Dr Shujun Li

Deputy Director of Surrey Centre for Cyber Security (SCCS), Senior Lecturer

Qualifications: BE (1997), PhD (2003), SrMIEEE, MACM, MISOC

Email:
Phone: Work: 01483 68 6057
Room no: 07 BB 02

Further information

Biography

Dr Shujun Li joined the University of Surrey in September 2011. Since July 2014, he has been a Deputy Director of the Surrey Centre for Cyber Security (SCCS), a UK government recognised Academic Centre of Excellence in Cyber Security Research (ACE-CSR), leading the Research Theme Human-Centred Security. He is also a member of the Multimedia, Security and Forensics (MSF) Research Group of the Department of Computer Science. He is leading two research areas of the MSF research group, Multimedia Coding and Visual Quality Assessment, Usable Security, and also involved in other three research areas of the MSF group on Watermarking and Authentication, Steganography and Steganalysis, and Multimedia Forensics.

Dr Shujun Li received his BE degree in Information Science and Engineering from the Xi'an Jiaotong University in 1997, and his PhD degree in Information and Communication Engineering in 2003 from the same university. During September 2003 to January 2005, he was a postdoctoral Research Assistant with the City University of Hong Kong. From June 2005 to January 2007, he was a postdoctoral fellow under The Hong Kong Polytechnic University's Postdoctoral Fellowships Scheme. From March 2007 to June 2008, he was a Humboldt Research Fellow and doing his research at the FernUniversität in Hagen, Germany. From July 2008 to August 2011, he was a 5-Year  Research Fellow of the Zukunftskolleg, Universität Konstanz, Germany, also a junior faculty member of the Department of Computer and Information Science.

Dr Shujun Li has published more than 80 scientific papers in international journals and conference proceedings. He is currently on the editorial boards of Heliyon (2015-present), Journal of Visual Communication and Image Representation (2012-present), Journal of Information Security and Applications (formerly known as Information Security Technical Report, 2012-present) and was on the editorial board of International Journal of Bifurcation and Chaos (2012-2014). He was/is serving on the technical program committees of many international conferences like ICC, GLOBECOM, ICME, ICIP, ISCAS, DASIP, ARES, INTRUST and some others. He is a Senior Member of the IEEE and a member of several IEEE societies (Computer Society, Communications Society, Signal Processing Society, Circuits and Systems Circuits, Consumer Electronics Society). He is a member of the IEEE Circuits and Systems Society Technical Committee on Nonlinear Circuits & Systems. He is also a Professional Member of the ACM and several of its special interests groups (SIGSAC, SIGMM, SIGCHI, SIGCOMM). He was an active contributor to the ISO/IEC RVC Standard as a member of the MPEG (ISO/IEC JCT 1/SC 29/WG11) from 2009 to 2011. He is also a Global Member of the Internet Society (ISOC).

More information about Dr Shujun Li and his research can be found at his personal web site http://www.hooklee.com.

Research Interests

Word cloud of Shujun Li's research
Dr Shujun Li's research interests are mainly interplays among several different research areas: cyber security and privacy, digital forensics and cyber crime, human factors, and multimedia computing. Some research directions he is currently working on include usable security and privacy (human factors in computer security systems e.g. human modelling for cyber security, graphical passwords, CAPTCHAs, observer-resistant password systems, mobile security and privacy), multimedia security (applications of discrete optimization, multimedia encryption and cryptanalysis, digital watermarking, information hiding), security economy (e.g. e-banking security and anti-phishing solutions), visual quality assessment and performance evaluation of digital imaging and rendering devices (still cameras, camcorders, displays, scanners, printers, etc.), digital and multimedia forensics, multimedia coding (particularly MPEG Reconfigurable Video Coding and its applications in cryptography), applications of chaos and fractals in computing. He is also interested in cyber security, cyber crime and human-centred computing in general.

Research Collaborations

Supervised Research Assistants

  • Haiyue Yuan (2013-present)
  • Chuyi Qian (2014)
  • Hui Wang (2013-2015)
  • Ghulam Qadir (2013-2014)
  • Rui Hu (2013)

(Co-)Supervised PhD Students

As principal supervisor

As secondary supervisor

As un-official co-supervisors (helped to co-supervise the students for most of their work during their PhD studies)

As host of visiting PhD students

Selected Researcher Partners

Publications

Scientometrics

h-index (and g-index): Thomson Reuters' ResearcherID Google Scholar Citation Microsoft Academic Search

Erdös Number = 3: Charles K. Chui => Guanrong Chen => Shujun Li; Ron C. Mullin => Spyros S. Magliveras => Shujun Li

A Note

Preprints of almost all papers and one book chapter can be found at his personal web site: http://www.hooklee.com/default.asp?t=Publications. Some recently accepted papers and other book chapters do not have preprints available because of either 1) the final editions are still not available; 2) the copyright transfer terms forbid posting preprints on web.

