University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Author is "Li, S"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 169.

Article

Ong, Simying, Li, Shujun, Wong, KokSheik and Tan, KuanYew (2017) Fast recovery of unknown coefficients in DCT-transformed images Signal Processing: Image Communication, 58. pp. 1-13.

Li, ShiNa, Cang, S, Thomas, R and Hyun, S (2017) Residents perceptions of Convention Centers: A distance decay analysis Event Management: an international journal.

Li, ShiNa and Mitchell, Jonathan (2016) Autonomy found: Estimating the local benefit from tourism in SIDS – the Case of Cape Verde Journal of Policy Research in Tourism, Leisure and Events, 9 (2). pp. 182-200.

Gallego, M and Li, ShiNa (2016) Special Issue on Instability and Tourism Journal of Policy Research in Tourism Leisure and Events, 9 (1). pp. 1-2.

Li, ShiNa, Li, H, Song, H, Lundberg, Christine and Shen, S (2016) The economic impact of on-screen tourism: The case of The Lord of the rings and the Hobbit Tourism Management, 60. pp. 177-187.

Li, ShiNa, Pratt, S and Song, H (2016) Special Issue: Developments in the Field of Tourism Economics - Introduction Tourism Economics: the business and finance of tourism and recreation, 22 (6). pp. 1171-1173.

Cao, Zheng, Li, ShiNa, Song, H and Shen, S (2016) The Distributional Effect of Events on Rural and Urban Households in China Journal of Travel Research, 56 (7). pp. 881-892.

Wang, H, Zhang, J-X, Ye, L-P, Li, S-L, Wang, F, Zha, W-S, Shen, T, Wu, C and Zhu, Q-X (2016) Plasma Kallikrein-Kinin system mediates immune-mediated renal injury in trichloroethylene-sensitized mice JOURNAL OF IMMUNOTOXICOLOGY, 13 (4). pp. 567-579.

Li, S-L, Huo, Y and Long, L-R (2015) Chinese Traditionality Matters: Effects of Differentiated Empowering Leadership on Followers’ Trust in Leaders and Work Outcomes Journal of Business Ethics.

Imalka Jayawardena, KDG, Li, S, Sam, LF, Smith, CTG, Beliatis, MJ, Gandhi, KK, Ranga Prabhath, MR, Pozegic, TR, Chen, S, Xu, X, Dabera, DMR, Rozanski, LJ, Sporea, RA, Mills, CA, Guo, X and Silva, SRP (2015) High efficiency air stable organic photovoltaics with an aqueous inorganic contact Nanoscale (34). pp. 14241-14247.

Wang, H, Zhang, J-X, Li, S-L, Wang, F, Zha, W-S, Shen, T, Wu, C and Zhu, Q-X (2015) An Animal Model of Trichloroethylene-Induced Skin Sensitization in BALB/c Mice INTERNATIONAL JOURNAL OF TOXICOLOGY, 34 (5). pp. 442-453.

Cagalj, M, Perkovic, T, Bugaric, M and Li, S (2015) Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks Pervasive and Mobile Computing, 20. pp. 64-81.

Asghar, HJ, Steinfeld, R, Li, S, Kaafar, MA and Pieprzyk, J (2015) On the Linearization of Human Identification Protocols: Attacks based on Linear Algebra, Coding Theory and Lattices IEEE Transactions on Information Forensics and Security, 10, 8. pp. 1643-1655.

Jones, C and Li, S (2015) The economic importance of meetings and conferences: A satellite account approach Annals of Tourism Research, 52. pp. 117-133.

Mitchell, J, Font, X and Li, SN (2015) What is the impact of hotels on local economic development? Applying value chain analysis to individual businesses Anatolia: an international journal of tourism and hospitality research, 26 (3). pp. 347-358.

Li, S (2014) Impact of Taiwan open policy on Chinese tourist satisfaction Current Issues in Tourism.

Wang, F, Zha, WS, Zhang, JX, Li, SL, Wang, H, Ye, LP, Shen, T, Wu, CH and Zhu, QX (2014) Complement C3a binding to its receptor as a negative modulator of Th2 response in liver injury in trichloroethylene-sensitized mice. Toxicol Lett, 229 (1). pp. 229-239.

Kaddour, AS, Hinton, MJ, Li, S and Smith, PA (2014) The world-wide failure exercises: How can composites design and manufacture communities build their strength 16th European Conference on Composite Materials, ECCM 2014.

Li, S, Rieck, K and Woodward, A (2014) Editorial: Special issue on threat detection, analysis and defense Journal of Information Security and Applications, 19, 3. pp. 163-164.

Wang, H, Ho, ATS and Li, S (2014) A Novel Image Restoration Scheme Based on Structured Side Information and Its Application to Image Watermarking Signal Processing: Image Communication, 29, 7. pp. 773-787.

Schmitz, R, Li, S, Grecos, C and Zhang, X (2014) Towards Robust Invariant Commutative Watermarking-Encryption based on Image Histograms International Journal of Multimedia Data Engineering and Management, 5 (4). pp. 36-52.

Li, S (2013) Large Sporting Events and Economic Growth: Evidence from Economic Consequences of Event Infrastructure and Venues Event Management, 17 (4). pp. 425-438.

