School of Computing

Publications by Prof Shujun Li

Also view these in the Kent Academic Repository

Articles
Liang, Z., Guo, J., Qiu, W., Huang, Z. and Li, S. (2024) 'When graph convolution meets double attention: online privacy disclosure detection with multi-label text classification', Data Mining and Knowledge Discovery. Springer. doi: 10.1007/s10618-023-00992-y.
Mohd Kassim, S. R. B., Li, S. and Arief, B. (2023) 'Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions', Digital Threats: Research and Practice. Association for Computing Machinery (ACM), pp. 1-24. doi: 10.1145/3609230.
Belen-Saglam, R., Altuncu, E., Lu, Y. and Li, S. (2023) 'A systematic literature review of the tension between the GDPR and public blockchain systems', Blockchain: Research and Applications. Elsevier B.V. on behalf of Zhejiang University Press, pp. 1-23. doi: 10.1016/j.bcra.2023.100129.
Raza, A., Tran, K. P., Koehl, L. and Li, S. (2023) 'AnoFed: Adaptive anomaly detection for digital health usingtransformer-based federated learning and support vector data description', Engineering Applications of Artificial Intelligence. Elsevier. doi: 10.1016/j.engappai.2023.106051.
Pattnaik, N., Li, S. and Nurse, J. R. C. (2023) 'A Survey of User Perspectives on Security and Privacy in a Home Networking Environment', ACM Computing Surveys. Association for Computing Machinery, pp. 180:1-180:38. doi: 10.1145/3558095.
Pattnaik, N., Li, S. and Nurse, J. R. C. (2022) 'Perspectives of Non-Expert Users on Cyber Security and Privacy: An Analysis of Online Discussions on Twitter', Computers and Security. Elsevier. doi: 10.1016/j.cose.2022.103008.
Turner, S., Pattnaik, N., Nurse, J. R. C. and Li, S. (2022) '"You Just Assume It Is In There, I Guess": UK Families' Application And Knowledge Of Smart Home Cyber Security', Proceedings of the ACM on Human-Computer Interaction. ACM. doi: 10.1145/3555159.
Lu, Y., Li, S., Freitas, A. A. and Ioannou, A. (2022) 'How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis', EAI Endorsed Transactions on Security and Safety. EAI, pp. 1-20. doi: 10.4108/eai.21-12-2021.172440.
Mohd Kassim, S. R. B., Li, S. and Arief, B. (2022) 'Incident Response Practices Across National CSIRTs: Results from an Online Survey', OIC-CERT Journal of Cyber Security. OIC CERT, pp. 67-84. Available at: https://www.oic-cert.org/en/journal/vol-4-issue-1/5.html.
Lu, Y. and Li, S. (2022) 'From Data Flows to Privacy-Benefit Trade-offs: A User-Centric Semantic Model', Security and Privacy. Wiley, pp. 1-24. doi: 10.1002/spy2.225.
Mohd Kassim, S. R. B., Li, S. and Arief, B. (2022) 'How National CSIRTs Leverage Public Data, OSINT and Free Tools in Operational Practices: An Empirical Study', Cyber Security: A Peer-Reviewed Journal. Simon Beckett, pp. 251-276. Available at: https://www.ingentaconnect.com/contentone/hsp/jcs/2022/00000005/00000003/art00007.
Raza, A., Tran, K. P., Koehl, L. and Li, S. (2022) 'Designing ECG Monitoring Healthcare System with Federated Transfer Learning and Explainable AI', Knowledge-Based Systems. Elsevier. doi: 10.1016/j.knosys.2021.107763.
Ioannou, A., Tussyadiah, I., Miller, G., Li, S. and Weick, M. (2021) 'Privacy nudges for disclosure of personal information: A systematic literature review and meta-analysis', PLoS ONE. Public Library of Science, pp. e0256822:1-e0256822:29. doi: 10.1371/journal.pone.0256822.
Yuan, H., Li, S. and Rusconi, P. (2021) 'CogTool+: Modeling human performance at large scale', ACM Transactions on Computer-Human Interaction. ACM. doi: 10.1145/3447534.
Aslan, Çaǧri B., Li, S., Çelebi, F. V. and Tian, H. (2020) 'The World of Defacers: Looking through the Lens of Their Activities on Twitter', IEEE Access. IEEE, pp. 204132-204143. doi: 10.1109/ACCESS.2020.3037015.
Hernández-Castro, C. J., Li, S. and R-Moreno, M. D. (2020) 'All about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks', Computers & Security. Elsevier. doi: 10.1016/j.cose.2020.101758.
Alqahtani, S. I., Li, S., Yuan, H. and Rusconi, P. (2020) 'Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More?', EAI Endorsed Transactions on Security and Safety. EAI. doi: 10.4108/eai.13-7-2018.162797.