Selected Publications

  • Anthony TS Ho and Shujun Li, Handbook of Digital Forensics of Multimedia Data and Devices (e-book @ Wiley, Apple iBooks, e-book @ Google Books, book @ Amazon), 680 pages (e-book 704 pages), 16 chapters, ISBN: 978-1-118-64050-0 (e-book ISBN: 978-1-118-70579-7), John Wiley & Sons, Inc. and IEEE Press, September 2015 (Companion Website)
  • Hassan Jameel Asghar, Ron Steinfeld, Shujun Li, Dali Kaafar and Josef Pieprzyk, "On the Linearization of Human Identification Protocols: Attacks based on Linear Algebra, Coding Theory and Lattices," IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp. 1643-1655, IEEE, 2015
  • Mario Čagalja, Toni Perković, Marin Bugarić and Shujun Li, "Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks," Pervasive and Mobile Computing, vol. 20, pp. 64-81, Elsevier, 2015
  • Hui Wang, Anthony TS Ho and Shujun Li, "A Novel Image Restoration Scheme Based on Structured Side Information and Its Application to Image Watermarking," Signal Processing: Image Communication, vol. 29, no. 7, pp. 773-787, 2014
  • Hassan Jameel Asghar, Shujun Li, Ron Steinfeld and Josef Pieprzyk, "Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks," in Proceedings of 20th Annual Network & Distributed System Security Symposium (NDSS 2013), February 24-27, 2013, San Diego, CA, USA, Internet Society (Acceptance rate: 47/250=18.8%)
  • Shujun Li, Ahmad-Reza Sadeghi, Sören Heisrath, Roland Schmitz and Junaid Jameel Ahmad, "hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers," in Financial Cryptography and Data Security: 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers, Lecture Notes in Computer Science, vol. 7035, pp. 235-249, Springer, 2012 (Acceptance rate of long papers: 15/74=20.3%)
  • Toni Perković, Asma Mumtaz, Yousra Javed, Shujun Li, Syed Ali Khayam and Mario Čagalj, “Breaking Undercover: Exploiting Design Flaws and Nonuniform Human Behavior,” in Proceedings of 7th Symposium On Usable Privacy and Security (SOUPS 2011, Pittsburgh, PA, USA, July 20-22, 2011), ACM, 2011 (Acceptance rate: 15/45=33.3%)
  • Shujun Li, Andreas Karrenbauer, Dietmar Saupe and C.-C. Jay Kuo, “Recovering Missing Coefficients in DCT-Transformed Images,” in Proceedings of 18th IEEE International Conference on Image Processing (ICIP 2011, Brussels, Belgium, September 11-14, 2011), pp. 1569-1572, IEEE, 2011
  • Shujun Li, Syed Amier Haider Shah, Muhammad Asad Usman Khan, Syed Ali Khayam, Ahmad-Reza Sadeghi and Roland Schmitz, “Breaking e-Banking CAPTCHAs,” in Proceedings of 26th Annual Computer Security Applications Conference (ACSAC 2010, Austin, TX, USA, December 6-10, 2010), pp. 171-180, 2010, ACM, 2010 (Acceptance rate: 39/227=17.2%)
  • Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz and Huaxiong Wang, “On the Security of PAS (Predicate-based Authentication Service),” in Proceedings of 25th Annual Computer Security Applications Conference (ACSAC 2009), pp. 209-218, IEEE Computer Society, 2009 [Full paper: http://eprint.iacr.org/2009/476] (Acceptance rate: 44/224=19.6%)
  • Shujun Li and Roland Schmitz, “A Novel Anti-Phishing Framework Based on Honeypots,” in Proceedings of 4th Annual APWG eCrime Researchers Summit (eCRS 2009, Tacoma, WA, USA, October 20 & 21, 2009), 13 pages, IEEE, 2009 (Acceptance rate: 35%)
  • Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez and Guanrong Chen, “On the security defects of an image encryption scheme,” Image and Vision Computing, vol. 27, no. 9, pp. 1371-1381, Elsevier, 2009
  • Shujun Li, Chengqing Li, Kwok-Tung Lo and Guanrong Chen, “Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 18, no. 3, pp. 338-349, IEEE, 2008
  • Shujun Li, Chengqing Li, Kwok-Tung Lo and Guanrong Chen, “Cryptanalyzing an Encryption Scheme Based on Blind Source Separation,” IEEE Transactions on Circuits and Systems—I: Regular Papers, vol. 55, no. 4, pp. 1055-1063, IEEE, 2008
    Shujun Li, Chengqing Li, Guanrong Chen, Nikolaos G. Bourbakis and Kwok-Tung Lo, “A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks,” Signal Processing: Image Communication, vol. 23, no. 3, pp. 212-223, Elsevier, 2008
  • Shujun Li, Guanrong Chen, Albert Cheung, Bharat Bhargava and Kwok-Tung Lo, “On the Design of Perceptual MPEG-Video Encryption Algorithms,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 17, no. 2, pp. 214-223, IEEE, 2007
  • Gonzalo Álvarez and Shujun Li, “Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems,” International Journal of Bifurcation and Chaos, vol. 16, no. 8, pp. 2129-2151, World Scientific, 2006
  • Shujun Li, Guanrong Chen and Xuanqin Mou, “On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps,” International Journal of Bifurcation and Chaos, vol. 15, no. 10, pp. 3119-3151, World Scientific, 2005
  • Shujun Li, Guanrong Chen and Xuanqin Mou, “On the Security of the Yi-Tan-Siew Chaotic Cipher,” IEEE Transactions on Circuits and Systems—II: Express Briefs, vol. 51, no. 12, pp. 665-669, IEEE, 2004

Books

Book Chapters

  • Shjun Li and Anthony T.S. Ho, “Digital Forensics Laboratories in Operation: How are Multimedia Data and Devices Handled?” Chapter 1 of Handbook of Digital Forensics of Multimedia Data and Devices, edited by Anthony T.S. Ho and Shujun Li, John Wiley & Sons, Inc. and IEEE Press, September 2015
  • Shjun Li, Mandeep K. Dhami and Anthony T.S. Ho, “Standards and Best Practices in Digital and Multimedia Forensics,” Chapter 2 of Handbook of Digital Forensics of Multimedia Data and Devices, edited by Anthony T.S. Ho and Shujun Li, John Wiley & Sons, Inc. and IEEE Press, September 2015
  • Shujun Li, “Perceptual Encryption of Digital Images and Videos,” in Perceptual Digital Imaging: Methods and Applications, edited by Rastislav Lukac, Chapter 14, pp. 431-468, ISBN: 978-1-43-986856-0 (e-Book ISBN-13: 978-1-43-986893-5), CRC Press, October 2012
  • Gonzalo Alvarez, José María Amigó, David Arroyo and Shujun Li, “Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers,” in Chaos-Based Cryptography: Theory, Algorithms and Applications, edited by Ljupco Kocarev and Shiguo Lian, Studies in Computational Intelligence, vol. 354, pp. 257-295, ISBN: 978-3-642-20541-5, Springer, June 2011
  • Shujun Li, Zhong Li and Wolfgang A. Halang, “Multimedia Encryption,” in Encyclopedia of Multimedia Technology and Networking, 2nd edition, edited by Margherita Pagani, Volume II, pp. 972-977, ISBN: 9781605660141, Idea Group, August 2008
  • Shujun Li, Guanrong Chen and Xuan Zheng, “Chaos-Based Encryption for Digital Images and Videos,” Chapter 4 of Multimedia Security Handbook, pp. 133-167, edited by Borko Burht and Darko Kirovski, ISBN: 9780849327735, CRC Press (part of Taylor & Francis), 2004
    This book was republished in March 2006 by Auerbach Publications (also part of Taylor & Francis) with a different title Multimedia Encryption and Authentication Techniques and Applications (ISBN: 9780849372124).

