Alert button
Picture for Shujun Li

Shujun Li

Alert button

University of Kent

Deepfake: Definitions, Performance Metrics and Standards, Datasets and Benchmarks, and a Meta-Review

Add code
Bookmark button
Alert button
Aug 21, 2022
Enes Altuncu, Virginia N. L. Franqueira, Shujun Li

Figure 1 for Deepfake: Definitions, Performance Metrics and Standards, Datasets and Benchmarks, and a Meta-Review
Figure 2 for Deepfake: Definitions, Performance Metrics and Standards, Datasets and Benchmarks, and a Meta-Review
Figure 3 for Deepfake: Definitions, Performance Metrics and Standards, Datasets and Benchmarks, and a Meta-Review
Figure 4 for Deepfake: Definitions, Performance Metrics and Standards, Datasets and Benchmarks, and a Meta-Review
Viaarxiv icon

A Comprehensive Survey of Natural Language Generation Advances from the Perspective of Digital Deception

Add code
Bookmark button
Alert button
Aug 11, 2022
Keenan Jones, Enes Altuncu, Virginia N. L. Franqueira, Yichao Wang, Shujun Li

Figure 1 for A Comprehensive Survey of Natural Language Generation Advances from the Perspective of Digital Deception
Figure 2 for A Comprehensive Survey of Natural Language Generation Advances from the Perspective of Digital Deception
Figure 3 for A Comprehensive Survey of Natural Language Generation Advances from the Perspective of Digital Deception
Figure 4 for A Comprehensive Survey of Natural Language Generation Advances from the Perspective of Digital Deception
Viaarxiv icon

Detection of Poisoning Attacks with Anomaly Detection in Federated Learning for Healthcare Applications: A Machine Learning Approach

Add code
Bookmark button
Alert button
Jul 18, 2022
Ali Raza, Shujun Li, Kim-Phuc Tran, Ludovic Koehl

Figure 1 for Detection of Poisoning Attacks with Anomaly Detection in Federated Learning for Healthcare Applications: A Machine Learning Approach
Figure 2 for Detection of Poisoning Attacks with Anomaly Detection in Federated Learning for Healthcare Applications: A Machine Learning Approach
Figure 3 for Detection of Poisoning Attacks with Anomaly Detection in Federated Learning for Healthcare Applications: A Machine Learning Approach
Figure 4 for Detection of Poisoning Attacks with Anomaly Detection in Federated Learning for Healthcare Applications: A Machine Learning Approach
Viaarxiv icon

Perspectives of Non-Expert Users on Cyber Security and Privacy: An Analysis of Online Discussions on Twitter

Add code
Bookmark button
Alert button
Jun 05, 2022
Nandita Pattnaik, Shujun Li, Jason R. C. Nurse

Figure 1 for Perspectives of Non-Expert Users on Cyber Security and Privacy: An Analysis of Online Discussions on Twitter
Figure 2 for Perspectives of Non-Expert Users on Cyber Security and Privacy: An Analysis of Online Discussions on Twitter
Figure 3 for Perspectives of Non-Expert Users on Cyber Security and Privacy: An Analysis of Online Discussions on Twitter
Figure 4 for Perspectives of Non-Expert Users on Cyber Security and Privacy: An Analysis of Online Discussions on Twitter
Viaarxiv icon

Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators

Add code
Bookmark button
Alert button
Mar 18, 2022
Keenan Jones, Jason R. C. Nurse, Shujun Li

Figure 1 for Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators
Figure 2 for Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators
Figure 3 for Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators
Figure 4 for Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators
Viaarxiv icon

Lightweight Transformer in Federated Setting for Human Activity Recognition

Add code
Bookmark button
Alert button
Oct 01, 2021
Ali Raza, Kim Phuc Tran, Ludovic Koehl, Shujun Li, Xianyi Zeng, Khaled Benzaidi

Figure 1 for Lightweight Transformer in Federated Setting for Human Activity Recognition
Figure 2 for Lightweight Transformer in Federated Setting for Human Activity Recognition
Figure 3 for Lightweight Transformer in Federated Setting for Human Activity Recognition
Figure 4 for Lightweight Transformer in Federated Setting for Human Activity Recognition
Viaarxiv icon

Out of the Shadows: Analyzing Anonymous' Twitter Resurgence during the 2020 Black Lives Matter Protests

Add code
Bookmark button
Alert button
Jul 22, 2021
Keenan Jones, Jason R. C. Nurse, Shujun Li

Figure 1 for Out of the Shadows: Analyzing Anonymous' Twitter Resurgence during the 2020 Black Lives Matter Protests
Figure 2 for Out of the Shadows: Analyzing Anonymous' Twitter Resurgence during the 2020 Black Lives Matter Protests
Figure 3 for Out of the Shadows: Analyzing Anonymous' Twitter Resurgence during the 2020 Black Lives Matter Protests
Figure 4 for Out of the Shadows: Analyzing Anonymous' Twitter Resurgence during the 2020 Black Lives Matter Protests
Viaarxiv icon

Designing ECG Monitoring Healthcare System with Federated Transfer Learning and Explainable AI

Add code
Bookmark button
Alert button
May 26, 2021
Ali Raza, Kim Phuc Tran, Ludovic Koehl, Shujun Li

Figure 1 for Designing ECG Monitoring Healthcare System with Federated Transfer Learning and Explainable AI
Figure 2 for Designing ECG Monitoring Healthcare System with Federated Transfer Learning and Explainable AI
Figure 3 for Designing ECG Monitoring Healthcare System with Federated Transfer Learning and Explainable AI
Figure 4 for Designing ECG Monitoring Healthcare System with Federated Transfer Learning and Explainable AI
Viaarxiv icon

The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter

Add code
Bookmark button
Alert button
May 07, 2021
Keenan Jones, Jason R. C. Nurse, Shujun Li

Figure 1 for The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter
Figure 2 for The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter
Figure 3 for The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter
Figure 4 for The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter
Viaarxiv icon

Behind the Mask: A Computational Study of Anonymous' Presence on Twitter

Add code
Bookmark button
Alert button
Jun 15, 2020
Keenan Jones, Jason R. C. Nurse, Shujun Li

Figure 1 for Behind the Mask: A Computational Study of Anonymous' Presence on Twitter
Figure 2 for Behind the Mask: A Computational Study of Anonymous' Presence on Twitter
Figure 3 for Behind the Mask: A Computational Study of Anonymous' Presence on Twitter
Figure 4 for Behind the Mask: A Computational Study of Anonymous' Presence on Twitter
Viaarxiv icon