Hafan Chevron right Pobl Chevron right Shancang Li
Shancang Li
Uwch Ddarlithydd
Cyhoeddiad
2024
Sun, Y., Li, S., Iqbal, M. and Taher, F. 2024. Securing electric vehicles against CAN bus replay attacks: A message authentication approach . IEEE Communications Standards Magazine 8(4), pp. 88-95. (10.1109/mcomstd.0001.2400042 )
Li, S., Iqbal, M. and Saxena, N. 2024. Future industry internet of things with aero-trust security . Information Systems Frontiers 26, pp. 1653-1666. (10.1007/s10796-021-10199-5 )
Wang, X., Li, S. and Rahman, M. 2024. A comprehensive survey on enabling techniques in secure and resilient smart grids . Electronics 13(11), article number: 2177. (10.3390/electronics13112177 )
Liu, Y., Li, S., Wang, X. and Xu, L. 2024. A review of hybrid cyber threats modelling and detection using artificial intelligence in IIoT . Computer Modeling in Engineering & Sciences 140(2), pp. 1233-1261. (10.32604/cmes.2024.046473 )
Wang, X., Li, S. and Iqbal, M. 2024. Live power generation predictions via AI-driven resilient systems in smart microgrids . IEEE Transactions on Consumer Electronics 70(1), pp. 3875-3884. (10.1109/TCE.2024.3371256 )
Wang, X., Li, S. and Iqbal, M. 2024. Artificial intelligence enabled microgrid power generation prediction . Open Computer Science
Li, S., Iqbal, M., Bashir, A. K. and Xinheng, W. 2024. Privacy preservation in artificial intelligence-enabled healthcare analytics . Human-Centric Computing and Information Sciences
Rasool, S., Iqbal, M., Li, S. and Ghosh, S. 2024. Security, privacy and trust of distributed ledgers technology . In: Al-Dulaimi, A., Dobre, O. A. and Chih-lin, I. eds. Blockchains: Empowering Technologies and Industrial Applications . Wiley-IEEE Press, pp. 91-116., (10.1002/9781119781042.ch4 )
2023
Liu, Y. and Li, S. 2023. Hybrid cyber threats detection using explainable AI in Industrial IoT . Presented at: 2023 International Conference on Human-Centered Cognitive Systems (HCCS), 16 December 2023Proceedings of International Conference on Human-Centered Cognitive Systems . New York: IEEE pp. 1-6., (10.1109/HCCS59561.2023.10452621 )
Li, S. and Liu, Y. 2023. Human-centric artificial intelligence enabled digital images and videos forensic triage . Presented at: IEEE 2023 International Conference on Human-Centered Cognitive Systems (HCCS), Cardiff, UK, 16 December 2023Proceedings of International Conference on Human-Centered Cognitive Systems . IEEE pp. 1-5., (10.1109/HCCS59561.2023.10452651 )
Hulayyil, S., Li, S. and Xu, L. 2023. Machine-learning-based vulnerability detection and classification in Internet of Things device security . Electronics 12(18), article number: 3927. (10.3390/electronics12183927 )
Wang, X., Liu, Y. and Li, S. 2023. Deep learning enabled keystroke eavesdropping attack over videoconferencing platforms . Presented at: IEEE INFOCOM 2023, New York, USA, 20 May 2023IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops . INFOCOM WKSHPS Hoboken, NJ: IEEE pp. 1-2., (10.1109/INFOCOMWKSHPS57453.2023.10225861 )
Hulayyil, S. and Li, S. 2023. Ripple20 vulnerabilities detection using featureless deep learning model . Presented at: TrustCom 2023 : The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 1-3 November 2023.
2022
Alshomrani, S. and Li, S. 2022. PUFDCA: A Zero-trust based IoT device continuous authentication protocol . Wireless Communications and Mobile Computing 2022, article number: 6367579. (10.1155/2022/6367579 )
Li, P., Wang, X., Huang, K., Huang, Y., Li, S. and Iqbal, M. 2022. Multi-model running latency optimization in an edge computing paradigm . Sensors 22(16), article number: e6097. (10.3390/s22166097 )
Althunayyan, M., Saxena, N., Li, S. and Gope, P. 2022. Evaluation of black-box web application security scanners in detecting injection vulnerabilities . Electronics 11(13), article number: 2049. (10.3390/electronics11132049 )
2017
Andriotis, P., Li, S., Spyridopoulos, T. and Stringhini, G. 2017. A comparative study of android users’ privacy preferences under the runtime permission model . Presented at: International Conference on Human Aspects of Information Security, Privacy, and Trust, Vancouver, BC, Canada, 9-14 July 2017, Vol. 10292. Lecture Notes in Computer Science pp. 604-622., (10.1007/978-3-319-58460-7_42 )
2015
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R. and Russell, G. 2015. Real-time monitoring of privacy abuses and intrusion detection in android system . Presented at: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, Los Angeles, CA, US, 2nd-7th August 2015Human Aspects of Information Security, Privacy, and Trust , Vol. 9190. Lecture Notes in Computer Science Springer Verlag pp. 379-390., (10.1007/978-3-319-20376-8_34 )
2014
Spyridopoulos, T., Maraslis, K., Tryfonas, T., Oikonomou, G. and Li, S. 2014. Managing cyber security risks in industrial control systems with game theory and viable system modelling . Presented at: 9th International Conference on System of Systems Engineering, Glenelg, Australia, 9th-13th June 20142014 9th International Conference on System of Systems Engineering (SOSE) . IEEE pp. 266-271., (10.1109/SYSOSE.2014.6892499 )