Li, S and Song, H (2013) Economic impacts of visa restrictions on tourism: a case of two events in China Annals of Tourism Research, 43. pp. 251-271.

Kaddour, AS, Hinton, MJ, Smith, PA and Li, S (2013) Mechanical properties and details of composite laminates for the test cases used in the third world-wide failure exercise JOURNAL OF COMPOSITE MATERIALS, 47 (20-21). pp. 2427-2442.

Kaddour, AS, Hinton, MJ, Smith, PA and Li, S (2013) Special Issue: Benchmarking of matrix cracking, damage and failure models for composites: Comparison between theories: Part A of The Third World-Wide Failure Exercise (WWFE-III) Preface JOURNAL OF COMPOSITE MATERIALS, 47 (20-21). pp. 2415-2416.

Kaddour, AS, Hinton, MJ, Smith, PA and Li, S (2013) The background to the third world-wide failure exercise JOURNAL OF COMPOSITE MATERIALS, 47 (20-21). pp. 2417-2426.

Kaddour, AS, Hinton, MJ, Smith, PA and Li, S (2013) A comparison between the predictive capability of matrix cracking, damage and failure criteria for fibre reinforced composite laminates: Part A of the third world-wide failure exercise JOURNAL OF COMPOSITE MATERIALS, 47 (20-21). 2749-U147.

Ahmad, JJ, Li, S, Thavot, R and Mattavelli, M (2013) Secure computing with the MPEG RVC framework Signal Processing: Image Communication, 28 (10). pp. 1315-1334.

Li, S and Jago, L (2013) Evaluating economic impacts of major sports events - A meta analysis of the key trends Current Issues in Tourism, 16 (6). pp. 591-611.

Li, S and McCabe, S (2013) Measuring the socio-economic legacies of mega events: concepts, propositions and indicators International Journal of Tourism Research, 15 (4). pp. 388-402.

Thomas, RW, Mulligan, J and Li, S (2013) Futures research and the events industry Tourism Tribune, 28 (6). pp. 3-6.

Asghar, HJ, Pieprzyk, J, Li, S and Wang, H (2013) Cryptanalysis of the convex hull click human identification protocol International Journal of Information Security, 12 (2). pp. 83-96.

Cui, H, Li, S, Yuan, Q, Wadhwa, A, Eda, S, Chambers, M, Ashford, R, Jiang, H and Wu, J (2013) An AC electrokinetic impedance immunosensor for rapid detection of tuberculosis ANALYST, 138 (23). pp. 7188-7196.

Li, S, Blake, A and Thomas, R (2013) Modelling the economic impact of sports events: the case of the Beijing Olympics Economic Modelling, 30. pp. 235-244.

Li, S and Weippl, E (2013) Editorial: ARES 2012 special issue Information Security Technical Report, 17, 4. pp. 129-130.

Li, S (2012) A simple framework for evaluating the welfare impacts of a large event Tourism Analysis, 17 (4). pp. 473-493.

Li, CQ, Li, SJ and Lo, KT (2011) Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps Communications in Nonlinear Science and Numerical Simulation, 16 (2). pp. 837-843.

Arroyo, D, Alvarez, G, Amigo, JM and Li, SJ (2011) Cryptanalysis of a family of self-synchronizing chaotic stream ciphers Communications in Nonlinear Science and Numerical Simulation, 16 (2). pp. 805-813.

Schmitz, R and Li, SJ (2011) Neue Entwicklungen in der e-Banking Security (Recent Developments in e-Banking Security) PIK - Praxis der Informationsverarbeitung und Kommunikation, 34 (4). pp. 176-184.

Orue, AB, Alvarez, G, Pastor, G, Romera, M, Montoya, F and Li, SJ (2010) A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis Communications in Nonlinear Science and Numerical Simulation, 15 (11). pp. 3471-3483.

Li, S, Blake, A and Cooper, C (2010) China's tourism in a global financial crisis: a computable general equilibrium approach Current Issues in Tourism, 13 (5). pp. 435-453.

Li, CQ, Li, SJ, Lo, KT and Kyamakya, K (2010) A differential cryptanalysis of Yen-Chen-Wu multimedia cryptography system Journal of Systems and Software, 83 (8). pp. 1443-1452.

Arroyo, D, Li, SJ, Amigo, JM, Alvarez, G and Rhouma, R (2010) Comment on "Image encryption with chaotically coupled chaotic maps" Physica D-Nonlinear Phenomena, 239 (12). pp. 1002-1006.

Price, DL, Lin, S-F, Han, Z, Simpson, G, Coffin, RS, Wong, J, Li, S, Fong, Y and Wong, RJ (2010) Oncolysis Using Herpes Simplex Virus Type 1 Engineered to Express Cytosine Deaminase and a Fusogenic Glycoprotein for Head and Neck Squamous Cell Carcinoma ARCHIVES OF OTOLARYNGOLOGY-HEAD & NECK SURGERY, 136 (2). pp. 151-158.

Alvarez, G and Li, SJ (2009) Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption Communications in Nonlinear Science and Numerical Simulation, 14 (11). pp. 3743-3749.

Arroyo, D, Li, CQ, Li, SJ, Alvarez, G and Halang, WA (2009) Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm Chaos Solitons and Fractals, 41 (5). pp. 2613-2616.

