Shancang Li
Senior Lecturer
Publication
2024
Sun, Y., Li, S., Iqbal, M. and Taher, F. 2024. Securing electric vehicles against CAN bus replay attacks: A message authentication approach . IEEE Communications Standards Magazine 8(4), pp. 88-95. (10.1109/mcomstd.0001.2400042 )
Li, S., Iqbal, M. and Saxena, N. 2024. Future industry internet of things with aero-trust security . Information Systems Frontiers 26, pp. 1653-1666. (10.1007/s10796-021-10199-5 )
Wang, X., Li, S. and Rahman, M. 2024. A comprehensive survey on enabling techniques in secure and resilient smart grids . Electronics 13(11), article number: 2177. (10.3390/electronics13112177 )
Liu, Y., Li, S., Wang, X. and Xu, L. 2024. A review of hybrid cyber threats modelling and detection using artificial intelligence in IIoT . Computer Modeling in Engineering & Sciences 140(2), pp. 1233-1261. (10.32604/cmes.2024.046473 )
Wang, X., Li, S. and Iqbal, M. 2024. Live power generation predictions via AI-driven resilient systems in smart microgrids . IEEE Transactions on Consumer Electronics 70(1), pp. 3875-3884. (10.1109/TCE.2024.3371256 )
Wang, X., Li, S. and Iqbal, M. 2024. Artificial intelligence enabled microgrid power generation prediction . Open Computer Science
Li, S., Iqbal, M., Bashir, A. K. and Xinheng, W. 2024. Privacy preservation in artificial intelligence-enabled healthcare analytics . Human-Centric Computing and Information Sciences
Rasool, S., Iqbal, M., Li, S. and Ghosh, S. 2024. Security, privacy and trust of distributed ledgers technology . In: Al-Dulaimi, A., Dobre, O. A. and Chih-lin, I. eds. Blockchains: Empowering Technologies and Industrial Applications . Wiley-IEEE Press, pp. 91-116., (10.1002/9781119781042.ch4 )
2023
Liu, Y. and Li, S. 2023. Hybrid cyber threats detection using explainable AI in Industrial IoT . Presented at: 2023 International Conference on Human-Centered Cognitive Systems (HCCS), 16 December 2023Proceedings of International Conference on Human-Centered Cognitive Systems . New York: IEEE pp. 1-6., (10.1109/HCCS59561.2023.10452621 )
Li, S. and Liu, Y. 2023. Human-centric artificial intelligence enabled digital images and videos forensic triage . Presented at: IEEE 2023 International Conference on Human-Centered Cognitive Systems (HCCS), Cardiff, UK, 16 December 2023Proceedings of International Conference on Human-Centered Cognitive Systems . IEEE pp. 1-5., (10.1109/HCCS59561.2023.10452651 )
Hulayyil, S., Li, S. and Xu, L. 2023. Machine-learning-based vulnerability detection and classification in Internet of Things device security . Electronics 12(18), article number: 3927. (10.3390/electronics12183927 )
Wang, X., Liu, Y. and Li, S. 2023. Deep learning enabled keystroke eavesdropping attack over videoconferencing platforms . Presented at: IEEE INFOCOM 2023, New York, USA, 20 May 2023IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops . INFOCOM WKSHPS Hoboken, NJ: IEEE pp. 1-2., (10.1109/INFOCOMWKSHPS57453.2023.10225861 )
Hulayyil, S. and Li, S. 2023. Ripple20 vulnerabilities detection using featureless deep learning model . Presented at: TrustCom 2023 : The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 1-3 November 2023.
2022
Alshomrani, S. and Li, S. 2022. PUFDCA: A Zero-trust based IoT device continuous authentication protocol . Wireless Communications and Mobile Computing 2022, article number: 6367579. (10.1155/2022/6367579 )
Li, P., Wang, X., Huang, K., Huang, Y., Li, S. and Iqbal, M. 2022. Multi-model running latency optimization in an edge computing paradigm . Sensors 22(16), article number: e6097. (10.3390/s22166097 )
Althunayyan, M., Saxena, N., Li, S. and Gope, P. 2022. Evaluation of black-box web application security scanners in detecting injection vulnerabilities . Electronics 11(13), article number: 2049. (10.3390/electronics11132049 )
2017
Andriotis, P., Li, S., Spyridopoulos, T. and Stringhini, G. 2017. A comparative study of android users’ privacy preferences under the runtime permission model . Presented at: International Conference on Human Aspects of Information Security, Privacy, and Trust, Vancouver, BC, Canada, 9-14 July 2017, Vol. 10292. Lecture Notes in Computer Science pp. 604-622., (10.1007/978-3-319-58460-7_42 )
2015
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R. and Russell, G. 2015. Real-time monitoring of privacy abuses and intrusion detection in android system . Presented at: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, Los Angeles, CA, US, 2nd-7th August 2015Human Aspects of Information Security, Privacy, and Trust , Vol. 9190. Lecture Notes in Computer Science Springer Verlag pp. 379-390., (10.1007/978-3-319-20376-8_34 )
2014
Spyridopoulos, T., Maraslis, K., Tryfonas, T., Oikonomou, G. and Li, S. 2014. Managing cyber security risks in industrial control systems with game theory and viable system modelling . Presented at: 9th International Conference on System of Systems Engineering, Glenelg, Australia, 9th-13th June 20142014 9th International Conference on System of Systems Engineering (SOSE) . IEEE pp. 266-271., (10.1109/SYSOSE.2014.6892499 )
