Shancang Li
Teams and roles for Shancang Li
Senior Lecturer
Publication
2025
- Al Rashdi, A. and Li, S. 2025. OST: an AI enabled one-stop station platform for cyber security incident reporting. Presented at: EAI Broadnets 2024 Cardiff, UK 15 December 2024.
- Alnasser, M. and Li, S. 2025. Privacy-enhancing technologies in collaborative healthcare analysis. Cryptography 9 24. (10.3390/cryptography9020024)
- Bin Hulayyil, S. and Li, S. 2025. An IoT featureless vulnerability detection and mitigation platform. Electronics 14 (7) 1459. (10.3390/electronics14071459)
- Bin Hulayyil, S. , Li, S. and Saxena, N. 2025. Explainable AI-based intrusion detection in IoT systems. Internet of Things 31 101589. (10.1016/j.iot.2025.101589)
- Bin Hulayyil, S. , Li, S. and Saxena, N. 2025. IoT vulnerability detection using featureless LLM CyBert model. Presented at: IEEE International Conference on Trust, Security and Privacy in Computing and Communications Sanya, China 17-21 December 2024. Proceedings of the 23rd International Conference on Trust, Security and Privacy in Computing and Communications. IEEE. , pp.2474-2480. (10.1109/TrustCom63139.2024.00343)
- Ding, Y. and Li, S. 2025. BNN-based privacy-aware healthcare data analysis. Presented at: 2025 8th International Conference on Enterprise Systems (ES) Cardiff, United Kingdom 12-13 April 2025. IEEE(10.1109/es64449.2025.11136594)
- Gao, Z. , Li, S. and Iqbal, M. 2025. Enhancing privacy in Generative AI-enabled consumer electronics using homomorphic encryption and federated learning. IEEE Transactions on Consumer Electronics 71 (3), pp.9125-9131. (10.1109/tce.2025.3597357)
- Li, H. , Li, S. C. and Min, G. 2025. On-device learning based vulnerability detection in IoT environment. Journal of Industrial Information Integration 47 100900. (10.1016/j.jii.2025.100900)
- Li, S. et al. 2025. SG-SHIELD: Semantic guard with hybrid integrity encryption and layered defenses for semantic communication in 6G. IEEE Communications Standards Magazine (10.1109/mcomstd.2025.3610387)
- Li, S. et al. 2025. Privacy preservation in artificial intelligence-enabled healthcare analytics. Human-Centric Computing and Information Sciences 15 16. (10.22967/HCIS.2025.15.016)
- Li, S. and Liu, Y. 2025. Cyber fingerprinting for digital forensics (CyberFP). Presented at: 8th International Conference on Enterprise Systems (ES) Cardiff, United Kingdom 12-13 April 2025. IEEE(10.1109/es64449.2025.11136551)
- Li, S. and Zhao, S. 2025. Reliable and interpretable predictive maintenance in digital twin: A hybrid modeling approach powered by XAI. Journal of Management Analytics
- Li, S. , Zhao, S. and Ding, Y. 2025. FedPETv1: Edge-aware federated learning with differential privacy for distributed medical diagnostics. Presented at: The 31st Annual International Conference on Mobile Computing and Networking Hong Kong, China 4-8 November 2025. Proceedings of the Federated Learning and Edge AI for Privacy and Mobility. ACM. , pp.4-7. (10.1145/3737899.3768515)
- Liu, Y. and Li, S. 2025. Lightweight graphical visualization for potential threat identification in IoT. Presented at: 8th International Conference on Enterprise Systems (ES) Cardiff, United Kingdom 12-13 April 2025. IEEE(10.1109/es64449.2025.11136354)
- Liu, Y. and Li, S. 2025. RAGIIoT: Risk-aware attack graph generation for IIoT via automated CVE-tactic mapping. Presented at: IEEE/ACM International Symposium on Quality of Service Gold Coast, Australia 2–4 July 2025. 2025 IEEE/ACM 33rd International Symposium on Quality of Service (IWQoS). IEEE. (10.1109/IWQoS65803.2025.11199982)
- Liu, Y. , Li, S. and Bin Hulayyil, S. 2025. Intelligent detection of cyber attack patterns in industrial IoT using pretrained language models. Electronics 14 (20) 4094. (10.3390/electronics14204094)
- Wang, X. , Li, S. and Burnap, P. 2025. SHAP-RM : An XAI framework for evaluating machine learning reliability. Presented at: The 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2025) Gold Coast, Australia 19-22 October, 2025.