Rhouma, R, Solak, E, Arroyo, D, Li, SJ, Alvarez, G and Belghith, S (2009) Comment on "Modified Baptista type chaotic cryptosystem via matrix secret key" [Phys. Lett. A 372 (2008) 5427] Physics Letters. Section A: General, Atomic and Solid State Physics, 373 (37). pp. 3398-3400.

Li, CQ, Li, SJ, Asim, M, Nunez, J, Alvarez, G and Chen, GR (2009) On the security defects of an image encryption scheme Image and Vision Computing, 27 (9). pp. 1371-1381.

Arroyo, D, Li, CQ, Li, SJ and Alvarez, G (2009) Cryptanalysis of a computer cryptography scheme based on a filter bank Chaos Solitons and Fractals, 41 (1). pp. 410-413.

Orue, A, Fernandez, V, Alvarez, G, Pastor, G, Romera, M, Montoya, F, Sanchez-Avila, C and Li, SJ (2009) Breaking a SC-CNN-based Chaotic Masking Secure Communication System International Journal of Bifurcation and Chaos, 19 (4). pp. 1329-1338.

Arroyo, D, Alvarez, G, Li, SJ, Li, CQ and Fernandez, V (2009) Cryptanalysis of a New Chaotic Cryptosystem Based on Ergodicity International Journal of Modern Physics B, 23 (5). pp. 651-659.

Li, CQ, Li, SJ, Chen, G and Halang, WA (2009) Cryptanalysis of an image encryption scheme based on a compound chaotic sequence Image and Vision Computing, 27 (8). pp. 1035-1039.

Li, S and Blake, A (2008) Estimating Olympic related investment and expenditure International Journal of Tourism Research, 11 (4). pp. 337-356.

Arroyo, D, Rhouma, R, Alvarez, G, Li, SJ and Fernandez, V (2008) On the security of a new image encryption scheme based on chaotic map lattices Chaos, 18 (3), 033112.

Orue, AB, Fernandez, V, Alvarez, G, Pastor, G, Romera, M, Li, SJ and Montoya, F (2008) Determination of the parameters for a Lorenz system and application to break the security of two-channel chaotic cryptosystems Physics Letters. Section A: General, Atomic and Solid State Physics, 372 (34). pp. 5588-5592.

Li, SJ, Li, CQ, Chen, GR and Lo, KT (2008) Cryptanalysis of the RCES/RSES image encryption scheme Journal of Systems and Software, 81 (7). pp. 1130-1143.

Li, SJ, Li, CQ, Lo, KT and Chen, GR (2008) Cryptanalyzing an encryption scheme based on blind source separation IEEE Transactions on Circuits and Systems Part 1: Regular Papers, 55 (4). pp. 1055-1063.

Li, SJ, Li, CQ, Lo, KT and Chen, GR (2008) Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion IEEE Transactions on Circuits and Systems for Video Technology, 18 (3). pp. 338-349.

Li, SJ, Li, CQ, Chen, GR, Bourbakis, NG and Lo, KT (2008) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks Signal Processing-Image Communication, 23 (3). pp. 212-223.

Arroyo, D, Alvarez, G, Li, SJ, Li, CQ and Nunez, J (2008) Cryptanalysis of a discrete-time synchronous chaotic encryption system Physics Letters. Section A: General, Atomic and Solid State Physics, 372 (7). pp. 1034-1039.

Li, CQ, Li, SJ, Alvarez, G, Chen, G and Lo, K-T (2008) Cryptanalysis of a chaotic block cipher with external key and its improved version Chaos Solitons and Fractals, 37 (1). pp. 299-307.

Li, CQ, Li, SJ, Alvarez, G, Chen, GR and Lo, KT (2007) Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations Physics Letters. Section A: General, Atomic and Solid State Physics, 369 (1-2). pp. 23-30.

Alvarez, G, Li, SJ and Hernandez, L (2007) Analysis of security problems in a medical image encryption system Computers in Biology and Medicine, 37 (3). pp. 424-427.

Li, SJ, Chen, G, Cheung, A, Bhargava, B and Lo, K-T (2007) On the design of perceptual MPEG-video encryption algorithms IEEE Transactions on Circuits and Systems for Video Technology, 17 (2). pp. 214-223.

Li, SJ and Lo, K-T (2007) Security problems with improper implementations of improved FEA-M Journal of Systems and Software, 80 (5). pp. 791-794.

Alvarez, G and Li, SJ (2006) Breaking an encryption scheme based on chaotic baker map Physics Letters, Section A: General, Atomic and Solid State Physics, 352 (1-2). pp. 78-82.

Li, CQ, Li, SJ, Lou, D-C and Zhang, D (2006) On the security of the Yen-Guo's domino signal encryption algorithm (DSEA) Journal of Systems and Software, 79 (2). pp. 253-258.

Li, S and Arber, A (2006) The construction of troubled and credible patients: A study of emotion talk in palliative care settings Qualitative Health Research, 16 (1). pp. 27-46.

Li, CQ, Li, SJ, Zhang, D and Chen, G (2006) Cryptanalysis of a data security protection scheme for VoIP IEE Proceedings-Vision, Image & Signal Processing, 153 (1). pp. 1-10.

Li, SJ, Li, CQ, Lo, K-T and Chen, G (2006) Cryptanalysis of an image encryption scheme Journal of Electronic Imaging, 15 (4).

