Publication
2024
- Wang, X., Li, S. and Rahman, M. 2024. A comprehensive survey on enabling techniques in secure and resilient smart grids. Electronics 13(11), article number: 2177. (10.3390/electronics13112177)
- Liu, Y., Li, S., Wang, X. and Xu, L. 2024. A review of hybrid cyber threats modelling and detection using artificial intelligence in IIoT. Computer Modeling in Engineering & Sciences 140(2), pp. 1233-1261. (10.32604/cmes.2024.046473)
- Wang, X., Li, S. and Iqbal, M. 2024. Live power generation predictions via AI-driven resilient systems in smart microgrids. IEEE Transactions on Consumer Electronics 70(1), pp. 3875-3884. (10.1109/TCE.2024.3371256)
- Wang, X., Li, S. and Iqbal, M. 2024. Artificial intelligence enabled microgrid power generation prediction. Open Computer Science
- Li, S., Iqbal, M., Bashir, A. K. and Xinheng, W. 2024. Privacy preservation in artificial intelligence-enabled healthcare analytics. Human-Centric Computing and Information Sciences
- Rasool, S., Iqbal, M., Li, S. and Ghosh, S. 2024. Security, privacy and trust of distributed ledgers technology. In: Al-Dulaimi, A., Dobre, O. A. and Chih-lin, I. eds. Blockchains: Empowering Technologies and Industrial Applications. Wiley-IEEE Press, pp. 91-116., (10.1002/9781119781042.ch4)
2023
- Li, S. and Liu, Y. 2023. Human-centric artificial intelligence enabled digital images and videos forensic triage. Presented at: IEEE 2023 International Conference on Human-Centered Cognitive Systems (HCCS), Cardiff, UK, 16 December 2023Proceedings of International Conference on Human-Centered Cognitive Systems. IEEE pp. 1-5., (10.1109/HCCS59561.2023.10452651)
- Liu, Y. and Li, S. 2023. Hybrid cyber threats detection using explainable AI in Industrial IoT. Presented at: 2023 International Conference on Human-Centered Cognitive Systems (HCCS), 16 December 2023Proceedings of International Conference on Human-Centered Cognitive Systems. New York: IEEE pp. 1-6., (10.1109/HCCS59561.2023.10452621)
- Hulayyil, S., Li, S. and Xu, L. 2023. Machine-learning-based vulnerability detection and classification in Internet of Things device security. Electronics 12(18), article number: 3927. (10.3390/electronics12183927)
- Wang, X., Liu, Y. and Li, S. 2023. Deep learning enabled keystroke eavesdropping attack over videoconferencing platforms. Presented at: IEEE INFOCOM 2023, New York, USA, 20 May 2023IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops. INFOCOM WKSHPS Hoboken, NJ: IEEE pp. 1-2., (10.1109/INFOCOMWKSHPS57453.2023.10225861)
- Hulayyil, S. and Li, S. 2023. Ripple20 vulnerabilities detection using featureless deep learning model. Presented at: TrustCom 2023 : The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 1-3 November 2023.
2022
- Alshomrani, S. and Li, S. 2022. PUFDCA: A Zero-trust based IoT device continuous authentication protocol. Wireless Communications and Mobile Computing 2022, article number: 6367579. (10.1155/2022/6367579)
- Li, P., Wang, X., Huang, K., Huang, Y., Li, S. and Iqbal, M. 2022. Multi-model running latency optimization in an edge computing paradigm. Sensors 22(16), article number: e6097. (10.3390/s22166097)
- Althunayyan, M., Saxena, N., Li, S. and Gope, P. 2022. Evaluation of black-box web application security scanners in detecting injection vulnerabilities. Electronics 11(13), article number: 2049. (10.3390/electronics11132049)
- Li, S., Iqbal, M. and Saxena, N. 2022. Future industry internet of things with aero-trust security. Information Systems Frontiers (10.1007/s10796-021-10199-5)
2017
- Andriotis, P., Li, S., Spyridopoulos, T. and Stringhini, G. 2017. A comparative study of android users’ privacy preferences under the runtime permission model. Presented at: International Conference on Human Aspects of Information Security, Privacy, and Trust, Vancouver, BC, Canada, 9-14 July 2017, Vol. 10292. Lecture Notes in Computer Science pp. 604-622., (10.1007/978-3-319-58460-7_42)
2015
- Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R. and Russell, G. 2015. Real-time monitoring of privacy abuses and intrusion detection in android system. Presented at: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, Los Angeles, CA, US, 2nd-7th August 2015Human Aspects of Information Security, Privacy, and Trust, Vol. 9190. Lecture Notes in Computer Science Springer Verlag pp. 379-390., (10.1007/978-3-319-20376-8_34)
2014
- Spyridopoulos, T., Maraslis, K., Tryfonas, T., Oikonomou, G. and Li, S. 2014. Managing cyber security risks in industrial control systems with game theory and viable system modelling. Presented at: 9th International Conference on System of Systems Engineering, Glenelg, Australia, 9th-13th June 20142014 9th International Conference on System of Systems Engineering (SOSE). IEEE pp. 266-271., (10.1109/SYSOSE.2014.6892499)