Peer-Reviewed Journal Papers

2015

  • Hassan Jameel Asghar, Ron Steinfeld, Shujun Li, Dali Kaafar and Josef Pieprzyk, "On the Linearization of Human Identification Protocols: Attacks based on Linear Algebra, Coding Theory and Lattices," IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp. 1643-1655, IEEE, 2015
  • Mario Čagalja, Toni Perković, Marin Bugarić and Shujun Li, "Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks," Pervasive and Mobile Computing, vol. 20, pp. 64-81, Elsevier, 2015

2014

  • Roland Schmitz, Shujun Li, Christos Grecos and Xinpeng Zhang, "Towards Robust Invariant Commutative Watermarking-Encryption based on Image Histograms," International Journal of Multimedia Data Engineering and Management (IJMDEM), vol. 5, no. 4, pp. 36-52, IGI Global, 2014
  • Hui Wang, Anthony TS Ho and Shujun Li, "A Novel Image Restoration Scheme Based on Structured Side Information and Its Application to Image Watermarking," Signal Processing: Image Communication, vol. 29, no. 7, pp. 773-787, 2014

2013

  • Junaid Jameel Ahmad, Shujun Li, Richard Thavot and Marco Mattavelli, "Secure Computing with the MPEG RVC Framework," Signal Processing: Image Communication, vol. 28, no. 10 (special issue on Recent Advances on MPEG Codec Configuration Framework), pp. 1315-1334, Elsevier, 2013
  • Hassan Jammel Asghar, Shujun Li, Josef Pieprzyk and Huaxiong Wang, "Cryptanalysis of the Convex Hull Click Human Identification Protocol," International Journal of Information Security, vol. 12, no. 2, pp. 83-96, Springer, 2013

2011

  • Roland Schmitz and Shujun Li, "Neue Entwicklungen in der e-Banking Security," ("Recent Developments in e-Banking Security,") PIK - Praxis der Informationsverarbeitung und Kommunikation, vol. 34, no. 4, pp. 176-184, Walter de Gruyter GmbH & Co. KG, 2011 (in German)
  • Chengqing Li, Shujun Li and Kwok-Tung Lo, “Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps,” Communications in Nonlinear Science and Numerical Simulations, vol. 16, no. 2, pp. 837-843, Elsevier, 2011
  • David Arroyo and Gonzalo Alvarez and José María Amigó and Shujun Li, “Cryptanalysis of a family of self-synchronizing chaotic stream ciphers,” Communications in Nonlinear Science and Numerical Simulations, , vol. 16, no. 2, pp. 805-813, Elsevier, 2011

2010

  • Chengqing Li, Shujun Li, Kwok-Tung Lo and Kyandoghere Kyamakya, “A differential cryptanalysis of Yen-Chen-Wu multimedia cryptography system,” Journal of Systems and Software, vol. 83, no. 8, pp. 1443-1452, Elsevier, 2010
  • A.B. Orue, G. Alvarez, G. Pastor, M. Romera, F. Montoya and Shujun Li, “A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis,” Communications in Nonlinear Science and Numerical Simulations, vol. 15, no. 11, pp. 3471-3483, Elsevier, 2010
  • David Arroyo, Shujun Li, Gonzalo Alvarez, José María Amigó and Rhouma Rhouma, “Comments on ‘Image encryption with chaotically coupled chaotic maps’,” Physica D, vol. 239, no. 12, pp. 1002-1006, Elsevier, 2010

2009

  • Rhouma Rhouma, Ercan Solak, David Arroyo, Shujun Li, Gonzalo Alvarez and Safya Belghitha, “Comment on “Modified Baptista type chaotic cryptosystem via matrix secret key” [Phys. Lett. A 372 (2008) 5427],” Physics Letters A, vol. 373, no. 37, pp. 3398-3400, Elsevier , 2009
  • A.B. Orue, V. Fernandez, G. Alvarez, G. Pastor, M. Romera, F. Montoya, C. Sanchez-Avila and Shujun Li, “Breaking a SC-CNN-based Chaotic Masking Secure Communication System,” International Journal of Bifurcation and Chaos, vol. 19, no. 4, pp. 1329-1338, World Scientific, 2009
  • David Arroyo, Gonzalo Alvarez, Shujun Li, Chengqing Li and Veronica Fernandez, “Cryptanalysis of a New Chaotic Cryptosystem Based on Ergodicity,” International Journal of Modern Physics B, vol. 23, no. 5, pp. 651-659, World Scientific, 2009
  • David Arroyo, Chengqing Li, Shujun Li, Gonzalo Alvarez and Wolfgang A. Halang, “Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm,” Chaos, Solitons & Fractals, vol. 14, no. 11, pp. 2613-2616, Elsevier, 2009
  • G. Alvarez and Shujun Li, “Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption,” Communications in Nonlinear Science and Numerical Simulations, vol. 14, no. 11, pp. 3743-3749, Elsevier, 2009
  • Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez and Guanrong Chen, “On the security defects of an image encryption scheme,” Image and Vision Computing, vol. 27, no. 9, pp. 1371-1381, Elsevier, 2009
  • Chengqing Li, Shujun Li, Guanrong Chen and Wolfgang A. Halang, “Cryptanalysis of an image encryption scheme based on a compound chaotic sequence,” Image and Vision Computing, vol. 27, no. 8, pp. 1035-1039, Elsevier, 2009
  • David Arroyo, Chengqing Li, Shujun Li, Gonzalo Alvarez, “Cryptanalysis of a computer cryptography scheme based on a filter bank,” Chaos, Solitons & Fractals, vol. 41, no. 1, pp. 410-413, Elsevier, 2009