Li, CQ, Li, SJ, Lou, D-C and Zhang, D (2006) Erratum to "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)" [The Journal of Systems and Software 79 (2006) 253-258] (DOI:10.1016/j.jss.2005.04.021) Journal of Systems and Software, 79 (12). p. 1789.

Li, SJ, Chen, G and Álvarez, G (2006) Return-map cryptanalysis revisited International Journal of Bifurcation and Chaos, 16 (5). pp. 1557-1568.

Alvarez, G and Li, SJ (2006) Some basic cryptographic requirements for chaos-based cryptosystems International Journal of Bifurcation and Chaos, 16 (8). pp. 2129-2151.

Alvarez, G, Hernández, L, Muñoz, J, Montoya, F and Li, SJ (2005) Security analysis of communication system based on the synchronization of different order chaotic systems Physics Letters. Section A: General, Atomic and Solid State Physics, 345 (4-6). pp. 245-250.

Li, CQ, Li, SJ, Chen, GR, Chen, G and Hu, L (2005) Cryptanalysis of a new signal security system for multimedia data transmission EURASIP Journal on Applied Signal Processing, 8, 962703. pp. 1277-1288.

Álvarez, G, Li, SJ, Montoya, F, Pastor, G and Romera, M (2005) Breaking projective chaos synchronization secure communication using filtering and generalized synchronization Chaos Solitons and Fractals, 24 (3). pp. 775-783.

Li, S, Álvarez, G and Chen, G (2005) Breaking a chaos-based secure communication scheme designed by an improved modulation method Chaos Solitons and Fractals, 25 (1). pp. 109-120.

Li, SJ, Álvarez, G, Chen, GR and Mou, XQ (2005) Breaking a chaos-noise-based secure communication scheme Chaos, 15 (1), 013703.

Wong, K-W, Man, K-P, Li, SJ and Liao, XF (2005) A More Secure Chaotic Cryptographic Scheme based on The Dynamic Look-up Table Circuits, Systems and Signal Processing, 24 (5). pp. 571-584.

Li, SJ, Chen, G and Mou, XQ (2005) On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps International Journal of Bifurcation and Chaos, 15 (10). pp. 3119-3151.

Li, SJ, Chen, GR, Wong, K-W, Mou, XQ and Cai, YL (2004) Baptista-type chaotic cryptosystems: Problems and countermeasures Physics Letters. Section A: General, Atomic and Solid State Physics, 332 (5-6). pp. 368-375.

Álvarez, G and Li, SJ (2004) Breaking network security based on synchronized chaos Computer Communications, 27 (16). pp. 1679-1681.

Alvarez, G and Li, SJ (2004) Estimating short-time period to break different types of chaotic modulation based secure communications arXiv.

Álvarez, G, Li, S, Lü, JH and Chen, GR (2004) Inherent Frequency and Spatial Decomposition of the Lorenz Chaotic Attractor arXiv.

Yang, M, Bourbakis, N and Li, SJ (2004) Data-image-video encryption IEEE Potentials, 23 (3). pp. 28-34.

Li, SJ, Chen, GR and Mou, XQ (2004) On the security of the Yi-Tan-Siew chaotic cipher IEEE Transactions on Circuits and Systems. Part 2: Express Briefs, 51 (12). pp. 665-669.

Li, SJ, Mou, XQ, Cai, YL, Ji, Z and Zhang, JH (2003) On the security of a chaotic encryption scheme: Problems with computerized chaos in finite computing precision Computer Physics Communications, 153 (1). pp. 52-58.

Li, SJ, Mou, XQ, Ji, Z and Zhang, JH (2003) Cryptanalysis of a Class of Chaotic Stream Ciphers (一类混沌流密码的分析) Journal of Electronics & Information Technology (电子与信息学报), 25, 4. pp. 473-478.

Li, SJ, Mou, XQ, Ji, Z, Zhang, JH and Cai, YL (2003) Erratum to: “Performance analysis of Jakimoski–Kocarev attack on a class of chaotic cryptosystems”: [Phys. Lett. A 307 (2003) 22] Physics Letters, Section A: General, Atomic and Solid State Physics, 309 (1-2). p. 165.

Li, SJ, Mou, XQ, Ji, Z, Zhang, JH and Cai, YL (2003) Performance analysis of Jakimoski-Kocarev attack on a class of chaotic cryptosystems Physics Letters. Section A: General, Atomic and Solid State Physics, 307 (1). pp. 22-28.

Li, SJ, Mou, XQ, Yang, BL, Ji, Z and Zhang, JH (2003) Problems with a probabilistic encryption scheme based on chaotic systems International Journal of Bifurcation and Chaos, 13 (10). pp. 3063-3077.

Li, SJ, Mou, XQ and Cai, YL (2001) Improving security of a chaotic encryption approach Physics Letters. Section A: General, Atomic and Solid State Physics, 290 (3-4). pp. 127-133.

