2009 |
38 | EE | Shujun Li,
Guanrong Chen,
Albert Cheung,
Kwok-Tung Lo,
Mohan S. Kankanhalli:
On the Security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables.
PSIVT 2009: 898-909 |
2008 |
37 | EE | Shujun Li,
Zhenhai Liu:
A new trust region filter algorithm.
Applied Mathematics and Computation 204(1): 485-489 (2008) |
36 | EE | Shujun Li,
Chengqing Li,
Kwok-Tung Lo,
Guanrong Chen:
Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion.
IEEE Trans. Circuits Syst. Video Techn. 18(3): 338-349 (2008) |
35 | EE | Shujun Li,
Chengqing Li,
Guanrong Chen,
Kwok-Tung Lo:
Cryptanalysis of the RCES/RSES image encryption scheme.
Journal of Systems and Software 81(7): 1130-1143 (2008) |
2007 |
34 | EE | Shujun Li,
Gonzalo Álvarez,
Zhong Li,
Wolfgang A. Halang:
Analog Chaos-based Secure Communications and Cryptanalysis: A Brief Survey
CoRR abs/0710.5455: (2007) |
33 | EE | David Arroyo,
Chengqing Li,
Shujun Li,
Gonzalo Álvarez,
Wolfgang A. Halang:
Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm
CoRR abs/0710.5465: (2007) |
32 | EE | David Arroyo,
Chengqing Li,
Shujun Li,
Gonzalo Álvarez:
Cryptanalysis of a computer cryptography scheme based on a filter bank
CoRR abs/0710.5471: (2007) |
31 | EE | Chengqing Li,
Shujun Li,
Guanrong Chen,
Wolfgang A. Halang:
Cryptanalysis of an Image Encryption Scheme Based on a Compound Chaotic Sequence
CoRR abs/0712.3964: (2007) |
30 | EE | Shujun Li,
Guanrong Chen,
Albert Cheung,
Bharat Bhargava,
Kwok-Tung Lo:
On the Design of Perceptual MPEG-Video Encryption Algorithms.
IEEE Trans. Circuits Syst. Video Techn. 17(2): 214-223 (2007) |
29 | EE | Shujun Li,
Kwok-Tung Lo:
Security problems with improper implementations of improved FEA-M.
Journal of Systems and Software 80(5): 791-794 (2007) |
2006 |
28 | EE | Shujun Li,
Elise de Doncker,
Karlis Kaugars,
Haisen S. Li:
A Fast Integration Method and Its Application in a Medical Physics Problem.
ICCSA (5) 2006: 789-797 |
27 | EE | Shujun Li,
Chengqing Li,
Kwok-Tung Lo,
Guanrong Chen:
Cryptanalysis of an Encryption Scheme Based on Blind Source Separation
CoRR abs/cs/0608024: (2006) |
26 | EE | Chengqing Li,
Shujun Li,
Gonzalo Álvarez,
Guanrong Chen,
Kwok-Tung Lo:
Cryptanalysis of a chaotic block cipher with external key and its improved version
CoRR abs/nlin/0608020: (2006) |
25 | EE | Shujun Li,
Guanrong Chen,
Gonzalo Álvarez:
Return-Map Cryptanalysis Revisited.
I. J. Bifurcation and Chaos 16(5): 1557-1568 (2006) |
24 | EE | Gonzalo Álvarez,
Shujun Li:
Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems.
I. J. Bifurcation and Chaos 16(8): 2129-2151 (2006) |
23 | EE | Shujun Li,
Karlis Kaugars,
Elise de Doncker:
Distributed Adaptive Multivariate Function Visualization.
International Journal of Computational Intelligence and Applications 6(2): 273-288 (2006) |
22 | EE | Chengqing Li,
Shujun Li,
Der-Chyuan Lou,
Dan Zhang:
Erratum to "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)" [The Journal of Systems and Software 79 (2006) 253-258].
Journal of Systems and Software 79(12): 1789 (2006) |
21 | EE | Chengqing Li,
Shujun Li,
Der-Chyuan Lou,
Dan Zhang:
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA).