2008

  • David Arroyo, Rhouma Rhouma, Gonzalo Alvarez, Shujun Li and Veronica Fernandez, “On the security of a new image encryption scheme based on chaotic map lattices,” Chaos: An Interdisciplinary Journal of Nonlinear Science, vol. 18, no. 3, art. no. 033112, American Institute of Physics, 2008
  • A.B. Orue, V. Fernandez, G. Alvarez, G. Pastor, M. Romera, Shujun Li and F. Montoya, “Determination of the parameters for a Lorenz system and application to break the security of two-channel chaotic cryptosystems,” Physics Letters A, vol. 372, no. 34, pp. 5588-5592, Elsevier, 2008
  • Shujun Li, Chengqing Li, Guanrong Chen and Kwok-Tung Lo, “Cryptanalysis of RCES/RSES Image Encryption Scheme,” Journal of Systems and Software, vol. 81, no. 7, pp. 1130-1143, Elsevier, 2008
  • Shujun Li, Chengqing Li, Kwok-Tung Lo and Guanrong Chen, “Cryptanalyzing an Encryption Scheme Based on Blind Source Separation,” IEEE Transactions on Circuits and Systems—I: Regular Papers, vol. 55, no. 4, pp. 1055-1063, IEEE, 2008
  • Shujun Li, Chengqing Li, Guanrong Chen, Nikolaos G. Bourbakis and Kwok-Tung Lo, “A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks,” Signal Processing: Image Communication, vol. 23, no. 3, pp. 212-223, Elsevier, 2008
  • Shujun Li, Chengqing Li, Kwok-Tung Lo and Guanrong Chen, “Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 18, no. 3, pp. 338-349, IEEE, 2008
  • Chengqing Li, Shujun Li, Gonzalo Álvarez, Guanrong Chen and Kwok-Tung Lo, “Cryptanalysis of a chaotic block cipher with external key and its improved version,” Chaos, Solitons & Fractals, vol. 37, no. 1, pp. 299-307, Elsevier, 2008
  • David Arroyo, Gonzalo Alvarez, Shujun Li, Chengqing Li and Juana Nunez, “Cryptanalysis of a discrete-time synchronous chaotic encryption system,” Physics Letters A, vol. 372, no. 7, pp. 1034-1039, Elsevier, 2008

2007

  • Chengqing Li, Shujun Li, Gonzalo Álvarez, Guanrong Chen and Kwok-Tung Lo, “Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations,” Physics Letters A, vol. 369, no. 1-2, pp. 23-30, Elsevier, 2007
  • Shujun Li, Guanrong Chen, Albert Cheung, Bharat Bhargava and Kwok-Tung Lo, “On the Design of Perceptual MPEG-Video Encryption Algorithms,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 17, no. 2, pp. 214-223, IEEE, 2007
  • Gonzalo Álvarez, Shujun Li and Luis Hernandez, “Analysis of security problems in a medical image encryption system,” Computers in Biology and Medicine, vol. 37, no. 3, pp. 424-427, Elsevier, 2007
  • Shujun Li and Kwok-Tung Lo, “Security Problems with Improper Implementations of Improved FEA-M,” Journal of Systems and Software, vol. 80, no. 5, pp. 791-794, Elsevier, 2007

2006

  • Shujun Li, Chengqing Li, Kwok-Tung Lo and Guanrong Chen, “Cryptanalysis of an Image Encryption Scheme,” Journal of Electronic Imaging, vol. 15, no. 4, article number 043012, SPIE / IS&T, 2006
  • Gonzalo Álvarez and Shujun Li, “Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems,” International Journal of Bifurcation and Chaos, vol. 16, no. 8, pp. 2129-2151, World Scientific, 2006
  • Shujun Li, Guanrong Chen and Gonzalo Álvarez, “Return-Map Cryptanalysis Revisited,” International Journal of Bifurcation and Chaos, vol. 16, no. 5, pp. 1157-1168, World Scientific, 2006
  • Gonzalo Álvarez and Shujun Li, “Breaking an encryption scheme based on chaotic Baker map,” Physics Letters A, vol. 352, no. 1-2, pp. 78-82, Elsevier, 2006
  • Chengqing Li, Shujun Li, Der-Chyuan Lou and Dan Zhang, “On the security of the Yen-Guo’s domino signal encryption algorithm (DSEA),” Journal of Systems and Software, vol. 79, no. 2, pp. 253-258, Elsevier, 2006
  • Chengqing Li, Shujun Li, Dan Zhang and Guanrong Chen, “Cryptanalysis of a data security protection scheme for VoIP,” IEE Proceedings-Vision, Image & Signal Processing, vol. 153, no. 1, pp. 1-10, IEE, 2006

2005

  • Shujun Li, Guanrong Chen and Xuanqin Mou, “On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps,” International Journal of Bifurcation and Chaos, vol. 15, no. 10, pp. 3119-3151, World Scientific, 2005
  • Kwok-wo Wong, Kwan-Pok Man, Shujun Li and Xiaofeng Liao, “A More Secure Chaotic Cryptographic Scheme based on Dynamic Look-up Table,” Circuits, Systems & Signal Processing, vol. 24, no. 5, pp. 571-584, Birkhaüser (part of Springer), 2005
  • Gonzalo Álvarez, Luis Hernádez, Jaime Muñóz, Fausto Montoya and Shujun Li, “Security analysis of communication system based on the synchronization of different order chaotic systems,” Physics Letters A, vol. 345, no. 4-6, pp 245-250, Elsevier, 2005
  • Chengqing Li, Shujun Li, Guanrong Chen, Gang Chen and Lei Hu, “Cryptanalysis of a New Signal Security System for Multimedia Data Transmission,” EURASIP Journal on Applied Signal Processing, vol. 2005, no. 8, pp. 1277-1288, Hindawi, 2005
  • Shujun Li, Gonzalo Álvarez, Guanrong Chen and Xuanqin Mou, “Breaking a chaos-noise-based secure communication scheme,” Chaos: An Interdisciplinary Journal of Nonlinear Science, vol. 15, no. 1, article 013703 (10 pages), American Institute of Physics, 2005
  • Shujun Li, Gonzalo Álvarez and Guanrong Chen, “Breaking a chaos-based secure communication scheme designed by an improved modulation method,” Chaos, Solitons & Fractals, vol. 25, no. 1, pp. 109-120, Elsevier, 2005
  • Gonzalo Álvarez and Shujun Li, F. Montoya, G. Pastor and M. Romera, “Breaking projective chaos synchronization secure communication using filtering and generalized synchronization,” Chaos, Solitons & Fractals, vol. 24, no. 3, pp. 775-783, Elsevier, 2005

2004

  • Shujun Li, Guanrong Chen and Xuanqin Mou, “On the Security of the Yi-Tan-Siew Chaotic Cipher,” IEEE Transactions on Circuits and Systems—II: Express Briefs, vol. 51, no. 12, pp. 665-669, IEEE, 2004
    Shujun Li, Guanrong Chen, Kwok-Wo Wong, Xuanqin Mou and Yuanlong Cai, “Baptista-type chaotic cryptosystems: Problems and countermeasures,” Physics Letters A, vol. 332, no. 5-6, pp. 368-375, Elsevier, 2004
  • Gonzalo Álvarez and Shujun Li, “Breaking network security based on synchronized chaos,” Computer Communications, vol. 27, no.16, pp. 1679-1681, Elsevier, 2004