Book Section

Li, S and Ho, AST (2015) Digital Forensics Laboratories in Operation: How are Multimedia Data and Devices Handled? In: Handbook of Digital Forensics of Multimedia Data and Devices. John Wiley & Sons, Inc. and IEEE Press. ISBN 978-1-118-64050-0

Li, S, Dhami, MK and Ho, AST (2015) Standards and Best Practices in Digital and Multimedia Forensics In: Handbook of Digital Forensics of Multimedia Data and Devices. John Wiley & Sons, Inc. and IEEE Press. ISBN 978-1-118-64050-0

Wang, X and Li, S (2013) The Economics, Economic Impacts and Wider Legacies of Sports Mega-Events: The 2008 Beijing Olympic Games In: Contemporary Cases in Sport Volume 1. Contemporary Cases Series, 1 (5). Goodfellow Publishers Limited, pp. 74-108. ISBN 978-1-908999-21-4

Li, S and Jago, L (2012) Evaluating economic impacts of international sports events In: International Sports Events: Impacts, Experiences and Identities. Advances in Tourism (2). Routledge, pp. 13-26. ISBN 978-0415672399

Li, SJ (2012) On the Performance of Secret Entropy Coding: A Perspective Beyond Security In: Autonomous Systems: Developments and Trends. Studies in Computational Intelligence, 391 . Springer, pp. 389-401. ISBN 978-3-642-24805-4

Alvarez, G, Amigó, JM, Arroyo, D and Li, S (2011) Lessons learnt from the cryptanalysis of chaos-based ciphers In: Chaos-Based Cryptography: Theory,Algorithms and Applications. Studies in Computational Intelligence, 354 (8). Springer, pp. 257-295. ISBN 978-3-642-20541-5

Li, S (2008) What did Sydney Olympics tell Beijing - selected interviews with personages in politics, business and academics relating to the Sydney Olympics In: The 2007 Beijing Olympic Games economic report. Beijing Publishing House.

Li, SJ, Li, Z and Halang, WA (2008) Multimedia Encryption In: Encyclopedia of Multimedia Technology and Networking. IGI Global, pp. 972-977. ISBN 1605660140

Li, S (2006) London - how to prepare the 2012 Olympic Games In: 2005 Report of the Beijing Olympic Economy. Beijing Publishing House, Beijing.

Li, SJ, Chen, G and Zheng, X (2004) Chaos-Based Encryption for Digital Images and Videos In: Multimedia Security Handbook. CRC Press, LLC, pp. 133-167. ISBN 978-0-8493-2773-5

Report

Li, S, Bowdin, G, Heslington, E, Jones, C, Jones, S, Mulligan, J, Tara-Lunga, M-O, Tauxe, C, Thomas, R, Wu, P-Y, Blake, A, Jago, L and Jones, C (2013) The Economic Impact of the UK Meeting & Event Industry [Report]

Li, S, Bowdin, G, Heslington, E, Jones, S, Mulligan, J, Tara-Lunga, M-O, Tauxe, C, Thomas, R and Wu, P-Y (2013) Profile of the Meeting Industry in the UK 2011 [Report]

Conference or Workshop Item

Li, S, Dixon, S and Plumbley, Mark (2017) Clustering expressive timing with regressed polynomial coefficients demonstrated by a model selection test In: 18th International Society for Music Information Retrieval Conference, 23 - 27 October 2017, Suzhou, China.

Yuan, Haiyue, Li, Shujun, Rusconi, Patrice and Aljffan, N (2017) When Eye-tracking Meets Cognitive Modeling: Applications to Cyber Security Systems In: Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017; part of HCI International 2017, 2017-07-09 - 2017-07-14, Vancouver, Canada.

Alqahtani, Saeed and Li, Shujun (2017) PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices In: ARES 2017, Aug 29 - Sept 1 2017, Reggio Calabria, Italy.

Wiiliams, Nick and Li, Shujun (2017) Simulating human detection of phishing websites: An investigation into the applicability of ACT-R cognitive behaviour architecture model In: 3rd IEEE International Conference on Cybernetics (CYBCONF 2017), 21 - 23 June 2017, Exeter, England.

Sandy, Christopher, Rusconi, Patrice and Li, Shujun (2017) Can Humans Detect the Authenticity of Social Media Accounts? In: 3rd IEEE International Conference on Cybernetics (CYBCONF-2017), 21-23 Jun 2017, Exeter, UK.

Hosu, V, Hahn, F, Jenadeleh, M, Lin, H, Men, H, Sziranyi, T, Li, Shujun and Saupe, D (2017) The Konstanz Natural Video Database (KoNViD-1k) In: 9th International Conference on Quality of Multimedia Experience (QoMEX 2017), 2017-05-31 - 2017-06-02, Erfurt, Germany.

Aljaffan, N, Li, Shujun and Yuan, Haiyue (2017) PSV (Password Security Visualizer): From Password Checking to User Education In: Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017; part of HCI International 2017, 2017-07-09 - 2017-07-14, Vancouver, Canada.

Li, S, Black, DAA and Plumbley, Mark (2016) The Clustering of Expressive Timing Within a Phrase in Classical Piano Performances by Gaussian Mixture Models In: 11th International Symposium on Computer Music Multidisciplinary Research (CMMR), 2015-06-16 - 2015-06-19, Plymouth, UK.

Li, S, Dixon, S, Black, DAA and Plumbley, MD (2016) A model selection test on effective factors of the choice of expressive timing clusters for a phrase In: 13th Sound and Music Computing Conference (SMC 2016), 2016-08-31 - 2016-09-03, Hamburg, Germany.