Journal of Systems and Software 79(2): 253-258 (2006) |
2005 |
20 | EE | Chengqing Li,
Xinxiao Li,
Shujun Li,
Guanrong Chen:
Cryptanalysis of a multistage encryption system.
ISCAS (2) 2005: 880-883 |
19 | EE | Chengqing Li,
Shujun Li,
Dan Zhang,
Guanrong Chen:
Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher.
ISNN (2) 2005: 630-636 |
18 | EE | Shujun Li,
Elise de Doncker,
Karlis Kaugars:
On Iterated Numerical Integration.
International Conference on Computational Science (1) 2005: 123-130 |
17 | EE | Elise de Doncker,
Shujun Li,
Yoshimitsu Shimizu,
Junpei Fujimoto,
Fukuko Yuasa:
Regularization and Extrapolation Methods for Infrared Divergent Loop Integrals.
International Conference on Computational Science (1) 2005: 165-171 |
16 | EE | Chengqing Li,
Shujun Li,
Der-Chyuan Lou,
Dan Zhang:
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)
CoRR abs/cs/0501013: (2005) |
15 | EE | Shujun Li,
Guanrong Chen,
Albert Cheung,
Bharat Bhargava,
Kwok-Tung Lo:
On the Design of Perceptual MPEG-Video Encryption Algorithms
CoRR abs/cs/0501014: (2005) |
14 | EE | Shujun Li,
Guanrong Chen,
Albert Cheung,
Kwok-Tung Lo:
Cryptanalysis of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables
CoRR abs/cs/0509035: (2005) |
13 | EE | Shujun Li,
Kwok-Tung Lo:
Security Problems with Improper Implementations of Improved FEA-M
CoRR abs/cs/0509036: (2005) |
12 | EE | Shujun Li:
Permutation Polynomials modulo m
CoRR abs/math/0509523: (2005) |
11 | EE | Shujun Li,
Guanrong Chen,
Gonzalo Álvarez:
Return-Map Cryptanalysis Revisited
CoRR abs/nlin/0501018: (2005) |
10 | EE | Shujun Li,
Guanrong Chen,
Xuanqin Mou:
On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps.
I. J. Bifurcation and Chaos 15(10): 3119-3151 (2005) |
2004 |
9 | EE | Chengqing Li,
Shujun Li,
Dan Zhang,
Guanrong Chen:
Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme.
PCM (3) 2004: 418-425 |
8 | EE | Chengqing Li,
Shujun Li,
Xiaofeng Liao,
Guanrong Chen:
Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher
CoRR abs/cs/0412103: (2004) |
7 | EE | Shujun Li,
Guanrong Chen,
Kwok-Wo Wong,
Xuanqin Mou,
Cai Yuanlong:
Problems of Baptista's chaotic cryptosystems and countermeasures for enhancement of their overall performances
CoRR cs.CR/0402004: (2004) |
6 | EE | Shujun Li,
Guanrong Chen,
Xuanqin Mou:
On the Security of the Yi-Tan-Siew Chaos-Based Cipher
CoRR cs.CR/0402054: (2004) |
5 | EE | Gonzalo Álvarez,
Shujun Li:
Breaking network security based on synchronized chaos.
Computer Communications 27(16): 1679-1681 (2004) |
2003 |
4 | EE | Shujun Li,
Xuanqin Mou,
Boliya L. Yang,
Zhen Ji,
Jihong Zhang:
Problems with a Probabilistic Encryption Scheme Based on Chaotic Systems.
I. J. Bifurcation and Chaos 13(10): 3063-3077 (2003) |
2002 |
3 | | Shujun Li,
Xuan Zheng:
On the security of an image encryption method.
ICIP (2) 2002: 925-928 |
2001 |
2 | EE | Shujun Li,
Li Qi,
Li Wenmin,
Xuanqin Mou,
Cai Yuanlong:
Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding.
IMA Int. Conf. 2001: 205-221 |
1 | EE | Shujun Li,
Xuanqin Mou,
Cai Yuanlong:
Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography.
INDOCRYPT 2001: 316-329 |