2003

  • Shujun Li, Xuanqin Mou, Boliya L. Yang, Zhen Ji and Jihong Zhang, “Problems with a Probabilistic Encryption Scheme based on Chaotic Systems,” International Journal of Bifurcation and Chaos, vol. 13, no. 10, pp. 3063-3077, World Scientific, 2003
  • Shujun Li, Xuanqin Mou, Yuanlong Cai, Zhen Ji and Jihong Zhang, “On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision,” Computer Physics Communications, vol. 153, no. 1, pp. 52-58, Elsevier, 2003
  • Shujun Li, Xuanqin Mou, Zhen Ji, Jihong Zhang and Yuanlong Cai, “Performance analysis of Jakimoski-Kocarev attack on a class of chaotic cryptosystems,” Physics Letters A, vol. 307, no. 1, pp. 22-28, Elsevier, 2003 (an erratum has been published in Physics Letters A, vol. 309, no. 1-2, pp. 165, Elsevier, 2003)
  • Shujun Li, Xuanqin Mou, Zhen Ji and Jihong Zhang, “Cryptanalysis of a Class of Chaotic Stream Ciphers,” Journal of Electronics & Information Technology, vol. 25, no. 4, pp. 473-478, Science Press / Institute of Electronics, Chinese Academy of Sciences, 2003 (in Chinese)

2001

  • Shujun Li, Xuanqin Mou and Yuanlong Cai, “Improving security of a chaotic encryption approach,” Physics Letters A, vol. 290, no. 3-4, pp. 127-133, Elsevier, 2001

Peer-Reviewed Conference Papers

2016

  • Dietmar Saupe, Franz Hahn, Vlad Hosu, Igor Zingman, Masud Rana and Shujun Li, "Crowd workers proven useful: A comparative study of subjective video quality assessment," 8th International Conference on Quality of Multimedia Experience (QoMEX 2016, 6-8 June 2016, Lisbon, Portugal), short paper

2015

  • Roland Schmitz, Shujun Li, Christos Grecos and Xinpeng Zhang, "Content-Fragile Commutative Watermarking-Encryption Based on Pixel Entropy," in Advanced Concepts for Intelligent Vision Systems: 16th International Conference, ACIVS 2015, Catania, Italy, October 26–29, 2015, Proceedings, Lecture Notes in Computer Science, vol. 9386, pp. 474-485, Springer, 2015

2014

  • Fang Liu, Hui Wang, Lee-Ming Cheng, Anthony T.S. Ho and Shujun Li, "Enhanced Perceptual Image Authentication with Tamper Localization and Self-Restoration," in Proceedings of 2014 IEEE International Conference on Multimedia and Expo 2014 (ICME 2014, Chengdu, China, July 14-18, 2014), IEEE, 2014
  • Matthew Davidson, Karen Renaud and Shujun Li, "jCAPTCHA: Accessible Human Validation," in Computers Helping People with Special Needs: 14th International Conference, ICCHP 2014, Paris, France, July 9-11, 2014, Proceedings, Part I, Lecture Notes in Computer Science, vol. 8547, pp. 129-136, Springer, 2014

2013

  • Roland Schmitz, Shujun Li, Christos Grecos and Xinpeng Zhang, "Towards More Robust Commutative Watermarking-Encryption of Images," in Proceedings of 15th IEEE International Symposium on Multimedia (ISM 2013, Anaheim, California, USA, December 9-11, 2013), pp. 283-286, IEEE, 2013
  • Junaid Jameel Ahmad, Shujun Li and Marco Mattavelli, "Performance Benchmarking of RVC Based Multimedia Specifications," in Proceedings of the 20th IEEE International Conference on Image Processing (ICIP 2013, Melbourne, Australia, September 15-18, 2013), pp. 4569-4572, IEEE, 2013
  • Hassan Jameel Asghar, Shujun Li, Ron Steinfeld and Josef Pieprzyk, "Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks," in Proceedings of 20th Annual Network & Distributed System Security Symposium (NDSS 2013), February 24-27, 2013, San Diego, CA, USA, Internet Society (Acceptance rate: 47/250=18.8%)
  • Kyriakos Kafas, Nouf Aljaffan and Shujun Li, "Poster: Visual Password Checker," presented at the 9th Symposium On Usable Privacy and Security (SOUPS 2013), July 24-26, 2013, Newcastle, UK

2012

  • Ainuddin Wahid Abdul Wahab, Anthony TS Ho and Shujun Li, "Inter-Camera Model Image Source Identification with Conditional Probability Features," in Proceedings of IIEEJ 3rd Image Electronics and Visual Computing Workshop (IEVC 2012, Kuching, Malyasia, November 21-24, 2012), IIEEJ (The Institute of Image Electronics Engineering of Japan, 日本画像電子学会), 2012 (Best Paper Award: 3/95≈3.2%)
  • Roman Byshko and Shujun Li, "Characterization of iPhone Displays: A Comparative Study," in Proceedings of the 18th German Color Group Workshop on Color Image Processing (Tagungsband vor 18. Workshop Farbbildverarbeitung 2012, September 27-28, 2012 in Darmstadt, Germany), pp. 49-60, Technische Universität Darmstadt, 2012, ISBN: 978-3-00-039639-7
  • Roland Schmitz, Shujun Li, Christos Grecos and Xinpeng Zhang, "A New Approach to Commutative Watermarking-Encryption," in Communications and Multimedia Security: 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings, Lecture Notes in Computer Science, vol. 7394, pp. 117-130, Springer, 2012
  • Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi and Thomas Schneider, "CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm," in Financial Cryptography and Data Security: 16th International Conference, FC 2012, Kralendijk, Bonaire, February 27-March 2, 2012, Revised Selected Papers, Lecture Notes in Computer Science, vol. 7397, pp. 299-313, Springer, 2012 (Acceptance rate of long papers: 23/88=26.1%)
  • Kongfeng Zhu, Shujun Li and Dietmar Saupe, "An objective method of measuring texture preservation for camcorder performance evaluation," in Image Quality and System Performance IX (part of IS&T/SPIE Electronic Imaging 2012, Burlingame, CA, USA, January 22-26, 2012), Proceedings of SPIE, vol. 8293, Article Number 829304, SPIE, 2012
  • Sabine Cornelsen, Andreas Karrenbauer and Shujun Li, "Leveling the Grid," in Proceedings of the Meeting on Algorithm Engineering & Experiments, Kyoto, Japan, January 16, 2012 (ALENEX 2012), pp. 45-54, SIAM, 2012 (Acceptance rate: 15/48=31%)
  • Shujun Li, Ahmad-Reza Sadeghi, Sören Heisrath, Roland Schmitz and Junaid Jameel Ahmad, "hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers," in Financial Cryptography and Data Security: 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers, Lecture Notes in Computer Science, vol. 7035, pp. 235-249, Springer, 2012 (Acceptance rate of long papers: 15/74=20.3%)