- Wang, X. , Li, S. and Iqbal, M. 2025. Artificial intelligence enabled microgrid power generation prediction. Open Computer Science 15 (1) 20240010. (10.1515/comp-2024-0010)
2024
- Li, S. , Iqbal, M. and Saxena, N. 2024. Future industry internet of things with aero-trust security. Information Systems Frontiers 26 , pp.1653-1666. (10.1007/s10796-021-10199-5)
- Liu, Y. et al. 2024. A review of hybrid cyber threats modelling and detection using artificial intelligence in IIoT. Computer Modeling in Engineering & Sciences 140 (2), pp.1233-1261. (10.32604/cmes.2024.046473)
- Rasool, S. et al., 2024. Security, privacy and trust of distributed ledgers technology. In: Al-Dulaimi, A. , Dobre, O. A. and Chih-lin, I. eds. Blockchains: Empowering Technologies and Industrial Applications. Wiley-IEEE Press. , pp.91-116. (10.1002/9781119781042.ch4)
- Sun, Y. et al., 2024. Securing electric vehicles against CAN bus replay attacks: A message authentication approach. IEEE Communications Standards Magazine 8 (4), pp.88-95. (10.1109/mcomstd.0001.2400042)
- Wang, X. , Li, S. and Iqbal, M. 2024. Live power generation predictions via AI-driven resilient systems in smart microgrids. IEEE Transactions on Consumer Electronics 70 (1), pp.3875-3884. (10.1109/TCE.2024.3371256)
- Wang, X. , Li, S. and Rahman, M. 2024. A comprehensive survey on enabling techniques in secure and resilient smart grids. Electronics 13 (11) 2177. (10.3390/electronics13112177)
2023
- Hulayyil, S. and Li, S. 2023. Ripple20 vulnerabilities detection using featureless deep learning model. Presented at: TrustCom 2023 : The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications 1-3 November 2023.
- Hulayyil, S. , Li, S. and Xu, L. 2023. Machine-learning-based vulnerability detection and classification in Internet of Things device security. Electronics 12 (18) 3927. (10.3390/electronics12183927)
- Li, S. and Liu, Y. 2023. Human-centric artificial intelligence enabled digital images and videos forensic triage. Presented at: IEEE 2023 International Conference on Human-Centered Cognitive Systems (HCCS) Cardiff, UK 16 December 2023. Proceedings of International Conference on Human-Centered Cognitive Systems. IEEE. , pp.1-5. (10.1109/HCCS59561.2023.10452651)
- Liu, Y. and Li, S. 2023. Hybrid cyber threats detection using explainable AI in Industrial IoT. Presented at: 2023 International Conference on Human-Centered Cognitive Systems (HCCS) 16 December 2023. Proceedings of International Conference on Human-Centered Cognitive Systems. New York: IEEE. , pp.1-6. (10.1109/HCCS59561.2023.10452621)
- Wang, X. , Liu, Y. and Li, S. 2023. Deep learning enabled keystroke eavesdropping attack over videoconferencing platforms. Presented at: IEEE INFOCOM 2023 New York, USA 20 May 2023. IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops. INFOCOM WKSHPS Hoboken, NJ: IEEE. , pp.1-2. (10.1109/INFOCOMWKSHPS57453.2023.10225861)
2022
- Alshomrani, S. and Li, S. 2022. PUFDCA: A Zero-trust based IoT device continuous authentication protocol. Wireless Communications and Mobile Computing 2022 6367579. (10.1155/2022/6367579)
- Althunayyan, M. et al. 2022. Evaluation of black-box web application security scanners in detecting injection vulnerabilities. Electronics 11 (13) 2049. (10.3390/electronics11132049)
- Li, P. et al. 2022. Multi-model running latency optimization in an edge computing paradigm. Sensors 22 (16) e6097. (10.3390/s22166097)
2017
- Andriotis, P. et al., 2017. A comparative study of android users’ privacy preferences under the runtime permission model. Presented at: International Conference on Human Aspects of Information Security, Privacy, and Trust Vancouver, BC, Canada 9-14 July 2017. Vol. 10292.Lecture Notes in Computer Science , pp.604-622. (10.1007/978-3-319-58460-7_42)
2015
- Li, S. et al. 2015. Real-time monitoring of privacy abuses and intrusion detection in android system. Presented at: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust Los Angeles, CA, US 2nd-7th August 2015. Human Aspects of Information Security, Privacy, and Trust. Vol. 9190.Lecture Notes in Computer Science Springer Verlag. , pp.379-390. (10.1007/978-3-319-20376-8_34)
2014