Articles
Sun, Y., Li, S., Iqbal, M. and Taher, F. 2024. Securing electric vehicles against CAN bus replay attacks: A message authentication approach . IEEE Communications Standards Magazine 8(4), pp. 88-95. (10.1109/mcomstd.0001.2400042 )
Li, S., Iqbal, M. and Saxena, N. 2024. Future industry internet of things with aero-trust security . Information Systems Frontiers 26, pp. 1653-1666. (10.1007/s10796-021-10199-5 )
Wang, X., Li, S. and Rahman, M. 2024. A comprehensive survey on enabling techniques in secure and resilient smart grids . Electronics 13(11), article number: 2177. (10.3390/electronics13112177 )
Liu, Y., Li, S., Wang, X. and Xu, L. 2024. A review of hybrid cyber threats modelling and detection using artificial intelligence in IIoT . Computer Modeling in Engineering & Sciences 140(2), pp. 1233-1261. (10.32604/cmes.2024.046473 )
Wang, X., Li, S. and Iqbal, M. 2024. Live power generation predictions via AI-driven resilient systems in smart microgrids . IEEE Transactions on Consumer Electronics 70(1), pp. 3875-3884. (10.1109/TCE.2024.3371256 )
Wang, X., Li, S. and Iqbal, M. 2024. Artificial intelligence enabled microgrid power generation prediction . Open Computer Science
Li, S., Iqbal, M., Bashir, A. K. and Xinheng, W. 2024. Privacy preservation in artificial intelligence-enabled healthcare analytics . Human-Centric Computing and Information Sciences
Hulayyil, S., Li, S. and Xu, L. 2023. Machine-learning-based vulnerability detection and classification in Internet of Things device security . Electronics 12(18), article number: 3927. (10.3390/electronics12183927 )
Alshomrani, S. and Li, S. 2022. PUFDCA: A Zero-trust based IoT device continuous authentication protocol . Wireless Communications and Mobile Computing 2022, article number: 6367579. (10.1155/2022/6367579 )
Li, P., Wang, X., Huang, K., Huang, Y., Li, S. and Iqbal, M. 2022. Multi-model running latency optimization in an edge computing paradigm . Sensors 22(16), article number: e6097. (10.3390/s22166097 )
Althunayyan, M., Saxena, N., Li, S. and Gope, P. 2022. Evaluation of black-box web application security scanners in detecting injection vulnerabilities . Electronics 11(13), article number: 2049. (10.3390/electronics11132049 )
Book sections
Rasool, S., Iqbal, M., Li, S. and Ghosh, S. 2024. Security, privacy and trust of distributed ledgers technology . In: Al-Dulaimi, A., Dobre, O. A. and Chih-lin, I. eds. Blockchains: Empowering Technologies and Industrial Applications . Wiley-IEEE Press, pp. 91-116., (10.1002/9781119781042.ch4 )
Conferences
Liu, Y. and Li, S. 2023. Hybrid cyber threats detection using explainable AI in Industrial IoT . Presented at: 2023 International Conference on Human-Centered Cognitive Systems (HCCS), 16 December 2023Proceedings of International Conference on Human-Centered Cognitive Systems . New York: IEEE pp. 1-6., (10.1109/HCCS59561.2023.10452621 )
Li, S. and Liu, Y. 2023. Human-centric artificial intelligence enabled digital images and videos forensic triage . Presented at: IEEE 2023 International Conference on Human-Centered Cognitive Systems (HCCS), Cardiff, UK, 16 December 2023Proceedings of International Conference on Human-Centered Cognitive Systems . IEEE pp. 1-5., (10.1109/HCCS59561.2023.10452651 )
Wang, X., Liu, Y. and Li, S. 2023. Deep learning enabled keystroke eavesdropping attack over videoconferencing platforms . Presented at: IEEE INFOCOM 2023, New York, USA, 20 May 2023IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops . INFOCOM WKSHPS Hoboken, NJ: IEEE pp. 1-2., (10.1109/INFOCOMWKSHPS57453.2023.10225861 )
Hulayyil, S. and Li, S. 2023. Ripple20 vulnerabilities detection using featureless deep learning model . Presented at: TrustCom 2023 : The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 1-3 November 2023.
Andriotis, P., Li, S., Spyridopoulos, T. and Stringhini, G. 2017. A comparative study of android users’ privacy preferences under the runtime permission model . Presented at: International Conference on Human Aspects of Information Security, Privacy, and Trust, Vancouver, BC, Canada, 9-14 July 2017, Vol. 10292. Lecture Notes in Computer Science pp. 604-622., (10.1007/978-3-319-58460-7_42 )
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R. and Russell, G. 2015. Real-time monitoring of privacy abuses and intrusion detection in android system . Presented at: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, Los Angeles, CA, US, 2nd-7th August 2015Human Aspects of Information Security, Privacy, and Trust , Vol. 9190. Lecture Notes in Computer Science Springer Verlag pp. 379-390., (10.1007/978-3-319-20376-8_34 )
Spyridopoulos, T., Maraslis, K., Tryfonas, T., Oikonomou, G. and Li, S. 2014. Managing cyber security risks in industrial control systems with game theory and viable system modelling . Presented at: 9th International Conference on System of Systems Engineering, Glenelg, Australia, 9th-13th June 20142014 9th International Conference on System of Systems Engineering (SOSE) . IEEE pp. 266-271., (10.1109/SYSOSE.2014.6892499 )