dblp.uni-trier.dewww.uni-trier.de

Shujun Li

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
38EEShujun Li, Guanrong Chen, Albert Cheung, Kwok-Tung Lo, Mohan S. Kankanhalli: On the Security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables. PSIVT 2009: 898-909
2008
37EEShujun Li, Zhenhai Liu: A new trust region filter algorithm. Applied Mathematics and Computation 204(1): 485-489 (2008)
36EEShujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Chen: Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion. IEEE Trans. Circuits Syst. Video Techn. 18(3): 338-349 (2008)
35EEShujun Li, Chengqing Li, Guanrong Chen, Kwok-Tung Lo: Cryptanalysis of the RCES/RSES image encryption scheme. Journal of Systems and Software 81(7): 1130-1143 (2008)
2007
34EEShujun Li, Gonzalo Álvarez, Zhong Li, Wolfgang A. Halang: Analog Chaos-based Secure Communications and Cryptanalysis: A Brief Survey CoRR abs/0710.5455: (2007)
33EEDavid Arroyo, Chengqing Li, Shujun Li, Gonzalo Álvarez, Wolfgang A. Halang: Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm CoRR abs/0710.5465: (2007)
32EEDavid Arroyo, Chengqing Li, Shujun Li, Gonzalo Álvarez: Cryptanalysis of a computer cryptography scheme based on a filter bank CoRR abs/0710.5471: (2007)
31EEChengqing Li, Shujun Li, Guanrong Chen, Wolfgang A. Halang: Cryptanalysis of an Image Encryption Scheme Based on a Compound Chaotic Sequence CoRR abs/0712.3964: (2007)
30EEShujun Li, Guanrong Chen, Albert Cheung, Bharat Bhargava, Kwok-Tung Lo: On the Design of Perceptual MPEG-Video Encryption Algorithms. IEEE Trans. Circuits Syst. Video Techn. 17(2): 214-223 (2007)
29EEShujun Li, Kwok-Tung Lo: Security problems with improper implementations of improved FEA-M. Journal of Systems and Software 80(5): 791-794 (2007)
2006
28EEShujun Li, Elise de Doncker, Karlis Kaugars, Haisen S. Li: A Fast Integration Method and Its Application in a Medical Physics Problem. ICCSA (5) 2006: 789-797
27EEShujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Chen: Cryptanalysis of an Encryption Scheme Based on Blind Source Separation CoRR abs/cs/0608024: (2006)
26EEChengqing Li, Shujun Li, Gonzalo Álvarez, Guanrong Chen, Kwok-Tung Lo: Cryptanalysis of a chaotic block cipher with external key and its improved version CoRR abs/nlin/0608020: (2006)
25EEShujun Li, Guanrong Chen, Gonzalo Álvarez: Return-Map Cryptanalysis Revisited. I. J. Bifurcation and Chaos 16(5): 1557-1568 (2006)
24EEGonzalo Álvarez, Shujun Li: Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems. I. J. Bifurcation and Chaos 16(8): 2129-2151 (2006)
23EEShujun Li, Karlis Kaugars, Elise de Doncker: Distributed Adaptive Multivariate Function Visualization. International Journal of Computational Intelligence and Applications 6(2): 273-288 (2006)
22EEChengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang: Erratum to "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)" [The Journal of Systems and Software 79 (2006) 253-258]. Journal of Systems and Software 79(12): 1789 (2006)
21EEChengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang: On the security of the Yen-Guo's domino signal encryption algorithm (DSEA). Journal of Systems and Software 79(2): 253-258 (2006)
2005
20EEChengqing Li, Xinxiao Li, Shujun Li, Guanrong Chen: Cryptanalysis of a multistage encryption system. ISCAS (2) 2005: 880-883
19EEChengqing Li, Shujun Li, Dan Zhang, Guanrong Chen: Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher. ISNN (2) 2005: 630-636
18EEShujun Li, Elise de Doncker, Karlis Kaugars: On Iterated Numerical Integration. International Conference on Computational Science (1) 2005: 123-130
17EEElise de Doncker, Shujun Li, Yoshimitsu Shimizu, Junpei Fujimoto, Fukuko Yuasa: Regularization and Extrapolation Methods for Infrared Divergent Loop Integrals. International Conference on Computational Science (1) 2005: 165-171
16EEChengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang: On the security of the Yen-Guo's domino signal encryption algorithm (DSEA) CoRR abs/cs/0501013: (2005)
15EEShujun Li, Guanrong Chen, Albert Cheung, Bharat Bhargava, Kwok-Tung Lo: On the Design of Perceptual MPEG-Video Encryption Algorithms CoRR abs/cs/0501014: (2005)
14EEShujun Li, Guanrong Chen, Albert Cheung, Kwok-Tung Lo: Cryptanalysis of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables CoRR abs/cs/0509035: (2005)
13EEShujun Li, Kwok-Tung Lo: Security Problems with Improper Implementations of Improved FEA-M CoRR abs/cs/0509036: (2005)
12EEShujun Li: Permutation Polynomials modulo m CoRR abs/math/0509523: (2005)
11EEShujun Li, Guanrong Chen, Gonzalo Álvarez: Return-Map Cryptanalysis Revisited CoRR abs/nlin/0501018: (2005)
10EEShujun Li, Guanrong Chen, Xuanqin Mou: On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps. I. J. Bifurcation and Chaos 15(10): 3119-3151 (2005)
2004
9EEChengqing Li, Shujun Li, Dan Zhang, Guanrong Chen: Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme. PCM (3) 2004: 418-425
8EEChengqing Li, Shujun Li, Xiaofeng Liao, Guanrong Chen: Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher CoRR abs/cs/0412103: (2004)
7EEShujun Li, Guanrong Chen, Kwok-Wo Wong, Xuanqin Mou, Cai Yuanlong: Problems of Baptista's chaotic cryptosystems and countermeasures for enhancement of their overall performances CoRR cs.CR/0402004: (2004)
6EEShujun Li, Guanrong Chen, Xuanqin Mou: On the Security of the Yi-Tan-Siew Chaos-Based Cipher CoRR cs.CR/0402054: (2004)
5EEGonzalo Álvarez, Shujun Li: Breaking network security based on synchronized chaos. Computer Communications 27(16): 1679-1681 (2004)
2003
4EEShujun Li, Xuanqin Mou, Boliya L. Yang, Zhen Ji, Jihong Zhang: Problems with a Probabilistic Encryption Scheme Based on Chaotic Systems. I. J. Bifurcation and Chaos 13(10): 3063-3077 (2003)
2002
3 Shujun Li, Xuan Zheng: On the security of an image encryption method. ICIP (2) 2002: 925-928
2001
2EEShujun Li, Li Qi, Li Wenmin, Xuanqin Mou, Cai Yuanlong: Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding. IMA Int. Conf. 2001: 205-221
1EEShujun Li, Xuanqin Mou, Cai Yuanlong: Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography. INDOCRYPT 2001: 316-329