Kristan, M, Matas, J, Leonardis, A, Felsberg, M, Cehovin, L, Fernandez, GF, Vojır, T, Hager, G, Nebehay, G, Pflugfelder, R, Gupta, A, Bibi, A, Lukezic, A, Garcia-Martin, A, Petrosino, A, Saffari, A, Montero, AS, Varfolomieiev, A, Baskurt, A, Zhao, B, Ghanem, B, Martinez, B, Lee, B, Han, B, Wang, C, Garcia, C, Zhang, C, Schmid, C, Tao, D, Kim, D, Huang, D, Prokhorov, D, Du, D, Yeung, D-Y, Ribeiro, E, Khan, FS, Porikli, F, Bunyak, F, Zhu, G, Seetharaman, G, Kieritz, H, Yau, HT, Li, H, Qi, H, Bischof, H, Possegger, H, Lee, H, Nam, H, Bogun, I, Jeong, J-C, Cho, J-I, Lee, J-Y, Zhu, J, Shi, J, Li, J, Jia, J, Feng, J, Gao, J, Choi, JY, Kim, J, Lang, J, Martinez, JM, Choi, J, Xing, J, Xue, K, Palaniappan, K, Lebeda, K, Alahari, K, Gao, K, Yun, K, Wong, KH, Luo, L, Ma, L, Ke, L, Wen, L, Bertinetto, L, Pootschi, M, Maresca, M, Danelljan, M, Wen, M, Zhang, M, Arens, M, Valstar, M, Tang, M, Chang, M-C, Khan, MH, Fan, N, Wang, N, Miksik, O, Torr, P, Wang, Q, Martin-Nieto, R, Pelapur, R, Bowden, Richard, Laganière, R, Moujtahid, S, Hare, S, Hadfield, Simon, Lyu, S, Li, S, Zhu, S-C, Becker, S, Duffner, S, Hicks, SL, Golodetz, S, Choi, S, Wu, T, Mauthner, T, Pridmore, T, Hu, W, Hübner, W, Wang, X, Li, X, Shi, X, Zhao, X, Mei, X, Shizeng, Y, Hua, Y, Li, Y, Lu, Y, Li, Y, Chen, Z, Huang, Z, Chen, Z, Zhang, Z, He, Z and Hong, Z (2015) The Visual Object Tracking VOT2015 challenge results In: 2015 IEEE International Conference on Computer Vision Workshop (ICCVW), 07-13 Dec 2015, Santiago, Chile.

Hu, G, Yang, Y, Yi, D, Kittler, J, Christmas, WJ, Li, S and Hospedales, T (2015) When Face Recognition Meets with Deep Learning: an Evaluation of Convolutional Neural Networks for Face Recognition In: ICCV workshop ChaLearn Looking at People, 7-13 Dec 2015, Santiago, Chile.

Li, S, Schmitz, R, Grecos, C and Zhang, X (2015) Content-Fragile Commutative Watermarking-Encryption Based on Pixel Entropy In: 16th International Conference on Advanced Concepts for Intelligent Vision Systems (ACIVS 2015), 2015-10-26 - 2015-10-29, Catania, Italy.

Beveridge, JR, Zhang, H, Draper, BA, Flynn, PJ, Feng, Z, Huber, P, Kittler, J, Huang, Z, Li, S, Li, Y, Kan, M, Wang, R, Shan, S, Chen, X, Li, H, Hua, G, Štruc, V, Križaj, J, Ding, C, Tao, D and Phillips, PJ (2015) Report on the FG 2015 Video Person Recognition Evaluation In: Automatic Face and Gesture Recognition (FG), 2015 11th IEEE International Conference and Workshops on, 2015-05-04 - 2015-05-08, Ljubljana.

Davidson, M, Renaud, K and Li, S (2014) jCAPTCHA: Accessible Human Validation In: 14th International Conference on Computers Helping People with Special Needs (ICCHP 2014), 2014-07-09 - 2014-07-11, Paris, France.

Liu, F, Wang, H, Cheng, L-M, Ho, ATS and Li, S (2014) Enhanced Perceptual Image Authentication with Tamper Localization and Self-Restoration In: 2014 IEEE International Conference on Multimedia and Expo (ICME 2014), 2014-07-14 - 2014-07-18, Chengdu, China.

Li, S, Black, D, Chew, E and Plumbley., MD (2014) Evidence that phrase-level tempo variation may be represented using a limited dictionary

Asghar, HJ, Li, S, Steinfeld, R and Pieprzyk, J (2013) Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks In: 20th Annual Network & Distributed System Security Symposium (NDSS 2013), 2013-02-24 - 2013-02-27, San Diego, CA, USA.

Ahmad, JJ, Li, S and Mattavelli, M (2013) Performance Benchmarking of RVC Based Multimedia Specifications In: 20th IEEE International Conference on Image Processing (ICIP 2013), 2013-09-15 - 2013-09-18, Melbourne, Australia.

Kafas, K, Aljaffan, N and Li, S (2013) Poster: Visual Password Checker In: 9th Symposium On Usable Privacy and Security (SOUPS 2013), 2013-07-24 - 2013-07-26, Newcastle, UK.

Schmitz, R, Li, S, Grecos, C and Zhang, X (2013) Towards More Robust Commutative Watermarking-Encryption of Images In: 15th IEEE International Symposium on Multimedia (ISM 2013), 2013-12-09 - 2013-12-11, Anaheim, California, USA.