2011

  • Yousra Javed, Maliha Nazir, Muhammad Murtaza Khan, Syed Ali Khayam and Shujun Li, "Captchæcker: Reconfigurable CAPTCHAs Based on Automated Security and Usability Analysis," in Proceedings of 2011 4th Symposium on Configuration Analytics and Automation (SafeConfig 2011, October 31 - November 1, 2011, Arlington, VA, USA), IEEE, 2011 (Acceptance rate: 10/29=34.5%)
  • Junaid Jameel Ahmad, Shujun Li, Ihab Amer and Marco Mattavelli, "Building Multimedia Security Applications in the MPEG Reconfigurable Video Coding (RVC) Framework," in Proceedings of 13th ACM Workshop on Multimedia and Security (ACM MM&Sec 2011, Buffalo, NY, USA, September 29-30, 2011), 2011
  • Toni Perković, Asma Mumtaz, Yousra Javed, Shujun Li, Syed Ali Khayam and Mario Čagalj, "Breaking Undercover: Exploiting Design Flaws and Nonuniform Human Behavior," in Proceedings of 7th Symposium On Usable Privacy and Security (SOUPS 2011, Carnegie Mellon University in Pittsburgh, PA, USA, July 20-22, 2011), ACM, 2011, DOI: 10.1145/2078827.2078834 (Acceptance rate: 15/45=33.3%)
  • Shujun Li, Chengqing Li and C.-C. Jay Kuo, "On the Security of a Secure Lempel-Ziv-Welch (LZW) Algorithm," in Proceedings of 2011 IEEE International Conference on Multimedia and Expo (ICME 2011, Barcelona, Spain, July 11-15, 2011), 2011
  • Hassan Jammel Asghar, Shujun Li, Josef Pieprzyk and Huaxiong Wang, "Cryptanalysis of the Convex Hull Click Human Identification Protocol," in Information Security: 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, Lecture Notes in Computer Science, vol. 6531, pp. 24-30, Springer, 2011 (Acceptance rate: 37/134=27.6%)

2010

  • Shujun Li, Syed Amier Haider Shah, Muhammad Asad Usman Khan, Syed Ali Khayam, Ahmad-Reza Sadeghi and Roland Schmitz, “Breaking e-Banking CAPTCHAs,” in Proceedings of 26th Annual Computer Security Applications Conference (ACSAC 2010, Austin, TX, USA, December 6-10, 2010), pp. 171-180, ACM, 2010 (Acceptance rate: 39/227=17.2%)
  • Shujun Li, Junaid Jameel Ahmad, Dietmar Saupe and C.-C. Jay Kuo, “An Improved DC Recovery Method from AC Coefficients of DCT-Transformed Images,” in Proceedings of 17th IEEE International Conference on Image Processing (ICIP 2010, Hong Kong, China, September 26-29, 2010), pp. 2085-2088, IEEE, 2010
  • David Arroyo, Alvarez, José María Amigó, Shujun Li and Gonzalo Alvarez, “On the inadequacy of unimodal maps for cryptographic applications,” in Proceedings of 11th Spanish Meeting on Cryptology and Information Security (RECSI 2010), pp. 37-42, Universitat Rovira i Virgili, 2010
  • Shujun Li, Syed Ali Khayam, Ahmad-Reza Sadeghi and Roland Schmitz, “Breaking Randomized Linear Generation Functions based Virtual Password System,” in Proceedings of 35th IEEE International Conference on Communications (ICC 2010, Communication and Information Systems Security Symposium, Cape Town, South Africa, May 23-27, 2010), IEEE, 2010

2009

  • Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz and Huaxiong Wang, “On the Security of PAS (Predicate-based Authentication Service),” in Proceedings of 25th Annual Computer Security Applications Conference (ACSAC 2009, Honolulu, Hawaii, USA, December 7-11, 2009), pp. 209-218, IEEE, 2009 [Full paper: http://eprint.iacr.org/2009/476] (Acceptance rate: 44/224=19.6%)
  • Shujun Li and Roland Schmitz, “A Novel Anti-Phishing Framework Based on Honeypots,” in Proceedings of 4th Annual APWG eCrime Researchers Summit (eCRS 2009, Tacoma, WA, USA, October 20 & 21, 2009), 13 pages, IEEE, 2009 (Acceptance rate: 35%)
  • David Arroyo, Gonzalo Alvarez and Shujun Li, “Some Hints for the Design of Digital Chaos-Based Cryptosystems: Lessons Learned from Cryptanalysis,” presented at the 2nd IFAC Meeting on Analysis and Control of Chaotic Systems (CHAOS 2009, Queen Mary, University of London, June 22-24, 2009), paper ID TD1_2
  • Shujun Li, Guanrong Chen, Albert Cheung, Kwok-Tung Lo and Mohan Kankanhalli, “On the Security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables,” in Advances in Image and Video Technology - Third Pacific Rim Symposium, PSIVT 2009, Tokyo, Japan, January 13-16, 2009. Proceedings, Lecture Notes in Computer Science, vol. 5414, pp. 898-909, Springer, 2009

2007

  • Shujun Li, Gonzalo Álvarez, Zhong Li and Wolfgang A. Halang, “Analog Chaos-based Secure Communications and Cryptanalysis: A Brief Survey,” in The 3rd International IEEE Scientific Conference on Physics and Control (PhysCon 2007), September 3rd-7th 2007 at the University of Potsdam (Abstract Collection), page 92, 2007 [Full paper: http://lib.physcon.ru/?item=1368]