- Spyridopoulos, T. et al. 2014. Managing cyber security risks in industrial control systems with game theory and viable system modelling. Presented at: 9th International Conference on System of Systems Engineering Glenelg, Australia 9th-13th June 2014. 2014 9th International Conference on System of Systems Engineering (SOSE). IEEE. , pp.266-271. (10.1109/SYSOSE.2014.6892499)
Articles
- Alnasser, M. and Li, S. 2025. Privacy-enhancing technologies in collaborative healthcare analysis. Cryptography 9 24. (10.3390/cryptography9020024)
- Alshomrani, S. and Li, S. 2022. PUFDCA: A Zero-trust based IoT device continuous authentication protocol. Wireless Communications and Mobile Computing 2022 6367579. (10.1155/2022/6367579)
- Althunayyan, M. et al. 2022. Evaluation of black-box web application security scanners in detecting injection vulnerabilities. Electronics 11 (13) 2049. (10.3390/electronics11132049)
- Bin Hulayyil, S. and Li, S. 2025. An IoT featureless vulnerability detection and mitigation platform. Electronics 14 (7) 1459. (10.3390/electronics14071459)
- Bin Hulayyil, S. , Li, S. and Saxena, N. 2025. Explainable AI-based intrusion detection in IoT systems. Internet of Things 31 101589. (10.1016/j.iot.2025.101589)
- Gao, Z. , Li, S. and Iqbal, M. 2025. Enhancing privacy in Generative AI-enabled consumer electronics using homomorphic encryption and federated learning. IEEE Transactions on Consumer Electronics 71 (3), pp.9125-9131. (10.1109/tce.2025.3597357)
- Hulayyil, S. , Li, S. and Xu, L. 2023. Machine-learning-based vulnerability detection and classification in Internet of Things device security. Electronics 12 (18) 3927. (10.3390/electronics12183927)
- Li, H. , Li, S. C. and Min, G. 2025. On-device learning based vulnerability detection in IoT environment. Journal of Industrial Information Integration 47 100900. (10.1016/j.jii.2025.100900)
- Li, P. et al. 2022. Multi-model running latency optimization in an edge computing paradigm. Sensors 22 (16) e6097. (10.3390/s22166097)
- Li, S. et al. 2025. SG-SHIELD: Semantic guard with hybrid integrity encryption and layered defenses for semantic communication in 6G. IEEE Communications Standards Magazine (10.1109/mcomstd.2025.3610387)
- Li, S. et al. 2025. Privacy preservation in artificial intelligence-enabled healthcare analytics. Human-Centric Computing and Information Sciences 15 16. (10.22967/HCIS.2025.15.016)
- Li, S. , Iqbal, M. and Saxena, N. 2024. Future industry internet of things with aero-trust security. Information Systems Frontiers 26 , pp.1653-1666. (10.1007/s10796-021-10199-5)
- Li, S. and Zhao, S. 2025. Reliable and interpretable predictive maintenance in digital twin: A hybrid modeling approach powered by XAI. Journal of Management Analytics
- Liu, Y. , Li, S. and Bin Hulayyil, S. 2025. Intelligent detection of cyber attack patterns in industrial IoT using pretrained language models. Electronics 14 (20) 4094. (10.3390/electronics14204094)
- Liu, Y. et al. 2024. A review of hybrid cyber threats modelling and detection using artificial intelligence in IIoT. Computer Modeling in Engineering & Sciences 140 (2), pp.1233-1261. (10.32604/cmes.2024.046473)
- Sun, Y. et al., 2024. Securing electric vehicles against CAN bus replay attacks: A message authentication approach. IEEE Communications Standards Magazine 8 (4), pp.88-95. (10.1109/mcomstd.0001.2400042)
- Wang, X. , Li, S. and Iqbal, M. 2025. Artificial intelligence enabled microgrid power generation prediction. Open Computer Science 15 (1) 20240010. (10.1515/comp-2024-0010)
- Wang, X. , Li, S. and Iqbal, M. 2024. Live power generation predictions via AI-driven resilient systems in smart microgrids. IEEE Transactions on Consumer Electronics 70 (1), pp.3875-3884. (10.1109/TCE.2024.3371256)
- Wang, X. , Li, S. and Rahman, M. 2024. A comprehensive survey on enabling techniques in secure and resilient smart grids. Electronics 13 (11) 2177. (10.3390/electronics13112177)
Book sections
- Rasool, S. et al., 2024. Security, privacy and trust of distributed ledgers technology. In: Al-Dulaimi, A. , Dobre, O. A. and Chih-lin, I. eds. Blockchains: Empowering Technologies and Industrial Applications. Wiley-IEEE Press. , pp.91-116. (10.1002/9781119781042.ch4)
Conferences
- Al Rashdi, A. and Li, S. 2025. OST: an AI enabled one-stop station platform for cyber security incident reporting. Presented at: EAI Broadnets 2024 Cardiff, UK 15 December 2024.