Ahmad, JJ, Li, SJ, Sadeghi, A-R and Schneider, T (2012) CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm In: FC 2012: Financial Cryptography and Data Security, 2012-02-27 - 2012-03-02, Bonaire, the Netherlands Antilles.

Javed, Y, Nazir, M, Khan, MM, Khayam, SA and Li, SJ (2012) Captchæcker: Reconfigurable CAPTCHAs Based on Automated Security and Usability Analysis In: 4th Symposium on Configuration Analytics and Automation (SafeConfig 2011), 2011-10-31 - 2011-11-01, Arlington, VA, USA.

Byshko, R and Li, S (2012) Characterization of iPhone Displays: A Comparative Study In: 18th German Color Group Workshop on Color Image Processing (Tagungsband vor 18. Workshop Farbbildverarbeitung 2012), 2012-09-27 - 2012-09-28, Darmstadt, Germany.

Wahab, AWA, Ho, ATS and Li, S (2012) Inter-Camera Model Image Source Identification with Conditional Probability Features In: IIEEJ 3rd Image Electronics and Visual Computing Workshop (IEVC 2012), 2012-11-21 - 2012-11-24, Kuching, Malyasia.

Cornelsen, S, Karrenbauer, A and Li, SJ (2012) Leveling the Grid In: 14th Workshop on Algorithm Engineering and Experiments (ALENEX 2012), 2012-01-16 - ?, Kyoto, Japan.

Schmitz, R, Li, S, Grecos, C and Zhang, X (2012) A New Approach to Commutative Watermarking-Encryption In: 13th IFIP TC 6/TC 11 International Conference (CMS 2012), 2012-09-03 - 2012-09-05, Canterbury, UK.

Li, SJ, Sadeghi, A-R, Heisrath, S, Schmitz, R and Ahmad, JJ (2012) hPIN/hTAN: A lightweight and low-cost e-banking solution against untrusted computers In: 15th International Conference on Financial Cryptography and Data Security (FC 2011), 2011-02-28 - 2011-03-04, Gros Islet, St. Lucia.

Zhu, KF, Li, SJ and Saupe, D (2012) An objective method of measuring texture preservation for camcorder performance evaluation In: IS&T/SPIE Electronic Imaging 2012, 2012-01-22 - 2012-01-26, Burlingame, CA, USA.

Perković, T, Mumtaz, A, Javed, Y, Li, SJ, Khayam, SA and Čagalj, M (2011) Breaking Undercover: Exploiting Design Flaws and Nonuniform Human Behavior In: 7th Symposium On Usable Privacy and Security (SOUPS 2011), 2011-07-20 - 2011-07-22, Carnegie Mellon University in Pittsburgh, PA, USA.

Ahmad, JJ, Li, SJ, Amer, I and Mattavelli, M (2011) Building multimedia security applications in the MPEG Reconfigurable Video Coding (RVC) framework In: 2011 ACM Workshop on Multimedia and Security (ACM MM&Sec 2011), 2011-09-29 - 2011-09-30, Buffalo, NY, USA.

Asghar, HJ, Li, SJ, Pieprzyk, J and Wang, HX (2011) Cryptanalysis of the convex hull click human identification protocol In: 13th International Information Security Conference (ISC 2011), 2010-10-25 - 2010-10-28, Boca Raton, FL, USA.

Kaddour, AS, Hinton, MJ, Li, S and Smith, PA (2011) Damage prediction in polymeric composites: Up-date of Part(A) of the Third World-Wide Failure Exercise (WWFE-III)

Li, SJ, Li, CQ and Kuo, C-CJ (2011) On the security of a secure Lempel-Ziv-Welch (LZW) algorithm In: 2011 IEEE International Conference on Multimedia and Expo (ICME 2011), 2011-07-11 - 2011-07-15, Barcelona, Spain.

Li, SJ, Karrenbauer, A, Saupe, D and Kuo, C-CJ (2011) Recovering Missing Coefficients in DCT-Transformed Images In: 2011 18th IEEE International Conference on Image Processing (ICIP 2011), 2011-09-11 - 2011-09-14, Brussels, Belgium.

Li, S, He, D and Sun, Z (2011) A cost-aware multi-path routing protocol for multi-interface multi-channel manets

Li, SJ, Khayam, SA, Sadeghi, AR and Schmitz, R (2010) Breaking Randomized Linear Generation Functions based Virtual Password System In: 2010 IEEE International Conference on Communications (ICC 2010), 2010-05-23 - 2010-05-27, Cape Town, South Africa.

Li, SJ, Shah, SAH, Khan, MAU, Khayam, SA, Sadeghi, A-R and Schmitz, R (2010) Breaking e-banking CAPTCHAs In: 26th Annual Computer Security Applications Conference (ACSAC 2010), 2010-12-06 - 2010-12-10, Austin, TX, USA.

Li, SJ, Ahmad, JJ, Saupe, D and Kuo, C-CJ (2010) An Improved DC Recovery Method from AC Coefficients of DCT-Transformed Images In: 17th IEEE International Conference on Image Processing (ICIP 2010), 2010-09-26 - 2010-09-29, Hong Kong, China.

