no code implementations • 3 Nov 2023 • Xin Yuan, Jie Guo, Weidong Qiu, Zheng Huang, Shujun Li
Mis- and disinformation online have become a major societal problem as major sources of online harms of different kinds.
no code implementations • 12 Jun 2023 • Yangde Wang, Weidong Qiu, Weicheng Zhang, Hao Tian, Shujun Li
Furthermore, based on SE#PCFG and a new systematic smoothing method, we proposed the Semantically Enhanced Password Cracking Architecture (SEPCA).
1 code implementation • 12 May 2023 • Enes Altuncu, Jason R. C. Nurse, Meryem Bagriacik, Sophie Kaleba, Haiyue Yuan, Lisa Bonheme, Shujun Li
In this highly digitised world, fake news is a challenging problem that can cause serious harm to society.
no code implementations • 19 Apr 2023 • Haiyue Yuan, Matthew Boakes, Xiao Ma, Dongmei Cao, Shujun Li
This case study can inform us about future research on more data flow-oriented privacy policy analysis and on the construction of a more comprehensive ontology on personal data flows in complicated business ecosystems.
no code implementations • 28 Dec 2022 • Ali Raza, Kim Phuc Tran, Ludovic Koehl, Shujun Li
We experimentally validated the performance of the proposed algorithm using ECG classification as an example application in healthcare, showing that the ensemble learning model outperformed all local models and even the FL-based global model.
no code implementations • 9 Nov 2022 • Enes Altuncu, Jason R. C. Nurse, Yang Xu, Jie Guo, Shujun Li
Automatic keyword extraction (AKE) has gained more importance with the increasing amount of digital textual data that modern computing systems process.
no code implementations • 2 Nov 2022 • Ruiyuan Lin, Sheng Liu, Jun Jiang, Shujun Li, Chengqing Li, C. -C. Jay Kuo
Recovering unknown, missing, damaged, distorted, or lost information in DCT coefficients is a common task in multiple applications of digital image processing, including image compression, selective image encryption, and image communication.
no code implementations • 24 Aug 2022 • Haiyue Yuan, Enes Altuncu, Shujun Li, Can Baskent
The wide spread of false information online including misinformation and disinformation has become a major problem for our highly digitised and globalised society.
no code implementations • 21 Aug 2022 • Enes Altuncu, Virginia N. L. Franqueira, Shujun Li
We believe that this paper is the most comprehensive review of deepfake in terms of aspects covered, and the first one covering both the English and Chinese literature and sources.
no code implementations • 11 Aug 2022 • Keenan Jones, Enes Altuncu, Virginia N. L. Franqueira, Yichao Wang, Shujun Li
In recent years there has been substantial growth in the capabilities of systems designed to generate text that mimics the fluency and coherence of human language.
no code implementations • 18 Jul 2022 • Ali Raza, Shujun Li, Kim-Phuc Tran, Ludovic Koehl
In federated learning (FL), data poisoning attacks can be generalized to model poisoning attacks, which cannot be detected by simpler methods due to the lack of access to local training data by the detector.
no code implementations • 5 Jun 2022 • Nandita Pattnaik, Shujun Li, Jason R. C. Nurse
Our analysis revealed a diverse range of topics discussed by non-expert users across the three years, including VPNs, Wi-Fi, smartphones, laptops, smart home devices, financial security, and security and privacy issues involving different stakeholders.
no code implementations • 18 Mar 2022 • Keenan Jones, Jason R. C. Nurse, Shujun Li
Given the power of natural language models in generating convincing texts, this paper examines the degree to which these language models can generate texts capable of deceiving online AA models.
no code implementations • 1 Oct 2021 • Ali Raza, Kim Phuc Tran, Ludovic Koehl, Shujun Li, Xianyi Zeng, Khaled Benzaidi
Moreover, in home healthcare applications the centralized approach can raise serious privacy concerns since the sensors used by a HAR classifier collect a lot of highly personal and sensitive data about people in the home.
no code implementations • 22 Jul 2021 • Keenan Jones, Jason R. C. Nurse, Shujun Li
These findings show that whilst the group has seen a resurgence during the protests, bot activity may be responsible for exaggerating the extent of this resurgence.
no code implementations • 26 May 2021 • Ali Raza, Kim Phuc Tran, Ludovic Koehl, Shujun Li
Nevertheless, training deep learning models normally requires a large amount of data and it can lead to privacy concerns.
no code implementations • 7 May 2021 • Keenan Jones, Jason R. C. Nurse, Shujun Li
Finally, we explore the textual context in which these emojis occur, finding that although similarities exist between the emoji usage of our Anonymous and baseline Twitter datasets, Anonymous users appear to have adopted more specific interpretations of certain emojis.
no code implementations • 15 Jun 2020 • Keenan Jones, Jason R. C. Nurse, Shujun Li
In this paper we re-examine some key findings reported in previous small-scale qualitative studies of the group using a large-scale computational analysis of Anonymous' presence on Twitter.
no code implementations • 19 Aug 2019 • Markus Wagner, Hanhe Lin, Shujun Li, Dietmar Saupe
We compared 8 state-of-the-art algorithms for blind IQA and showed that an oracle, able to predict the best performing method for any given input image, yields a hybrid method that could outperform even the best single existing method by a large margin.
no code implementations • 14 Sep 2016 • Aamo Iorliam, Santosh Tirunagari, Anthony T. S. Ho, Shujun Li, Adrian Waller, Norman Poh
In this paper, we present the application of Benford's law to a new network flow metric "flow size difference", which have not been studied before by other researchers, to build an unsupervised flow-based intrusion detection system (IDS).