Articles
- Wang, X., Li, S. and Rahman, M. 2024. A comprehensive survey on enabling techniques in secure and resilient smart grids. Electronics 13(11), article number: 2177. (10.3390/electronics13112177)
- Liu, Y., Li, S., Wang, X. and Xu, L. 2024. A review of hybrid cyber threats modelling and detection using artificial intelligence in IIoT. Computer Modeling in Engineering & Sciences 140(2), pp. 1233-1261. (10.32604/cmes.2024.046473)
- Wang, X., Li, S. and Iqbal, M. 2024. Live power generation predictions via AI-driven resilient systems in smart microgrids. IEEE Transactions on Consumer Electronics 70(1), pp. 3875-3884. (10.1109/TCE.2024.3371256)
- Wang, X., Li, S. and Iqbal, M. 2024. Artificial intelligence enabled microgrid power generation prediction. Open Computer Science
- Li, S., Iqbal, M., Bashir, A. K. and Xinheng, W. 2024. Privacy preservation in artificial intelligence-enabled healthcare analytics. Human-Centric Computing and Information Sciences
- Hulayyil, S., Li, S. and Xu, L. 2023. Machine-learning-based vulnerability detection and classification in Internet of Things device security. Electronics 12(18), article number: 3927. (10.3390/electronics12183927)
- Alshomrani, S. and Li, S. 2022. PUFDCA: A Zero-trust based IoT device continuous authentication protocol. Wireless Communications and Mobile Computing 2022, article number: 6367579. (10.1155/2022/6367579)
- Li, P., Wang, X., Huang, K., Huang, Y., Li, S. and Iqbal, M. 2022. Multi-model running latency optimization in an edge computing paradigm. Sensors 22(16), article number: e6097. (10.3390/s22166097)
- Althunayyan, M., Saxena, N., Li, S. and Gope, P. 2022. Evaluation of black-box web application security scanners in detecting injection vulnerabilities. Electronics 11(13), article number: 2049. (10.3390/electronics11132049)
- Li, S., Iqbal, M. and Saxena, N. 2022. Future industry internet of things with aero-trust security. Information Systems Frontiers (10.1007/s10796-021-10199-5)
Book sections
- Rasool, S., Iqbal, M., Li, S. and Ghosh, S. 2024. Security, privacy and trust of distributed ledgers technology. In: Al-Dulaimi, A., Dobre, O. A. and Chih-lin, I. eds. Blockchains: Empowering Technologies and Industrial Applications. Wiley-IEEE Press, pp. 91-116., (10.1002/9781119781042.ch4)
Conferences
- Li, S. and Liu, Y. 2023. Human-centric artificial intelligence enabled digital images and videos forensic triage. Presented at: IEEE 2023 International Conference on Human-Centered Cognitive Systems (HCCS), Cardiff, UK, 16 December 2023Proceedings of International Conference on Human-Centered Cognitive Systems. IEEE pp. 1-5., (10.1109/HCCS59561.2023.10452651)
- Liu, Y. and Li, S. 2023. Hybrid cyber threats detection using explainable AI in Industrial IoT. Presented at: 2023 International Conference on Human-Centered Cognitive Systems (HCCS), 16 December 2023Proceedings of International Conference on Human-Centered Cognitive Systems. New York: IEEE pp. 1-6., (10.1109/HCCS59561.2023.10452621)
- Wang, X., Liu, Y. and Li, S. 2023. Deep learning enabled keystroke eavesdropping attack over videoconferencing platforms. Presented at: IEEE INFOCOM 2023, New York, USA, 20 May 2023IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops. INFOCOM WKSHPS Hoboken, NJ: IEEE pp. 1-2., (10.1109/INFOCOMWKSHPS57453.2023.10225861)
- Hulayyil, S. and Li, S. 2023. Ripple20 vulnerabilities detection using featureless deep learning model. Presented at: TrustCom 2023 : The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 1-3 November 2023.
- Andriotis, P., Li, S., Spyridopoulos, T. and Stringhini, G. 2017. A comparative study of android users’ privacy preferences under the runtime permission model. Presented at: International Conference on Human Aspects of Information Security, Privacy, and Trust, Vancouver, BC, Canada, 9-14 July 2017, Vol. 10292. Lecture Notes in Computer Science pp. 604-622., (10.1007/978-3-319-58460-7_42)
- Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R. and Russell, G. 2015. Real-time monitoring of privacy abuses and intrusion detection in android system. Presented at: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, Los Angeles, CA, US, 2nd-7th August 2015Human Aspects of Information Security, Privacy, and Trust, Vol. 9190. Lecture Notes in Computer Science Springer Verlag pp. 379-390., (10.1007/978-3-319-20376-8_34)
- Spyridopoulos, T., Maraslis, K., Tryfonas, T., Oikonomou, G. and Li, S. 2014. Managing cyber security risks in industrial control systems with game theory and viable system modelling. Presented at: 9th International Conference on System of Systems Engineering, Glenelg, Australia, 9th-13th June 20142014 9th International Conference on System of Systems Engineering (SOSE). IEEE pp. 266-271., (10.1109/SYSOSE.2014.6892499)