2005

  • Daniel Socek, Shujun Li, Spyros S. Magliveras and Borko Furht, “Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption,” in Proceedings of the First IEEE/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2005, Athens, Greece, September 5-9, 2005), pp. 406-408 (short paper), IEEE Computer Society, 2005
  • Chengqing Li, Shujun Li, Dan Zhang and Guanrong Chen, “Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher,” in Advances in Neural Networks – ISNN 2005: Second International Symposium on Neural Networks, Chongqing, China, May 30 - June 1, 2005, Proceedings, Part II, Lecture Notes in Computer Science, vol. 3497, pp. 630-636, Springer, 2005
  • Chengqing Li, Xinxiao Li, Shujun Li and Guanrong Chen, “Cryptanalysis of a Multistage Encryption System,” in Proceedings of the 2005 IEEE International Symposium on Circuits and Systems (ISCAS 2005, Kobe Japan, May 23-26, 2005), pp. 880-883, IEEE, 2005

2004

  • Chengqing Li, Shujun Li, Dan Zhang and Guanrong Chen, “Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme,” in Advances in Multimedia Information Processing - PCM 2004: 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30 - December 3, 2004. Proceedings, Part III, Lecture Notes in Computer Science, vol. 3333, pp. 418-425, Springer, 2004

2002

  • Shujun Li and Xuan Zheng, “On the security of an image encryption method,” in Proceedings of the 2002 IEEE International Conference on Image Processing (ICIP 2002, Rochester, New York, USA, September 22-25, 2002), vol. 2 of 3, pp. 925-928, IEEE, 2002
  • Shujun Li and Xuan Zheng, “Cryptanalysis of a chaotic image encryption method,” in Proceedings of the 2002 IEEE International Symposium on Circuits and Systems (ISCAS 2002, Scottsdale, AZ, USA, May 26-29, 2002), vol. 2 of 5, pp. 708-711, IEEE, 2002
  • Shujun Li, Xuan Zheng, Xuanqin Mou and Yuanlong Cai, “Chaotic encryption scheme for real-time digital video,” in Real-Time Imaging VI (IS&T/SPIE Electronic Imaging 2002), Proceedings of SPIE, vol. 4666, pp. 149-160, SPIE/IS&T, 2002

2001

  • Shujun Li, Xuanqin Mou and Yuanlong Cai, “Pseudo-Random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography,” in Progress in Cryptology - INDOCRYPT 2001: Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001. Proceedings, Lecture Notes in Computer Science, vol. 2247, pp. 316-329, Springer, 2001
  • Shujun Li, Qi Li, Wenmin Li, Xuanqin Mou and Yuanlong Cai, “Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding,” in Cryptography and Coding: 8th IMA International Conference, Cirencester, UK, December 17-19, 2001. Proceedings, Lecture Notes in Computer Science, vol. 2260, pp. 205-221, Springer, 2001

2000

  • Shujun Li, Peng Wang, Xuanqin Mu and Yuanlong Cai, “Research on non-linear dynamic systems employing colour space,” in 2000 5th International Conference on Signal Processing Proceedings (ICSP 2000, Beijing, China, August 21-25, 2000), vol. 1 of 3, pp. 285-289, IEEE / Publishing House of Electronics Industry (China), 2000

Peer-Reviewed Conference Posters

  • Haiyue Yuan, Shujun Li, Anthony T.S. Ho, Paul Palmer, Andy Lloyd and Graham Head, "Forensic Vehicle Convoy Analysis Using ANPR Data," poster presented at DFRWS EU 2016, 29-31 March 2016, Lausanne, Switzerland
  • Maliha Nazir, Yousra Javed, Muhammad Murtaza Khan, Syed Ali Khayam and Shujun Li, "Poster: Captchæcker – Automating Usability-Security Evaluation of Textual CAPTCHAs," in Proceedings of 7th Symposium On Usable Privacy and Security (SOUPS 2011, Carnegie Mellon University in Pittsburgh, PA, USA, July 20-22, 2011), ACM, 2011
  • Shujun Li, Ahmad-Reza Sadeghi and Roland Schmitz, “hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers,” in Financial Cryptography and Data Security: 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers, Lecture Notes in Computer Science, vol. 6052, pp. 429, Springer, 2010

Standard Contributions

Input Documents

  • Junaid Jameel Ahmad and Shujun Li, “Extending the Comparative Study on the Performance of C Code Automatically Generated by ORCC from RVC-CAL Code to a Resource-Constrained Embedded System,” ISO/IEC JTC1/SC29/WG11, MPEG2011/m21289, 97th MPEG Meeting, Torino, Italy, July 2011
  • Junaid Jameel Ahmad and Shujun Li, “Performance Benchmarking of C Code Automatically Generated by ORCC from RVC-CAL Code on a Quad-Core Machine,” ISO/IEC JTC1/SC29/WG11, MPEG2011/m21250, 97th MPEG Meeting, Torino, Italy, July 2011
  • Junaid Jameel Ahmad and Shujun Li, “Evaluating the Support of Handling Huge XDF Networks by the Open RVC-CAL Compiler (ORCC) and the Graphiti-Editor,” ISO/IEC JTC1/SC29/WG11, MPEG2011/m21249, 97th MPEG Meeting, Torino, Italy, July 2011
  • Junaid Jameel Ahmad, Shujun Li, Endri Bezati and Marco Mattavelli, “Building Joint Image Encryption-Encoding (JIEE) and Compressed Domain Image Watermarking Systems in the RVC Framework,” ISO/IEC JTC1/SC29/WG11, MPEG2011/m21188, 97th MPEG Meeting, Torino, Italy, July 2011
  • Junaid Jameel Ahmad, Shujun Li, Ihab Amer, and Marco Mattavelli, “Building Joint MPEG-4 AVC Video Encryption-Encoding (JVEE) System in the RVC Framework,” ISO/IEC JTC1/SC29/WG11, MPEG2011/m21185, 97th MPEG Meeting, Torino, Italy, July 2011
  • Junaid Jameel Ahmad and Shujun Li, “A comparative study on the performance of C code automatically generated by ORCC from RVC-CAL code,” ISO/IEC JTC1/SC29/WG11, MPEG2011/m19383, 95th MPEG Meeting, Daegu, Korea, January 2011
  • Marco Mattavelli, Mickaël Raulet, Shujun Li and Jörn W. Janneck, “Proposed requirements for RVC and RGC specification languages and solution,” ISO/IEC JTC1/SC29/WG11, MPEG2010/m18614, 94th MPEG Meeting, Guangzhou, China, October 2010
  • Jörn W. Janneck, Marco Mattavelli, Matthieu Wipliez, Mickaël Raulet, Shujun Li, Johan Eker, Carl Von Platen, Ghislain Roquier, Ihab Amer, Christophe Lucarz, Pascal Faure and Junaid Jameel Ahmad, “A proposal of RVC-CAL extensions for improved support of I/O processing,” ISO/IEC JTC1/SC29/WG11, MPEG2010/m18460, 94th MPEG Meeting, Guangzhou, China, October 2010
  • Jörn W. Janneck, Mickael Raulet, Matthieu Wiplietz, Johan Eker, Ghislain Roquier, Ihab Amer, Christophe Lucarz, Shujun Li, Junaid Jameel Ahmad and Marco Mattavelli, “Writing dataflow networks components (FUs) with different models of computations using RVC-CAL: a tutorial,” ISO/IEC JTC1/SC29/WG11, MPEG2010/m18458, 94th MPEG Meeting, Guangzhou, China, October 2010
  • Junaid Jameel Ahmad, Shujun Li, Marco Mattavelli, Matthieu Wipliez, Mickaël Raulet, “Crypto Tools Library (CTL): Applying RVC-CAL to Multimedia Security Applications,” ISO/IEC JTC1/SC29/WG11, MPEG2010/m18404, 94th MPEG Meeting, Guangzhou, China, October 2010
  • Shujun Li, Marco Mattavelli, Mickaël Raulet, Matthieu Wipliez, Jörn W. Janneck, Johan Eker, Carl Von Platen, Ghislain Roquier, Beilu Shao, Christophe Lucarz and Pascal Faure, “Proposed corrections and new changes to ISO/IEC 23001-4:2009,” ISO/IEC JTC1/SC29/WG11, MPEG2010/m17806, 93rd MPEG Meeting, Geneva, Switzerland, July 2010
  • Shujun Li, Junaid Jameel Ahmad, Ihab Amer and Marco Mattavelli, “Extending RVC for Wireless Multimedia Sensor Networks and Cryptography Applications,” ISO/IEC JTC1/SC29/WG11, MPEG2009/m16989, 90th MPEG Meeting, October 2009, Xi’an, China