- Andriotis, P. et al., 2017. A comparative study of android users’ privacy preferences under the runtime permission model. Presented at: International Conference on Human Aspects of Information Security, Privacy, and Trust Vancouver, BC, Canada 9-14 July 2017. Vol. 10292.Lecture Notes in Computer Science , pp.604-622. (10.1007/978-3-319-58460-7_42)
- Bin Hulayyil, S. , Li, S. and Saxena, N. 2025. IoT vulnerability detection using featureless LLM CyBert model. Presented at: IEEE International Conference on Trust, Security and Privacy in Computing and Communications Sanya, China 17-21 December 2024. Proceedings of the 23rd International Conference on Trust, Security and Privacy in Computing and Communications. IEEE. , pp.2474-2480. (10.1109/TrustCom63139.2024.00343)
- Ding, Y. and Li, S. 2025. BNN-based privacy-aware healthcare data analysis. Presented at: 2025 8th International Conference on Enterprise Systems (ES) Cardiff, United Kingdom 12-13 April 2025. IEEE(10.1109/es64449.2025.11136594)
- Hulayyil, S. and Li, S. 2023. Ripple20 vulnerabilities detection using featureless deep learning model. Presented at: TrustCom 2023 : The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications 1-3 November 2023.
- Li, S. et al. 2015. Real-time monitoring of privacy abuses and intrusion detection in android system. Presented at: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust Los Angeles, CA, US 2nd-7th August 2015. Human Aspects of Information Security, Privacy, and Trust. Vol. 9190.Lecture Notes in Computer Science Springer Verlag. , pp.379-390. (10.1007/978-3-319-20376-8_34)
- Li, S. and Liu, Y. 2025. Cyber fingerprinting for digital forensics (CyberFP). Presented at: 8th International Conference on Enterprise Systems (ES) Cardiff, United Kingdom 12-13 April 2025. IEEE(10.1109/es64449.2025.11136551)
- Li, S. and Liu, Y. 2023. Human-centric artificial intelligence enabled digital images and videos forensic triage. Presented at: IEEE 2023 International Conference on Human-Centered Cognitive Systems (HCCS) Cardiff, UK 16 December 2023. Proceedings of International Conference on Human-Centered Cognitive Systems. IEEE. , pp.1-5. (10.1109/HCCS59561.2023.10452651)
- Li, S. , Zhao, S. and Ding, Y. 2025. FedPETv1: Edge-aware federated learning with differential privacy for distributed medical diagnostics. Presented at: The 31st Annual International Conference on Mobile Computing and Networking Hong Kong, China 4-8 November 2025. Proceedings of the Federated Learning and Edge AI for Privacy and Mobility. ACM. , pp.4-7. (10.1145/3737899.3768515)
- Liu, Y. and Li, S. 2023. Hybrid cyber threats detection using explainable AI in Industrial IoT. Presented at: 2023 International Conference on Human-Centered Cognitive Systems (HCCS) 16 December 2023. Proceedings of International Conference on Human-Centered Cognitive Systems. New York: IEEE. , pp.1-6. (10.1109/HCCS59561.2023.10452621)
- Liu, Y. and Li, S. 2025. Lightweight graphical visualization for potential threat identification in IoT. Presented at: 8th International Conference on Enterprise Systems (ES) Cardiff, United Kingdom 12-13 April 2025. IEEE(10.1109/es64449.2025.11136354)
- Liu, Y. and Li, S. 2025. RAGIIoT: Risk-aware attack graph generation for IIoT via automated CVE-tactic mapping. Presented at: IEEE/ACM International Symposium on Quality of Service Gold Coast, Australia 2–4 July 2025. 2025 IEEE/ACM 33rd International Symposium on Quality of Service (IWQoS). IEEE. (10.1109/IWQoS65803.2025.11199982)
- Spyridopoulos, T. et al. 2014. Managing cyber security risks in industrial control systems with game theory and viable system modelling. Presented at: 9th International Conference on System of Systems Engineering Glenelg, Australia 9th-13th June 2014. 2014 9th International Conference on System of Systems Engineering (SOSE). IEEE. , pp.266-271. (10.1109/SYSOSE.2014.6892499)
- Wang, X. , Li, S. and Burnap, P. 2025. SHAP-RM : An XAI framework for evaluating machine learning reliability. Presented at: The 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2025) Gold Coast, Australia 19-22 October, 2025.
- Wang, X. , Liu, Y. and Li, S. 2023. Deep learning enabled keystroke eavesdropping attack over videoconferencing platforms. Presented at: IEEE INFOCOM 2023 New York, USA 20 May 2023. IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops. INFOCOM WKSHPS Hoboken, NJ: IEEE. , pp.1-2. (10.1109/INFOCOMWKSHPS57453.2023.10225861)