Lu, Y., Ioannou, A., Tussyadiah, I. and Li, S. (2019) 'Segmenting travelers based on responses to nudging for information disclosure', e-Review of Tourism Research. e-Review of Tourism Research, pp. 394-406. Available at: https://journals.tdl.org/ertr/index.php/ertr/article/view/524.
Wang, Z., Li, S. and Zhang, X. (2019) 'Towards Improved Steganalysis: When Cover Selection is Used in Steganography', IEEE Access. IEEE, pp. 168914-168921. doi: 10.1109/ACCESS.2019.2955113.
Li, C., Feng, B., Li, S., Kurths, J. and Chen, G. (2019) 'Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks', IEEE Transactions on Circuits and Systems I: Regular Papers. IEEE, pp. 2322-2335. doi: 10.1109/TCSI.2018.2888688.
Liu, X., Li, Y., Deng, R. H., Chang, B. and Li, S. (2019) 'When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks', Computers and Security. Elsevier, pp. 90-107. doi: 10.1016/j.cose.2018.09.003.
Ong, S., Li, S., Wong, K. and Tan, K. (2017) 'Fast recovery of unknown coefficients in DCT-transformed images', Signal Processing: Image Communication. Elsevier, pp. 1-13. doi: 10.1016/j.image.2017.06.002.
Čagalja, M., Perković, T., Bugarić, M. and Li, S. (2015) 'Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks', Pervasive and Mobile Computing. Elsevier, pp. 64-81. doi: 10.1016/j.pmcj.2014.09.002.
Asghar, H. J., Steinfeld, R., Li, S., Kaafa, M. A. and Pieprzyk, J. (2015) 'On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices', IEEE Transactions on Information Forensics and Security. IEEE, pp. 1643-1655. doi: 10.1109/TIFS.2015.2421875.
Book sections
Wang, H., Ho, A. T. and Li, S. (2021) 'OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework', in Computer Security ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020, Revised Selected Papers. 3rd International Workshop on Multimedia Privacy and Security (MPS 2020), Cham, Switzerland: Springer, pp. 243-260. doi: 10.1007/978-3-030-66504-3_15.
Schmitz, R., Li, S., Grecos, C. and Zhang, X. (2018) 'Commutative Watermarking-Encryption of Multimedia Data Based on Histograms', in Bhattacharyya, S. (ed.) Intelligent Innovations in Multimedia Data Engineering and Management. USA: IGI Global, pp. 141-163. doi: 10.4018/978-1-5225-7107-0.ch006.
Aslan, Çağrı B., Sağlam, R. B. and Li, S. (2018) 'Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example', in Proceedings of the 9th International Conference on Social Media and Society. 9th International Conference on Social Media & Society (SM&Society 2017), New York, USA: ACM. doi: 10.1145/3217804.3217919.
Aljaffan, N., Yuan, H. and Li, S. (2017) 'PSV (Password Security Visualizer): From Password Checking to User Education', in Tryfonas, T. (ed.) Human Aspects of Information Security, Privacy and Trust 5th International Conference. 5th International Conference on Human Aspects of Information Security, Privacy and Trust (HAS 2017), Springer International Publishing AG, pp. 191-211. doi: 10.1007/978-3-319-58460-7_13.
Yuan, H., Li, S., Rusconi, P. and Aljaffan, N. (2017) 'When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems', in Tryfonas, T. (ed.) Human Aspects of Information Security, Privacy and Trust 5th International Conference. 5th International Conference on Human Aspects of Information Security, Privacy and Trust (HAS 2017), Cham, Switzerland: Springer, pp. 251-264. doi: 10.1007/978-3-319-58460-7_17.
Monographs
Başkent, C., Bhattacherjee, S. and Shujun, L. (2022) Applications of Game Theory and Epistemic Logic to Fact-Checking. University of Kent.
Conference or workshop items
Heering, M. S., Yuan, H. and Li, S. (2024) 'The Impact of Privacy and Security Attitudes and Concerns of Travellers on Their Willingness to Use Mobility-as-a-Service Systems', in. 26th IEEE International Conference on Intelligent Transportation Systems (ITSC 2023), IEEE, pp. 5573-5578. doi: 10.1109/ITSC57777.2023.10422468.
Parker, S., Yuan, H. and Li, S. (2024) 'PassViz: A Visualisation System for Analysing Leaked Passwords', in. VizSec 2023 (20th IEEE Symposium on Visualization for Cyber Security), IEEE, pp. 33-42. doi: 10.1109/VizSec60606.2023.00011.
Yuan, X., Guo, J., Qiu, W., Huang, Z. and Li, S. (2023) 'Support or Refute: Analyzing the Stance of Evidence to Detect Out-of-Context Mis- and Disinformation', in. 2023 Conference on Empirical Methods in Natural Language Processing (EMNLP 2023), Association for Computational Linguistics, pp. 4268-4280. doi: 2023.emnlp-main.259.
Mahaini, M. I. and Li, S. (2023) 'Cyber Security Researchers on Online Social Networks: From the Lens of the UK's ACEs-CSR on Twitter', in. 9th International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2023), Singapore: Springer, pp. 129-148. doi: 10.1007/978-981-99-5177-2_8.
Yuan, H., Boakes, M., Ma, X., Cao, D. and Li, S. (2023) 'Visualising Personal Data Flows: Insights from a Case Study of Booking.com', in. 35th International Conference on Advanced Information Systems Engineering, Cham, Germany: Springer Cham, pp. 52-60. doi: 10.1007/978-3-031-34674-3_7.
Raza, A., Tran, K. P., Koehl, L. and Li, S. (2023) 'Proof of Swarm Based Ensemble Learning for Federated Learning Applications', in. 38th ACM/SIGAPP Symposium on Applied Computing (SAC 2023), New York, USA: ACM, pp. 152- 155. doi: 10.1145/3555776.3578601.
Knott, J., Yuan, H., Boakes, M. and Li, S. (2023) 'Cyber Security and Online Safety Education for Schools in the UK: Looking through the Lens of Twitter Data', in. 38th ACM/SIGAPP Symposium on Applied Computing (SAC 2023), New York, USA: ACM, pp. 1603- 1606. doi: 10.1145/3555776.3577805.
Altuncu, E., Nurse, J. R. C., Bagriacik, M., Kaleba, S., Yuan, H., Bonheme, L. and Li, S. (2023) 'aedFaCT: Scientific Fact-Checking Made Easier via Semi-Automatic Discovery of Relevant Expert Opinions', in. MEDIATE 2023 (5th Workshop on News Media and Computational Journalism), Association for the Advancement of Artificial Intelligence, pp. 27:1-27:10. doi: 10.36190/2023.27.
Xu, Y., Guo, J., Qiu, W., Huang, Z., Altuncu, E. and Li, S. (2023) '"Comments Matter and The More The Better!": Improving Rumor Detection with User Comments', in. TrustCom 2022 (21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications), IEEE, pp. 383-390. doi: 10.1109/TrustCom56396.2022.00060.
Mohd Kassim, S. R. B., Shamsuddin, S. B., Li, S. and Arief, B. (2022) 'How National CSIRTs Operate: Personal Observations and Opinions from MyCERT', in. 5th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022), IEEE. doi: 10.1109/DSC54232.2022.9888803.
Turner, S., Nurse, J. R. C. and Li, S. (2022) '"It was hard to find the words": Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices', in. 2022 ACM CHI Conference on Human Factors in Computing Systems, ACM. doi: 10.1145/3491101.3503577.
Jones, K., Nurse, J. R. C. and Li, S. (2022) 'Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators', in. 16th International AAAI Conference on Web and Social Media (ICWSM-22), Association for the Advancement of Artificial Intelligence.
Mahaini, M. I. and Li, S. (2021) 'Detecting Cyber Security Related Twitter Accounts and Different Sub-Groups: A Multi-Classifier Approach', in. The 2nd International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI 2021), co-located with the 13th IEEE/ACM International Conference on Advances in Social Network Analysis and Mining (ASONAM 2021), ACM. doi: 10.1145/3487351.3492716.
Jones, K., Nurse, J. R. C. and Li, S. (2021) 'Out of the Shadows: Analyzing Anonymous' Twitter Resurgence during the 2020 Black Lives Matter Protests', in. 16th International AAAI Conference on Web and Social Media (ICWSM-22), USA: Association for the Advancement of Artificial Intelligence.
Turner, S., Nurse, J. R. C. and Li, S. (2021) 'When Googling it doesn't work: The challenge of finding security advice for smart home devices', in. 15th International Symposium on Human Aspects of Information Security & Assurance (HAISA), Springer. doi: 10.1007/978-3-030-81111-2_10.
Jones, K., Nurse, J. R. C. and Li, S. (2021) 'The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter', in. 4th​ International Workshop on Emoji Understanding and Applications in Social Media.
Becker, I., Posner, R., Islam, T., Ekblom, P., Borrion, H., McGuire, M. and Li, S. (2021) 'Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation', in. 54th Hawaii International Conference on System Sciences (HICSS 2021), Mānoa, Hawaiʻi, USA: University of Hawaiʻi at Mānoa, pp. 5347-5356. doi: 10125/71270.
Aydın, K., Sağlam, R. B., Li, S. and Bülbül, A. (2020) 'When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter', in. 13th International Conference on Security of Information and Networks (SINCONF 2020), ACM, pp. 16:1-16:8. doi: 10.1145/3433174.3433586.