Articles
Sun, Y., Li, S., Iqbal, M. and Taher, F. 2024. Securing electric vehicles against CAN bus replay attacks: A message authentication approach . IEEE Communications Standards Magazine 8(4), pp. 88-95. (10.1109/mcomstd.0001.2400042 )
Li, S., Iqbal, M. and Saxena, N. 2024. Future industry internet of things with aero-trust security . Information Systems Frontiers 26, pp. 1653-1666. (10.1007/s10796-021-10199-5 )
Wang, X., Li, S. and Rahman, M. 2024. A comprehensive survey on enabling techniques in secure and resilient smart grids . Electronics 13(11), article number: 2177. (10.3390/electronics13112177 )
Liu, Y., Li, S., Wang, X. and Xu, L. 2024. A review of hybrid cyber threats modelling and detection using artificial intelligence in IIoT . Computer Modeling in Engineering & Sciences 140(2), pp. 1233-1261. (10.32604/cmes.2024.046473 )
Wang, X., Li, S. and Iqbal, M. 2024. Live power generation predictions via AI-driven resilient systems in smart microgrids . IEEE Transactions on Consumer Electronics 70(1), pp. 3875-3884. (10.1109/TCE.2024.3371256 )
Wang, X., Li, S. and Iqbal, M. 2024. Artificial intelligence enabled microgrid power generation prediction . Open Computer Science
Li, S., Iqbal, M., Bashir, A. K. and Xinheng, W. 2024. Privacy preservation in artificial intelligence-enabled healthcare analytics . Human-Centric Computing and Information Sciences
Hulayyil, S., Li, S. and Xu, L. 2023. Machine-learning-based vulnerability detection and classification in Internet of Things device security . Electronics 12(18), article number: 3927. (10.3390/electronics12183927 )
Alshomrani, S. and Li, S. 2022. PUFDCA: A Zero-trust based IoT device continuous authentication protocol . Wireless Communications and Mobile Computing 2022, article number: 6367579. (10.1155/2022/6367579 )
Li, P., Wang, X., Huang, K., Huang, Y., Li, S. and Iqbal, M. 2022. Multi-model running latency optimization in an edge computing paradigm . Sensors 22(16), article number: e6097. (10.3390/s22166097 )
Althunayyan, M., Saxena, N., Li, S. and Gope, P. 2022. Evaluation of black-box web application security scanners in detecting injection vulnerabilities . Electronics 11(13), article number: 2049. (10.3390/electronics11132049 )
Book sections
Rasool, S., Iqbal, M., Li, S. and Ghosh, S. 2024. Security, privacy and trust of distributed ledgers technology . In: Al-Dulaimi, A., Dobre, O. A. and Chih-lin, I. eds. Blockchains: Empowering Technologies and Industrial Applications . Wiley-IEEE Press, pp. 91-116., (10.1002/9781119781042.ch4 )
Conferences
Liu, Y. and Li, S. 2023. Hybrid cyber threats detection using explainable AI in Industrial IoT . Presented at: 2023 International Conference on Human-Centered Cognitive Systems (HCCS), 16 December 2023Proceedings of International Conference on Human-Centered Cognitive Systems . New York: IEEE pp. 1-6., (10.1109/HCCS59561.2023.10452621 )
Li, S. and Liu, Y. 2023. Human-centric artificial intelligence enabled digital images and videos forensic triage . Presented at: IEEE 2023 International Conference on Human-Centered Cognitive Systems (HCCS), Cardiff, UK, 16 December 2023Proceedings of International Conference on Human-Centered Cognitive Systems . IEEE pp. 1-5., (10.1109/HCCS59561.2023.10452651 )
Wang, X., Liu, Y. and Li, S. 2023. Deep learning enabled keystroke eavesdropping attack over videoconferencing platforms . Presented at: IEEE INFOCOM 2023, New York, USA, 20 May 2023IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops . INFOCOM WKSHPS Hoboken, NJ: IEEE pp. 1-2., (10.1109/INFOCOMWKSHPS57453.2023.10225861 )
Hulayyil, S. and Li, S. 2023. Ripple20 vulnerabilities detection using featureless deep learning model . Presented at: TrustCom 2023 : The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 1-3 November 2023.
Andriotis, P., Li, S., Spyridopoulos, T. and Stringhini, G. 2017. A comparative study of android users’ privacy preferences under the runtime permission model . Presented at: International Conference on Human Aspects of Information Security, Privacy, and Trust, Vancouver, BC, Canada, 9-14 July 2017, Vol. 10292. Lecture Notes in Computer Science pp. 604-622., (10.1007/978-3-319-58460-7_42 )
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R. and Russell, G. 2015. Real-time monitoring of privacy abuses and intrusion detection in android system . Presented at: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, Los Angeles, CA, US, 2nd-7th August 2015Human Aspects of Information Security, Privacy, and Trust , Vol. 9190. Lecture Notes in Computer Science Springer Verlag pp. 379-390., (10.1007/978-3-319-20376-8_34 )
Spyridopoulos, T., Maraslis, K., Tryfonas, T., Oikonomou, G. and Li, S. 2014. Managing cyber security risks in industrial control systems with game theory and viable system modelling . Presented at: 9th International Conference on System of Systems Engineering, Glenelg, Australia, 9th-13th June 20142014 9th International Conference on System of Systems Engineering (SOSE) . IEEE pp. 266-271., (10.1109/SYSOSE.2014.6892499 )