Output Documents

  • Shujun Li, Marco Mattavelli and Mickaël Raulet, “Text of ISO/IEC 23001-4/COR1,” ISO/IEC JTC1/SC29/WG11, MPEG2010/w11813, 95th MPEG Meeting, Daegu, South Korea, January 2011
  • Hwa Seon Shin, Kazuo Sugimoto, Ihab Amer, Marco Mattavelli, Gwo Giun Lee and Shujun Li, “Description of Core Experiments in RVC (Reconfigurable Video Coding),” ISO/IEC JTC1/SC29/WG11, MPEG2010/w11628, 94th MPEG Meeting, Guangzhou, China, October 2010
  • Mickaël Raulet and Shujun Li, “Working Draft of ISO/IEC 23001-4/Amd.1,” ISO/IEC JTC1/SC29/WG11, MPEG2010/w11623, 94th MPEG Meeting, Guangzhou, China, October 2010
  • Shujun Li, Mickaël Raulet and Marco Mattavelli, “Text of ISO/IEC 23001-4/DCOR1,” ISO/IEC JTC1/SC29/WG11, MPEG2010/w11622, 94th MPEG Meeting, Guangzhou, China, October 2010
  • Shujun Li, “Process for Extending MPEG RVC VTL and Corresponding Verification Testing Procedures,” ISO/IEC JTC1/SC29/WG11, MPEG2010/w11474, 93rd MPEG Meeting, Geneva, Switzerland, July 2010
    Hwa Seon Shin, Kazuo Sugimoto, Ihab Amer, Marco Mattavelli, Gwo Giun Lee and Shujun Li, “Description of Core Experiments in RVC,” ISO/IEC JTC1/SC29/WG11, MPEG2010/w11473, 93rd MPEG Meeting, Geneva, Switzerland, July 2010
  • Shujun Li, “Defect Report on ISO/IEC 23001-4,” ISO/IEC JTC1/SC29/WG11, MPEG2010/w11469, 93rd MPEG Meeting, Geneva, Switzerland, July 2010

Teaching

  • COMM047: Secure Systems and Applications (2015-2016, jointly with Dr Stephan Wesemeyer and Dr Mark Manulis)
  • COM1025: Web Publishing and Databases (2015-2016)
  • COMM047: Secure Systems and Applications (2014-2015, jointly with Dr Anna Lisa Ferrara, Dr Mark Manulis and Prof Steve Schneider)
  • COMM046: Multimedia Security and Digital Forensics (2014-2016)
  • COMM023: Introduction to Multimedia Security (2013-2014, jointly with Dr Norman Poh)
  • COM1025: Web Publishing and Databases (2012-2013, jointly with Dr Norman Poh)
  • COMM028: Technologies and Applications (2012-2013, jointly with Prof Anthony TS Ho)
  • COM1030: Professional Studies (2012-2013, jointly with Dr Stephan Wesemeyer)
  • COMM023: Introduction to Multimedia Security (2011-2013)
  • COM1025: Web Publishing and Databases (2011-2012)
  • COM2030: Advanced Algorithms (2011-2012, jointly with Prof. Yaochu Jin)

Departmental Duties

  • Surrey Centre for Cyber Security (SCCS) Deputy Director (July 2014 - present)
  • Departmental Director of PhD Studies and PhD Admissions Tutor (December 2014 - present)
  • Member of University Ethics Committee (UEC) (May 2015 - present)
  • Departmental Representative to Faculty IT Governance Group (February 2014 - present)
  • Member of Departmental Research Management Committee (December 2014 - present)
  • Departmental Website Coordinator (September 2011 - present)
  • Member of Departmental Policy and Strategy Committee (December 2014 - June 2015)
  • Member of Departmental MSc Teaching Management Committee (June 2013 - June 2015)
  • Departmental MSc Admissions Tutor (May 2012 - September 2013)
  • Departmental Seminar Series Organiser (September 2011 - March 2012)

Affiliations

Professional Memberships

Editorships

Conference Organisation and TPC Memberships

Honours and Awards

Research Projects and Fellowships

Page Owner: sl0022
Page Created: Tuesday 6 September 2011 11:06:48 by eih206
Last Modified: Wednesday 16 November 2016 15:35:12 by sl0022
Expiry Date: Thursday 6 December 2012 11:05:05
Assembly date: Thu Nov 17 09:16:06 GMT 2016
Content ID: 64198
Revision: 80
Community: 1028

Rhythmyx folder: //Sites/surrey.ac.uk/computing/people
Content type: rx:StaffProfile