Search Results for author: Shujun Li

Found 20 papers, 1 papers with code

Support or Refute: Analyzing the Stance of Evidence to Detect Out-of-Context Mis- and Disinformation

no code implementations3 Nov 2023 Xin Yuan, Jie Guo, Weidong Qiu, Zheng Huang, Shujun Li

Mis- and disinformation online have become a major societal problem as major sources of online harms of different kinds.

SE#PCFG: Semantically Enhanced PCFG for Password Analysis and Cracking

no code implementations12 Jun 2023 Yangde Wang, Weidong Qiu, Weicheng Zhang, Hao Tian, Shujun Li

Furthermore, based on SE#PCFG and a new systematic smoothing method, we proposed the Semantically Enhanced Password Cracking Architecture (SEPCA).

Visualising Personal Data Flows: Insights from a Case Study of Booking.com

no code implementations19 Apr 2023 Haiyue Yuan, Matthew Boakes, Xiao Ma, Dongmei Cao, Shujun Li

This case study can inform us about future research on more data flow-oriented privacy policy analysis and on the construction of a more comprehensive ontology on personal data flows in complicated business ecosystems.

Proof of Swarm Based Ensemble Learning for Federated Learning Applications

no code implementations28 Dec 2022 Ali Raza, Kim Phuc Tran, Ludovic Koehl, Shujun Li

We experimentally validated the performance of the proposed algorithm using ECG classification as an example application in healthcare, showing that the ensemble learning model outperformed all local models and even the FL-based global model.

ECG Classification Ensemble Learning +1

Improving Performance of Automatic Keyword Extraction (AKE) Methods Using PoS-Tagging and Enhanced Semantic-Awareness

no code implementations9 Nov 2022 Enes Altuncu, Jason R. C. Nurse, Yang Xu, Jie Guo, Shujun Li

Automatic keyword extraction (AKE) has gained more importance with the increasing amount of digital textual data that modern computing systems process.

Information Retrieval Keyword Extraction +3

Recovering Sign Bits of DCT Coefficients in Digital Images as an Optimization Problem

no code implementations2 Nov 2022 Ruiyuan Lin, Sheng Liu, Jun Jiang, Shujun Li, Chengqing Li, C. -C. Jay Kuo

Recovering unknown, missing, damaged, distorted, or lost information in DCT coefficients is a common task in multiple applications of digital image processing, including image compression, selective image encryption, and image communication.

Image Compression SSIM

Graphical Models of False Information and Fact Checking Ecosystems

no code implementations24 Aug 2022 Haiyue Yuan, Enes Altuncu, Shujun Li, Can Baskent

The wide spread of false information online including misinformation and disinformation has become a major problem for our highly digitised and globalised society.

Fact Checking Misinformation

Deepfake: Definitions, Performance Metrics and Standards, Datasets and Benchmarks, and a Meta-Review

no code implementations21 Aug 2022 Enes Altuncu, Virginia N. L. Franqueira, Shujun Li

We believe that this paper is the most comprehensive review of deepfake in terms of aspects covered, and the first one covering both the English and Chinese literature and sources.

Face Swapping

A Comprehensive Survey of Natural Language Generation Advances from the Perspective of Digital Deception

no code implementations11 Aug 2022 Keenan Jones, Enes Altuncu, Virginia N. L. Franqueira, Yichao Wang, Shujun Li

In recent years there has been substantial growth in the capabilities of systems designed to generate text that mimics the fluency and coherence of human language.

Misinformation Text Generation

Using Anomaly Detection to Detect Poisoning Attacks in Federated Learning Applications

no code implementations18 Jul 2022 Ali Raza, Shujun Li, Kim-Phuc Tran, Ludovic Koehl

In federated learning (FL), data poisoning attacks can be generalized to model poisoning attacks, which cannot be detected by simpler methods due to the lack of access to local training data by the detector.

Anomaly Detection Data Poisoning +4

Perspectives of Non-Expert Users on Cyber Security and Privacy: An Analysis of Online Discussions on Twitter

no code implementations5 Jun 2022 Nandita Pattnaik, Shujun Li, Jason R. C. Nurse

Our analysis revealed a diverse range of topics discussed by non-expert users across the three years, including VPNs, Wi-Fi, smartphones, laptops, smart home devices, financial security, and security and privacy issues involving different stakeholders.

Sentiment Analysis

Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators

no code implementations18 Mar 2022 Keenan Jones, Jason R. C. Nurse, Shujun Li

Given the power of natural language models in generating convincing texts, this paper examines the degree to which these language models can generate texts capable of deceiving online AA models.

Authorship Attribution Question Answering +2

Lightweight Transformer in Federated Setting for Human Activity Recognition

no code implementations1 Oct 2021 Ali Raza, Kim Phuc Tran, Ludovic Koehl, Shujun Li, Xianyi Zeng, Khaled Benzaidi

Moreover, in home healthcare applications the centralized approach can raise serious privacy concerns since the sensors used by a HAR classifier collect a lot of highly personal and sensitive data about people in the home.

Federated Learning Human Activity Recognition

Out of the Shadows: Analyzing Anonymous' Twitter Resurgence during the 2020 Black Lives Matter Protests

no code implementations22 Jul 2021 Keenan Jones, Jason R. C. Nurse, Shujun Li

These findings show that whilst the group has seen a resurgence during the protests, bot activity may be responsible for exaggerating the extent of this resurgence.

Sentiment Analysis

The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter

no code implementations7 May 2021 Keenan Jones, Jason R. C. Nurse, Shujun Li

Finally, we explore the textual context in which these emojis occur, finding that although similarities exist between the emoji usage of our Anonymous and baseline Twitter datasets, Anonymous users appear to have adopted more specific interpretations of certain emojis.

Behind the Mask: A Computational Study of Anonymous' Presence on Twitter

no code implementations15 Jun 2020 Keenan Jones, Jason R. C. Nurse, Shujun Li

In this paper we re-examine some key findings reported in previous small-scale qualitative studies of the group using a large-scale computational analysis of Anonymous' presence on Twitter.

Algorithm Selection for Image Quality Assessment

no code implementations19 Aug 2019 Markus Wagner, Hanhe Lin, Shujun Li, Dietmar Saupe

We compared 8 state-of-the-art algorithms for blind IQA and showed that an oracle, able to predict the best performing method for any given input image, yields a hybrid method that could outperform even the best single existing method by a large margin.

Image Quality Assessment

"Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law

no code implementations14 Sep 2016 Aamo Iorliam, Santosh Tirunagari, Anthony T. S. Ho, Shujun Li, Adrian Waller, Norman Poh

In this paper, we present the application of Benford's law to a new network flow metric "flow size difference", which have not been studied before by other researchers, to build an unsupervised flow-based intrusion detection system (IDS).

Network Intrusion Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.