Coauthor Index

1Gonzalo Álvarez [5] [11] [24] [25] [26] [32] [33] [34]
2David Arroyo [32] [33]
3Bharat Bhargava [15] [30]
4Guanrong Chen [6] [7] [8] [9] [10] [11] [14] [15] [19] [20] [25] [26] [27] [30] [31] [35] [36] [38]
5Albert Cheung [14] [15] [30] [38]
6Elise de Doncker [17] [18] [23] [28]
7Junpei Fujimoto [17]
8Wolfgang A. Halang [31] [33] [34]
9Zhen Ji [4]
10Mohan S. Kankanhalli [38]
11Karlis Kaugars [18] [23] [28]
12Chengqing Li [8] [9] [16] [19] [20] [21] [22] [26] [27] [31] [32] [33] [35] [36]
13Haisen S. Li [28]
14Xinxiao Li [20]
15Zhong Li [34]
16Xiaofeng Liao [8]
17Zhenhai Liu [37]
18Kwok-Tung Lo [13] [14] [15] [26] [27] [29] [30] [35] [36] [38]
19Der-Chyuan Lou [16] [21] [22]
20Xuanqin Mou [1] [2] [4] [6] [7] [10]
21Li Qi [2]
22Yoshimitsu Shimizu [17]
23Li Wenmin [2]
24Kwok-Wo Wong [7]
25Boliya L. Yang [4]
26Cai Yuanlong [1] [2] [7]
27Fukuko Yuasa [17]
28Dan Zhang [9] [16] [19] [21] [22]
29Jihong Zhang [4]
30Xuan Zheng [3]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)