Cardiff University | Prifysgol Caerdydd ORCA
Online Research @ Cardiff 
WelshClear Cookie - decide language by browser settings

Browse by Current Cardiff authors

Number of items: 14.

Li, Shancang and Wang, Xueyi 2024. Live power generation predictions via AI-driven resilient systems in smart microgrids. IEEE Transactions on Consumer Electronics 10.1109/TCE.2024.3371256
file

Hulayyil, Sarah, Li, Shancang and Xu, Lida 2023. Machine-learning-based vulnerability detection and classification in Internet of Things device security. Electronics 12 (18) , 3927. 10.3390/electronics12183927
file

Wang, Xueyi, Liu, Yifan and Li, Shancang 2023. Deep learning enabled keystroke eavesdropping attack over videoconferencing platforms. Presented at: IEEE INFOCOM 2023, New York, USA, 20 May 2023. IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops. INFOCOM WKSHPS Hoboken, NJ: IEEE, pp. 1-2. 10.1109/INFOCOMWKSHPS57453.2023.10225861
Item availability restricted.
file

Hulayyil, Sara and Li, Shancang 2023. Ripple20 vulnerabilities detection using featureless deep learning model. Presented at: TrustCom 2023 : The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 1-3 November 2023.
file

Liu, Yifan and Li, Shancang 2023. A review of hybrid cyber threats modelling and detection using artificial intelligence in IIoT. Computer Modeling in Engineering & Sciences
file

Liu, Yifan and Li, Shancang 2023. Hybrid cyber threats detection using explainable AI in Industrial IoT. Presented at: 2023 International Conference on Human-Centered Cognitive Systems (HCCS), 16 December 2023. IEEE HCCS 2023. New York: IEEE,
file

Li, Shancang and Liu, Yifan 2023. Human-centric artificial intelligence enabled digital images and videos forensic triage. Presented at: IEEE 2023 International Conference on Human-Centered Cognitive Systems (HCCS), 16 December 2023. HCCS 2023. IEEE,
file

Alshomrani, Shrooq and Li, Shancang 2022. PUFDCA: A Zero-trust based IoT device continuous authentication protocol. Wireless Communications and Mobile Computing 2022 , 6367579. 10.1155/2022/6367579
file

Li, Peisong, Wang, Xinheng, Huang, Kaizhu, Huang, Yi, Li, Shancang and Iqbal, Muddesar 2022. Multi-model running latency optimization in an edge computing paradigm. Sensors 22 (16) , e6097. 10.3390/s22166097
file

Althunayyan, Muzun, Saxena, Neetesh ORCID: https://orcid.org/0000-0002-6437-0807, Li, Shancang and Gope, P 2022. Evaluation of black-box web application security scanners in detecting injection vulnerabilities. Electronics 11 (13) , 2049. 10.3390/electronics11132049
file

Li, Shancang, Iqbal, Muddesar and Saxena, Neetesh ORCID: https://orcid.org/0000-0002-6437-0807 2022. Future industry internet of things with aero-trust security. Information Systems Frontiers 10.1007/s10796-021-10199-5
file

Andriotis, Panagiotis, Li, Shancang, Spyridopoulos, Theodoros ORCID: https://orcid.org/0000-0001-7575-9909 and Stringhini, Gianluca 2017. A comparative study of android users’ privacy preferences under the runtime permission model. Presented at: International Conference on Human Aspects of Information Security, Privacy, and Trust, Vancouver, BC, Canada, 9-14 July 2017. Human Aspects of Information Security, Privacy and Trust. Lecture Notes in Computer Science , vol.10292 pp. 604-622. 10.1007/978-3-319-58460-7_42

Li, Shancang, Chen, Junhua, Spyridopoulos, Theodoros ORCID: https://orcid.org/0000-0001-7575-9909, Andriotis, Panagiotis, Ludwiniak, Robert and Russell, Gordon 2015. Real-time monitoring of privacy abuses and intrusion detection in android system. Presented at: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, Los Angeles, CA, US, 2nd-7th August 2015. Human Aspects of Information Security, Privacy, and Trust. Lecture Notes in Computer Science , vol.9190 Springer Verlag, pp. 379-390. 10.1007/978-3-319-20376-8_34

Spyridopoulos, Theodoros ORCID: https://orcid.org/0000-0001-7575-9909, Maraslis, Konstantinos, Tryfonas, Theo, Oikonomou, George and Li, Shancang 2014. Managing cyber security risks in industrial control systems with game theory and viable system modelling. Presented at: 9th International Conference on System of Systems Engineering, Glenelg, Australia, 9th-13th June 2014. 2014 9th International Conference on System of Systems Engineering (SOSE). IEEE, pp. 266-271. 10.1109/SYSOSE.2014.6892499

This list was generated on Tue Apr 16 06:03:23 2024 BST.