acceptance rate: 39/227=17.2%) Companion Web Page (Media Coverage: Infosec Island, LLC) © ACM
- Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz and Huaxiong Wang, "On the Security of PAS (Predicate-based Authentication Service)," in: Proceedings of 25th Annual Computer Security Applications Conference (ACSAC 2009, December 7-11, 2009, Honolulu, Hawaii, USA), pp. 209-218, 2009, DOI: 10.1109/ACSAC.2009.27 (Acceptance rate: 44/224=19.6%) © IEEE
- Shujun Li and Roland Schmitz, "A Novel Anti-Phishing Framework Based on Honeypots," in: Proceedings of 4th Annual APWG eCrime Researchers Summit (eCRS 2009, October 20 & 21, 2009, Tacoma, WA, USA), IEEE, 2009 (Acceptance rate: 35%) Companion Web Page © IEEE
- Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez and Guanrong Chen, "On the security defects of an image encryption scheme," Image and Vision Computing, Volume 27, Number 9, pp. 1371-1381, 2009 © Elsevier Science B. V.
- Shujun Li, Chengqing Li, Kwok-Tung Lo and Guanrong Chen, "Cryptanalyzing an Encryption Scheme Based on Blind Source Separation," IEEE Transactions on Circuits and System-I: Regular Papers, Volume 55, Number 4, pp. 1055-1063, 2008 © IEEE
- Shujun Li, Chengqing Li, Guanrong Chen, Nikolaos G. Bourbakis and Kwok-Tung Lo, "A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks," Signal Processing: Image Communication, Volume 23, Number 3, pp. 212-223, 2008 © Elsevier Science B. V.
- Shujun Li, Chengqing Li, Kwok-Tung Lo and Guanrong Chen, "Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion," IEEE Transactions on Circuits and Systems for Video Technology,Volume 18, Number 3, pp. 338-349, 2008 (Regular Transaction Paper) © IEEE
- Shujun Li, Guanrong Chen, Albert Cheung, Bharat Bhargava and Kwok-Tung Lo, "On the Design of Perceptual MPEG-Video Encryption Algorithms," IEEE Transactions on Circuits and Systems for Video Technology, Volume 17, Number 2, pp. 214-223, 2007 (Regular Transaction Paper) © IEEE
- Shujun Li, Chengqing Li, Kwok-Tung Lo and Guanrong Chen, "Cryptanalysis of an Image Encryption Scheme," Journal of Electronic Imaging, Volume 15, Number 4, Article Number 043012, 13 pages, 2006 © SPIE
- Gonzalo Álvarez and Shujun Li, "Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems," International Journal of Bifurcation and Chaos (Tutorial-Review Section), Volume 16, Number 8, pp. 2129-2151, 2006 © World Scientific Publishing Co.
- Shujun Li, Guanrong Chen and Xuanqin Mou, "On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps," International Journal of Bifurcation and Chaos (Tutorial-Review Section), Volume 15, Number 10, pp. 3119-3151, 2005 © World Scientific Publishing Co.
- Shujun Li and Heung-Yeung Shum, "Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI," IACR's Cryptology ePrint Archive: Report 2005/268, received on 12 Aug 2005 (an early version has been appeared online in Elesevier Science's Comuter Science Preprint Archive, Volume 2004, Number 3, pp. 21-69, 2004)
- Shujun Li, "Permutation Polynomials modulo m," arXiv:math.NT/0509523, first submitted on 22 September 2005 (v1), revised on 1 December 2005 (v6)
- Shujun Li, "Null Polynomials modulo m," arXiv:math.NT/0510217, first submitted on 11 October 2005 (v1), revised on 14 November 2005 (v2)
- Shujun Li, "Evaluating Determinants of Two Classes of Special Matrices," arXiv:math.NT/0509350, first submitted on 15 September 2005 (v1), last revised on 13 October 2005 (v5)
- Shujun Li, "mpegSyntaxer - Visual Syntax Viewer of MPEG-1/2 Videos," version 1.0 beta, a joint product of the Centre for Chaos and Complex Networks (CCCN) and the Applied R&D Centres, City University of Hong Kong, 2005 © City University of Hong Kong
- Shujun Li, Guanrong Chen and Xuanqin Mou, "On the Security of the Yi-Tan-Siew Chaotic Cipher," IEEE Transactions on Circuits and Systems-II: Express Briefs, Volume 51, Number 12, pp. 665-669, 2004 © IEEE
- Shujun Li and Heung-Yeung Shum, "Secure Human-Computer Identification against Peeping Attacks (SecHCI): A Survey," technical report, Jan. 2003 (an early version has been published online in Elesevier Science's Comuter Science Preprint Archive, Volume 2003, Number 1, pp. 5-57, 2003)
- Shujun Li, "Analyses and New Designs of Digital Chaotic Ciphers (数字化混沌密码的分析与设计)," PhD thesis, School of Electronic and Information Engineering, Xi'an Jiaotong University, supervised by Prof. Yuanlong Cai and Prof. Xuanqin Mou, submitted in April 2003, defense passed on 13 June 2003, approved on 30 June 2003 (last modified on 16 November 2007, to correct minor errors and to update references) (2004 Outstanding PhD Thesis Award, Education Department of Shaanxi Provincial Government (陕西省教育厅); 2004 Outstanding PhD Thesis Award, Xi'an Jiaotong University (西安交通大学))