Arroyo, D, Amigó, JM, Li, SJ and Alvarez, G (2010) On the inadequacy of unimodal maps for cryptographic applications In: 11th Spanish Meeting on Cryptology and Information Security (RECSI 2010), 2010-09-07 - 2010-09-10, Tarragona, Spain.

Arroyo, D, Alvarez, G and Li, SJ (2009) Some hints for the design of digital chaos-based cryptosystems: Lessons learned from cryptanalysis In: 2nd IFAC Meeting on Analysis and Control of Chaotic Systems, 2009-06-22 - 2009-06-24, Queen Mary, University of London, UK.

Li, SJ, Asghar, HJ, Pieprzyk, J, Sadeghi, AR, Schmitz, R and Wang, HX (2009) On the Security of PAS (Predicate-based Authentication Service) In: 25th Annual Computer Security Applications Conference (ACSAC 2009), 2009-12-07 - 2009-12-11, Honolulu, HI, USA.

Li, SJ, Chen, G, Cheung, A, Lo, KT and Kankanhalli, M (2009) On the Security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables In: 3rd Pacific-Rim Symposium on Image and Video Technology (PSIVT 2009), 2009-01-13 - 2009-01-16, Tokyo, JAPAN.

Li, SJ and Schmitz, R (2009) A novel anti-phishing framework based on honeypots In: 4th Annual APWG eCrime Researchers Summit (eCrime 2009 or eCRS 2009), 2009-10-20 - 2009-10-21, Tacoma, WA, USA.

Socek, D, Li, SJ, Magliveras, SS and Furht, B (2005) Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption In: 1st IEEE/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2005), 2005-09-05 - 2005-09-09, Athens, Greece.

Li, CQ, Li, SJ, Zhang, D and Chen, GR (2005) Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher In: 2nd International Symposium on Neural Networks (ISNN 2005), 2005-05-30 - 2005-06-01, Chongqing, China.

Li, CQ, Li, XX, Li, SL and Chen, GR (2005) Cryptanalysis of a multistage encryption system In: 2005 IEEE International Symposium on Circuits and Systems (ISCAS 2005), 2005-05-23 - 2005-05-26, Kobe, Japan.

Li, CQ, Li, SJ, Zhang, D and Chen, GR (2004) Cryptanalysis of a chaotic neural network based multimedia encryption scheme In: 5th Pacific Rim Conference on Multimedia (PCM 2004), 2004-11-30 - 2004-12-03, Tokyo, Japan.

Li, Shujun and Zheng, X (2002) On the security of an image encryption method In: 2002 IEEE International Conference on Image Processing (2002), 2002-09-22 - 2002-09-25, Rochester, NY, USA.

Li, SJ, Zheng, X, Mou, XQ and Cai, YL (2002) Chaotic encryption scheme for real-time digital video In: IS&T/SPIE 14th Annual Symposium on Electronic Imaging (EI 2002), 2002-01-20 - 2002-01-22, San Jose, CA, USA.

Li, SJ and Zheng, X (2002) Cryptanalysis of a chaotic image encryption method In: 2002 IEEE International Symposium on Circuits and Systems (ISCAS 2002), 2002-05-26 - 2002-05-29, Scottsdale, Arizona, US.

Li, SJ, Mou, XQ and Cai, YL (2001) Pseudo-Random Bit Generator Based on Couple Chaotic Systems and its Application in Stream-Ciphers Cryptography In: 2nd International Conference on Cryptology in India (INDOCRYPT 2001), 2001-12-16 - 2001-12-20, Chennai, India.

Li, SJ, Li, Q, Li, WM, Mou, XQ and Cai, YL (2001) Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding In: 8th IMA International Conference on Cryptography and Coding (IMA-CC 2001), 2001-12-17 - 2001-12-19, Cirencester, UK.

Book

Ho, ATS and Li, S (2015) Handbook of Digital Forensics of Multimedia Data and Devices John Wiley & Sons. ISBN 1118756983

Chen, ZJ, Zhao, SQ, Li, SJ and Wan, FY (2006) LaTeX: From a Starter to a Master (LATEX入门与提高) Higher Education Press (高等教育出版社), Beijing, China. ISBN 7-04-019379-5

Thesis

Li, SJ (2003) Analyses and New Designs of Digital Chaotic Ciphers Doctoral thesis, Xi'an Jiaotong University.

Other

Ahmad, JJ and Li, SJ (2012) Crypto Tools Library (CTL) Based on RVC-CAL .

Li, SJ, Sadeghi, AR and Schmitz, R (2010) hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers .

Li, SJ (2006) ChinaTeX Project: TeX/LaTeX Tools, Packages and Templates .

Li, SJ (2005) When Chaos Meets Computers .

Li, SJ (2005) Permutation Polynomials modulo m .

Li, SJ (2005) Null Polynomials modulo m .

Li, S (2005) Evaluating Determinants of Two Classes of Special Matrices .

Li, SJ and Shum, HY (2005) Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI . (Unpublished)

Li, SJ (2005) mpegSyntaxer - Visual Syntax Viewer of MPEG-1/2 Videos .

Li, SJ and Shum, HY (2003) Secure Human-Computer Identification against Peeping Attacks (SecHCI): A Survey .

This list was generated on Sun Sep 24 17:56:14 2017 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800