Chousein, Z., Tetik, H. Y., Sağlam, R. B., Bülbül, A. and Li, S. (2020) 'Tension between GDPR and Public Blockchains: A Data-Driven Analysis of Online Discussions', in. 13th International Conference on Security of Information and Networks (SINCONF 2020), ACM, pp. 17:1-17:8. doi: 10.1145/3433174.3433587.
Sağlam, R. B., Aslan, Çağrı B., Li, S., Dickson, L. and Pogrebna, G. (2020) 'A Data-Driven Analysis of Blockchain Systems' Public Online Communications on GDPR', in. IEEE DAPPS 2020 (2nd IEEE International Conference on Decentralized Applications and Infrastructures), IEEE, pp. 22-31. doi: 10.1109/DAPPS49028.2020.00003.
Jones, K., Nurse, J. R. C. and Li, S. (2020) 'Behind the Mask: A Computational Study of Anonymous' Presence on Twitter', in. 14th International AAAI Conference on Web and Social Media (ICWSM).
Lu, Y. and Li, S. (2020) 'From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues', in. HICSS 2020 (53rd Hawaii International Conference on System Sciences), Haiwaii, USA: University of Hawaii at Manoa. doi: 10.24251/HICSS.2020.799.
Islam, T., Becker, I., Posner, R., Ekblom, P., McGuire, M., Borrion, H. and Li, S. (2019) 'A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems', in. DependSys 2019: 5th International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications, Singapore: Springer, pp. 277-293. doi: 10.1007/978-981-15-1304-6_22.
Lu, Y., Li, S., Ioannou, A. and Tussyadiah, I. (2019) 'From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework', in. DependSys 2019: 5th International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications, Singapore: Springer, pp. 262-276. doi: 10.1007/978-981-15-1304-6_21.
Mahaini, M. I., Li, S. and Sağlam, R. B. (2019) 'Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example', in. 14th International Conference on Availability, Reliability and Security (ARES 2019), ACM. doi: 10.1145/3339252.3339282.
Tussyadiah, I., Li, S. and Miller, G. (2018) 'Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For', in Pesonen, J. and Neidhardt, J. (eds). International Conference on Information and Communication Technologies in Tourism 2019 (ENTER 2019), Cham, Switzerland: Springer Nature Switzerland AG, pp. 278-290. doi: 10.1007/978-3-030-05940-8_22.
Li, S., Ho, A. T., Wang, Z. and Zhang, X. (2018) 'Lost in the Digital Wild: Hiding Information in Digital Activities', in Hallman, R., Li, S., and Chang, V. (eds). MPS 2018 (2nd International Workshop on Multimedia Privacy and Security), New York, USA: ACM, pp. 27-37. doi: 10.1145/3267357.3267365.
Alqahtani, S. I. and Li, S. (2017) 'PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices', in Fischer, M. (ed.). 12th International Conference on Availability, Reliability and Security (ARES 2017), New York, NY, USA: ACM, p. Article No. 19. doi: 10.1145/3098954.3098984.
Wiiliams, N. and Li, S. (2017) 'Simulating human detection of phishing websites: An investigation into the applicability of ACT-R cognitive behaviour architecture model', in. 3rd IEEE International Conference on Cybernetics (CYBCONF 2017), USA: IEEE, pp. 471-478. doi: 10.1109/CYBConf.2017.7985810.
Hosu, V., Hahn, F., Jenadeleh, M., Lin, H., Men, H., Szirányi, T., Li, S. and Saupe, D. (2017) 'The Konstanz Natural Video Database (KoNViD-1k)', in. 2017 9th International Conference on Quality of Multimedia Experience (QoMEX 2017), Germany: IEEE. doi: 10.1109/QoMEX.2017.7965673.
Research reports (external)
Waldock, K. E., Miller, V., Li, S. and Franqueira, V. N. L. (2022) Pre-University Cyber Security Education: A report on developing cyber skills amongst children and young people. Global Forum on Cyber Expertise. Available at: https://cybilportal.org/publications/pre-university-cyber-security-education-a-report-on-developing-cyber-skills-amongst-children-and-young-people/.
Preprint
Altuncu, E., Franqueira, V. N. L. and Li, S. (2022) 'Deepfake: Definitions, Performance Metrics and Standards, Datasets and Benchmarks, and a Meta-Review'. doi: 10.48550/arXiv.2208.10913.
Jones, K., Altuncu, E., Franqueira, V. N. L., Wang, Y. and Li, S. (2022) 'A Comprehensive Survey of Natural Language Generation Advances from the Perspective of Digital Deception'. doi: 10.48550/arXiv.2208.05757.
Total publications in KAR: 63 [See all in KAR]

School of Computing, University of Kent, Canterbury, Kent, CT2 7NF

Enquiries: +44 (0)1227 824180 or contact us.

Last Updated: 25/04/2024