default search action
Fudong Li 0001
Person information
- affiliation: Bournemouth University, Department of Computing and Informatics, UK
- affiliation (former): University of Portsmouth, UK
Other persons with the same name
- Fudong Li 0002 — Dalhousie University, Canada (and 1 more)
- Fudong Li 0003 — Yangzhou University, Yangzhou, China
- Fudong Li 0004 — Institute of Automation, Chinese Academy of Sciences, Beijing, China
- Fudong Li 0005 — Xi'an Jiaotong University, State Key Laboratory for Manufacturing Systems Engineering, China
- Fudong Li 0006 — Beijing Information Science and Technology University, School of Mechanical and Electrical Engineering, Beijing, China
- Fudong Li 0007 — Southwest University, College of Artificial Intelligence, Chongqing, China
- Fudong Li 0010 — University of Science and Technology of China, School of Life Sciences, Hefei, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Oliver J. Hall, Stavros Shiaeles, Fudong Li:
A Study of Ethereum's Transition from Proof-of-Work to Proof-of-Stake in Preventing Smart Contracts Criminal Activities. Network 4(1): 33-47 (2024) - [c27]Alexis Coca, Fudong Li, Stavros Shiaeles, Deha Wu, Fan Liu:
The Effect of Privacy Concerns, Interaction, Trust, Age, and Gender on Self-Disclosure Behaviours on Social Networking Sites. CSR 2024: 551-556 - 2023
- [c26]Alexander Khalil Daou, Fudong Li, Stavros Shiaeles:
A Cost-Efficient Threat Intelligence Platform Powered by Crowdsourced OSINT. CSR 2023: 48-53 - 2022
- [j11]Hind Alobaidi, Nathan L. Clarke, Fudong Li, Abdulrahman Alruban:
Real-world smartphone-based gait recognition. Comput. Secur. 113: 102557 (2022) - [i1]Abdulrahman Alruban, Hind Alobaidi, Nathan L. Clarke, Fudong Li:
Physical Activity Recognition by Utilising Smartphone Sensor Signals. CoRR abs/2201.08688 (2022) - 2021
- [c25]Matthew Swann, Joseph R. Rose, Gueltoum Bendiab, Stavros Shiaeles, Fudong Li:
Open Source and Commercial Capture The Flag Cyber Security Learning Platforms - A Case Study. CSR 2021: 198-205 - [c24]Max Clasen, Fudong Li, David M. Williams:
Friend or Foe: An Investigation into Recipient Identification of SMS-Based Phishing. HAISA 2021: 148-163 - 2020
- [j10]Adéle da Veiga, Ruthea Vorster, Fudong Li, Nathan L. Clarke, Steven M. Furnell:
Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements. Inf. Comput. Secur. 28(3): 399-422 (2020)
2010 – 2019
- 2019
- [j9]Jose Oscar Fajardo, Fidel Liberal, Fudong Li, Nathan L. Clarke, Is-Haka Mkwawa:
End-to-middle-to-end solution for IMS media plane security. Electron. Commer. Res. 19(3): 719-746 (2019) - [c23]Abdulaziz Altamimi, Nathan L. Clarke, Steven Furnell, Fudong Li:
Multi-Platform Authorship Verification. CECC 2019: 13:1-13:7 - [c22]Aziz Alshehri, Nathan Luke Clarke, Fudong Li:
Privacy Enhancing Technology Awareness for Mobile Devices . HAISA 2019: 73-88 - [c21]Shahlaa Mashhadani, Nathan L. Clarke, Fudong Li:
Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion. ICISSP 2019: 438-448 - [c20]Abdulrahman Alruban, Hind Alobaidi, Nathan L. Clarke, Fudong Li:
Physical Activity Recognition by Utilising Smartphone Sensor Signals. ICPRAM 2019: 342-351 - 2018
- [j8]Hiba Al-Kawaz, Nathan L. Clarke, Steven Furnell, Fudong Li:
Facial-Forensic Analysis Tool. Digit. Investig. 26 Supplement: S136 (2018) - [j7]Manal Alohali, Nathan L. Clarke, Fudong Li, Steven Furnell:
Identifying and predicting the factors affecting end-users' risk-taking behavior. Inf. Comput. Secur. 26(3): 306-326 (2018) - [c19]Hussam Jasim Mohammed, Nathan L. Clarke, Fudong Li:
Evidence Identification in Heterogeneous Data Using Clustering. ARES 2018: 35 - [c18]Adéle da Veiga, Ruthea Vorster, Fudong Li, Nathan L. Clarke:
A Comparison of compliance with data privacy requirements in two countries. ECIS 2018: 86 - [c17]Burhan Al-Bayati, Nathan L. Clarke, Paul Dowland, Fudong Li:
Misuse Detection in a Simulated IaaS Environment. ETAA@ESORICS 2018: 103-115 - [c16]Neamah Al-Naffakh, Nathan L. Clarke, Fudong Li:
Continuous User Authentication Using Smartwatch Motion Sensor Data. IFIPTM 2018: 15-28 - [c15]Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell:
Biometrically Linking Document Leakage to the Individuals Responsible. TrustBus 2018: 135-149 - 2017
- [j6]Nathan L. Clarke, Fudong Li, Steven Furnell:
A novel privacy preserving user identification approach for network traffic. Comput. Secur. 70: 335-350 (2017) - [c14]Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell:
Insider Misuse Attribution using Biometrics. ARES 2017: 42:1-42:7 - [c13]Neamah Al-Naffakh, Nathan L. Clarke, Fudong Li, Paul S. Haskell-Dowland:
Unobtrusive Gait Recognition Using Smartwatches. BIOSIG 2017: 211-218 - [c12]Manal Alohali, Nathan L. Clarke, Fudong Li, Steven Furnell:
Identifying the Factors Affecting End-Users’ Risk-Taking Behavior. HAISA 2017: 126-144 - [c11]Nathan L. Clarke, Fudong Li, Abdulrahman Alruban, Steven Furnell:
Insider Misuse Identification using Transparent Biometrics. HICSS 2017: 1-10 - [c10]Timibloudi S. Enamamu, Nathan L. Clarke, Paul S. Haskell-Dowland, Fudong Li:
Transparent authentication: Utilising heart rate for user authentication. ICITST 2017: 283-289 - [c9]Shahlaa Mashhadani, Hiba Al-Kawaz, Nathan L. Clarke, Steven Furnell, Fudong Li:
A novel multimedia-forensic analysis tool (M-FAT). ICITST 2017: 388-395 - 2016
- [j5]M. Al Fahdi, Nathan L. Clarke, Fudong Li, Steven M. Furnell:
A suspect-oriented intelligent and automated computer forensic analysis. Digit. Investig. 18: 65-76 (2016) - [j4]Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell:
Leveraging Biometrics for Insider Misuse Identification. Int. J. Cyber Situational Aware. 1(1): 130-151 (2016) - [j3]Hussam Jasim Mohammed, Nathan Luke Clarke, Fudong Li:
An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data. J. Digit. Forensics Secur. Law 11(2): 137-152 (2016) - [c8]Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell:
Proactive biometric-enabled forensic imprinting. Cyber Security And Protection Of Digital Services 2016: 1-15 - [c7]Neamah Al-Naffakh, Nathan L. Clarke, Paul Dowland, Fudong Li:
Activity Recognition using wearable computing. ICITST 2016: 189-195 - [c6]Gaseb Alotibi, Nathan L. Clarke, Fudong Li, Steven Furnell:
User profiling from network traffic via novel application-level interactions. ICITST 2016: 279-285 - 2014
- [j2]Fudong Li, Nathan L. Clarke, Maria Papadaki, Paul Dowland:
Active authentication for mobile devices utilising behaviour profiling. Int. J. Inf. Sec. 13(3): 229-244 (2014) - [c5]Fudong Li, Ross Wheeler, Nathan L. Clarke:
An Evaluation of Behavioural Profiling on Mobile Devices. HCI (24) 2014: 330-339 - [c4]Jose Oscar Fajardo, Fidel Liberal, Fudong Li, Nathan L. Clarke, Is-Haka Mkwawa, Lingfen Sun:
Performance-driven evaluation for deploying IMS-based interoperability scenarios. ICC 2014: 3019-3024 - [c3]Fudong Li, Nathan L. Clarke, Steven Furnell, Is-Haka Mkwawa:
Performance evaluation of a Technology Independent Security Gateway for Next Generation Networks. WiMob 2014: 281-286 - 2013
- [c2]Fudong Li, Nathan L. Clarke, Steven Furnell:
A Technology Independent Security Gateway for Real-Time Multimedia Communication. NSS 2013: 14-25 - 2012
- [b1]Fudong Li:
Behaviour profiling for mobile devices. University of Plymouth, UK, 2012 - 2011
- [j1]Fudong Li, Nathan L. Clarke, Maria Papadaki, Paul Dowland:
Misuse Detection for Mobile Devices Using Behaviour Profiling. Int. J. Cyber Warf. Terror. 1(1): 41-53 (2011) - 2010
- [c1]Fudong Li, Nathan L. Clarke, Maria Papadaki, Paul Dowland:
Behaviour Profiling on Mobile Devices. EST 2010: 77-82
Coauthor Index
aka: Nathan Luke Clarke
aka: Steven M. Furnell
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 19:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint