default search action
Li Lu 0008
Person information
- affiliation: Zhejiang University, School of Cyber Science and Technology, China
- affiliation (former): Shanghai Jiao Tong University, Department of Computer Science and Engineering, China
Other persons with the same name
- Lu Li (aka: Li Lu) — disambiguation page
- Li Lu 0001 — University of Electronic Science and Technology of China, School of Computer Science and Engineering, Chengdu, China (and 2 more)
- Li Lu 0002 — Shanghai Jiaotong University, Institute of Image Processing and Pattern Recognition, China
- Li Lu 0003 — University of Southern California, Annenberg School of Communication, Los Angeles, CA, USA
- Li Lu 0004 — Qualcomm Technologies Inc., San Diego, CA, USA (and 1 more)
- Li Lu 0005 — RWTH Aachen University, Germany
- Li Lu 0006 — University of Illinois at Chicago, IL, USA
- Li Lu 0007 — Shanghai Jiaotong University, School of Electronic Information and Electrical Engineering, China
- Li Lu 0009 — University Essen, Germany
- Li Lu 0010 — Central South University, School of Physics and Electronics, Changsha, China
- Li Lu 0011 — Hefei University of Technology, School of Electrical and Automatic Engineering, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Peng Cheng, Yuexin Wu, Yuan Hong, Zhongjie Ba, Feng Lin, Li Lu, Kui Ren:
UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations. IEEE Trans. Dependable Secur. Comput. 21(1): 31-46 (2024) - [j19]Yijie Shen, Feng Lin, Chao Wang, Tiantian Liu, Zhongjie Ba, Li Lu, Wenyao Xu, Kui Ren:
MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals Learning. IEEE Trans. Dependable Secur. Comput. 21(1): 372-387 (2024) - [j18]Feng Lin, Chao Wang, Tiantian Liu, Ziwei Liu, Yijie Shen, Zhongjie Ba, Li Lu, Wenyao Xu, Kui Ren:
High-Quality Speech Recovery Through Soundproof Protections via mmWave Sensing. IEEE Trans. Dependable Secur. Comput. 21(4): 3065-3081 (2024) - [j17]Meng Chen, Li Lu, Jiadi Yu, Zhongjie Ba, Feng Lin, Kui Ren:
AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception. IEEE Trans. Inf. Forensics Secur. 19: 1948-1962 (2024) - [j16]Feng Lin, Hao Yan, Jin Li, Ziwei Liu, Li Lu, Zhongjie Ba, Kui Ren:
PhaDe: Practical Phantom Spoofing Attack Detection for Autonomous Vehicles. IEEE Trans. Inf. Forensics Secur. 19: 4199-4214 (2024) - [j15]Zhongjie Ba, Bin Gong, Yuwei Wang, Yuxuan Liu, Peng Cheng, Feng Lin, Li Lu, Kui Ren:
Indelible "Footprints" of Inaudible Command Injection. IEEE Trans. Inf. Forensics Secur. 19: 8485-8499 (2024) - [j14]Ming Gao, Yike Chen, Yimin Li, Lingfeng Zhang, Jianwei Liu, Li Lu, Feng Lin, Jinsong Han, Kui Ren:
A Resilience Evaluation Framework on Ultrasonic Microphone Jammers. IEEE Trans. Mob. Comput. 23(2): 1914-1929 (2024) - [c34]Zhongjie Ba, Qingyu Liu, Zhenguang Liu, Shuang Wu, Feng Lin, Li Lu, Kui Ren:
Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection. AAAI 2024: 719-728 - [c33]Xiangyu Xu, Yu Chen, Zhen Ling, Li Lu, Junzhou Luo, Xinwen Fu:
mmEar: Push the Limit of COTS mmWave Eavesdropping on Headphones. INFOCOM 2024: 351-360 - [c32]Qianniu Chen, Zhehan Gu, Li Lu, Xiangyu Xu, Zhongjie Ba, Feng Lin, Zhenguang Liu, Kui Ren:
Conan's Bow Tie: A Streaming Voice Conversion for Real-Time VTuber Livestreaming. IUI 2024: 35-50 - [c31]Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren:
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features. SP 2024: 1628-1645 - [c30]Tiantian Liu, Feng Lin, Zhongjie Ba, Li Lu, Zhan Qin, Kui Ren:
MicGuard: A Comprehensive Detection System against Out-of-band Injection Attacks for Different Level Microphone-based Devices. USENIX Security Symposium 2024 - [c29]Kun Wang, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren:
FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition. USENIX Security Symposium 2024 - [c28]Meng Chen, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren:
Devil in the Room: Triggering Audio Backdoors in the Physical World. USENIX Security Symposium 2024 - [i5]Peng Huang, Yao Wei, Peng Cheng, Zhongjie Ba, Li Lu, Feng Lin, Yang Wang, Kui Ren:
Phoneme-Based Proactive Anti-Eavesdropping with Controlled Recording Privilege. CoRR abs/2401.15704 (2024) - [i4]Zhongjie Ba, Qingyu Liu, Zhenguang Liu, Shuang Wu, Feng Lin, Li Lu, Kui Ren:
Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection. CoRR abs/2403.01786 (2024) - [i3]Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren:
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features. CoRR abs/2408.01808 (2024) - 2023
- [j13]Lei Wang, Meng Chen, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren:
VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(1): 32:1-32:22 (2023) - [j12]Meng Chen, Li Lu, Junhao Wang, Jiadi Yu, Yingying Chen, Zhibo Wang, Zhongjie Ba, Feng Lin, Kui Ren:
VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(2): 48:1-48:21 (2023) - [j11]Hao Kong, Li Lu, Jiadi Yu, Yingying Chen, Xiangyu Xu, Feng Lyu:
Toward Multi-User Authentication Using WiFi Signals. IEEE/ACM Trans. Netw. 31(5): 2117-2132 (2023) - [c27]Liu Liu, Xinwen Fu, Xiaodong Chen, Jianpeng Wang, Zhongjie Ba, Feng Lin, Li Lu, Kui Ren:
FITS: Matching Camera Fingerprints Subject to Software Noise Pollution. CCS 2023: 1660-1674 - [c26]Junhao Wang, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren:
Shift to Your Device: Data Augmentation for Device-Independent Speaker Verification Anti-Spoofing. ICASSP 2023: 1-5 - [c25]Qianniu Chen, Kang Fu, Li Lu, Meng Chen, Zhongjie Ba, Feng Lin, Kui Ren:
BypTalker: An Adaptive Adversarial Example Attack to Bypass Prefilter-enabled Speaker Recognition. MSN 2023: 496-503 - [c24]Peng Huang, Yao Wei, Peng Cheng, Zhongjie Ba, Li Lu, Feng Lin, Fan Zhang, Kui Ren:
InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise. NDSS 2023 - [c23]Yijie Shen, Zhe Ma, Feng Lin, Hao Yan, Zhongjie Ba, Li Lu, Wenyao Xu, Kui Ren:
FingerFaker: Spoofing Attack on COTS Fingerprint Recognition Without Victim's Knowledge. SenSys 2023: 167-180 - [c22]Tiantian Liu, Feng Lin, Zhangsen Wang, Chao Wang, Zhongjie Ba, Li Lu, Wenyao Xu, Kui Ren:
MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks. SP 2023: 3416-3431 - [c21]Zhongjie Ba, Qing Wen, Peng Cheng, Yuwei Wang, Feng Lin, Li Lu, Zhenguang Liu:
Transferring Audio Deepfake Detection Capability across Languages. WWW 2023: 2033-2044 - [i2]Xinyu Zhang, Qingyu Liu, Zhongjie Ba, Yuan Hong, Tianhang Zheng, Feng Lin, Li Lu, Kui Ren:
FLTracer: Accurate Poisoning Attack Provenance in Federated Learning. CoRR abs/2310.13424 (2023) - 2022
- [j10]Ziwei Liu, Feng Lin, Chao Wang, Yijie Shen, Zhongjie Ba, Li Lu, Wenyao Xu, Kui Ren:
CamRadar: Hidden Camera Detection Leveraging Amplitude-modulated Sensor Images Embedded in Electromagnetic Emanations. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(4): 173:1-173:25 (2022) - [c20]Li Lu, Zhongjie Ba, Feng Lin, Jinsong Han, Kui Ren:
ActListener: Imperceptible Activity Surveillance by Pervasive Wireless Infrastructures. ICDCS 2022: 776-786 - [c19]Hao Kong, Li Lu, Jiadi Yu, Yanmin Zhu, Feilong Tang, Yingying Chen, Linghe Kong, Feng Lyu:
Push the Limit of WiFi-based User Authentication towards Undefined Gestures. INFOCOM 2022: 410-419 - [c18]Chao Wang, Feng Lin, Tiantian Liu, Ziwei Liu, Yijie Shen, Zhongjie Ba, Li Lu, Wenyao Xu, Kui Ren:
mmPhone: Acoustic Eavesdropping on Loudspeakers via mmWave-characterized Piezoelectric Effect. INFOCOM 2022: 820-829 - [c17]Yike Chen, Ming Gao, Yimin Li, Lingfeng Zhang, Li Lu, Feng Lin, Jinsong Han, Kui Ren:
Big Brother is Listening: An Evaluation Framework on Ultrasonic Microphone Jammers. INFOCOM 2022: 1119-1128 - [c16]Meng Chen, Li Lu, Zhongjie Ba, Kui Ren:
PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition. INFOCOM 2022: 1419-1428 - [c15]Meng Chen, Li Lu, Jiadi Yu, Yingying Chen, Zhongjie Ba, Feng Lin, Kui Ren:
A non-intrusive and adaptive speaker de-identification scheme using adversarial examples. MobiCom 2022: 853-855 - [c14]Qianniu Chen, Meng Chen, Li Lu, Jiadi Yu, Yingying Chen, Zhibo Wang, Zhongjie Ba, Feng Lin, Kui Ren:
Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain. SenSys 2022: 710-724 - [i1]Meng Chen, Li Lu, Jiadi Yu, Yingying Chen, Zhongjie Ba, Feng Lin, Kui Ren:
Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples. CoRR abs/2211.05446 (2022) - 2021
- [j9]Li Lu, Jian Liu, Jiadi Yu, Yingying Chen, Yanmin Zhu, Linghe Kong, Minglu Li:
Enable Traditional Laptops with Virtual Writing Capability Leveraging Acoustic Signals. Comput. J. 64(12): 1814-1831 (2021) - [j8]Jiadi Yu, Li Lu, Yingying Chen, Yanmin Zhu, Linghe Kong:
An Indirect Eavesdropping Attack of Keystrokes on Touch Screen through Acoustic Sensing. IEEE Trans. Mob. Comput. 20(2): 337-351 (2021) - [j7]Hao Kong, Li Lu, Jiadi Yu, Yingying Chen, Feilong Tang:
Continuous Authentication Through Finger Gesture Interaction for Smart Homes Using WiFi. IEEE Trans. Mob. Comput. 20(11): 3148-3162 (2021) - [c13]Liu Liu, Hanlin Yu, Zhongjie Ba, Li Lu, Feng Lin, Kui Ren:
PassFace: Enabling Practical Anti-Spoofing Facial Recognition with Camera Fingerprinting. ICC 2021: 1-6 - [c12]Hao Kong, Li Lu, Jiadi Yu, Yingying Chen, Xiangyu Xu, Feilong Tang, Yi-Chao Chen:
MultiAuth: Enable Multi-User Authentication with Single Commodity WiFi Device. MobiHoc 2021: 31-40 - 2020
- [j6]Yang Bai, Li Lu, Jerry Cheng, Jian Liu, Yingying Chen, Jiadi Yu:
Acoustic-based sensing and applications: A survey. Comput. Networks 181: 107447 (2020) - [j5]Li Lu, Jiadi Yu, Yingying Chen, Yan Wang:
VocalLock: Sensing Vocal Tract for Passphrase-Independent User Authentication Leveraging Acoustic Signals on Smartphones. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4(2): 51:1-51:24 (2020) - [c11]Yang Bai, Jian Liu, Li Lu, Yilin Yang, Yingying Chen, Jiadi Yu:
BatComm: enabling inaudible acoustic communication with high-throughput for mobile devices. SenSys 2020: 205-217
2010 – 2019
- 2019
- [j4]Li Lu, Jiadi Yu, Yingying Chen, Yanmin Zhu, Minglu Li, Xiangyu Xu:
I3: Sensing Scrolling Human-Computer Interactions for Intelligent Interest Inference on Smartphones. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(3): 97:1-97:22 (2019) - [j3]Yanhua Cao, Li Lu, Jiadi Yu, Shiyou Qian, Yanmin Zhu, Minglu Li:
Online cost-rejection rate scheduling for resource requests in hybrid clouds. Parallel Comput. 81: 85-103 (2019) - [j2]Li Lu, Jiadi Yu, Yingying Chen, Hongbo Liu, Yanmin Zhu, Linghe Kong, Minglu Li:
Lip Reading-Based User Authentication Through Acoustic Sensing on Smartphones. IEEE/ACM Trans. Netw. 27(1): 447-460 (2019) - [c10]Qiang Wu, Jiadi Yu, Li Lu, Shiyou Qian, Guangtao Xue:
Dynamically Adjusting Scale of a Kubernetes Cluster under QoS Guarantee. ICPADS 2019: 193-200 - [c9]Li Lu, Jiadi Yu, Yingying Chen, Yanmin Zhu, Xiangyu Xu, Guangtao Xue, Minglu Li:
KeyListener: Inferring Keystrokes on QWERTY Keyboard of Touch Screen through Acoustic Signals. INFOCOM 2019: 775-783 - [c8]Yang Bai, Jian Liu, Yingying Chen, Li Lu, Jiadi Yu:
Poster: Inaudible High-throughput Communication Through Acoustic Signals. MobiCom 2019: 79:1-79:3 - [c7]Hao Kong, Li Lu, Jiadi Yu, Yingying Chen, Linghe Kong, Minglu Li:
FingerPass: Finger Gesture-based Continuous User Authentication for Smart Homes Using Commodity WiFi. MobiHoc 2019: 201-210 - [c6]Hua Xue, Jiadi Yu, Yanmin Zhu, Li Lu, Shiyou Qian, Minglu Li:
WiZoom: Accurate Multipath Profiling using Commodity WiFi Devices with Limited Bandwidth. SECON 2019: 1-9 - 2018
- [j1]Li Lu, Jiadi Yu, Yanmin Zhu, Minglu Li:
A Double Auction Mechanism to Bridge Users' Task Requirements and Providers' Resources in Two-Sided Cloud Markets. IEEE Trans. Parallel Distributed Syst. 29(4): 720-733 (2018) - [c5]Li Lu, Jian Liu, Jiadi Yu, Yingying Chen, Yanmin Zhu, Xiangyu Xu, Minglu Li:
VPad: Virtual Writing Tablet for Laptops Leveraging Acoustic Signals. ICPADS 2018: 244-251 - [c4]Li Lu, Jiadi Yu, Yingying Chen, Hongbo Liu, Yanmin Zhu, Yunfei Liu, Minglu Li:
LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals. INFOCOM 2018: 1466-1474 - 2017
- [c3]Li Lu, Jiadi Yu, Yanmin Zhu, Guangtao Xue, Shiyou Qian, Minglu Li:
Cost-efficient VM configuration algorithm in the cloud using mix scaling strategy. ICC 2017: 1-6 - [c2]Yanhua Cao, Li Lu, Jiadi Yu, Shiyou Qian, Yanmin Zhu, Minglu Li, Jian Cao, Zhong Wang, Juan Li, Guangtao Xue:
Online Cost-Aware Service Requests Scheduling in Hybrid Clouds for Cloud Bursting. WISE (1) 2017: 259-274 - 2016
- [c1]Ahmad Ali, Li Lu, Yanmin Zhu, Jiadi Yu:
An Energy Efficient Algorithm for Virtual Machine Allocation in Cloud Datacenters. ACA 2016: 61-72
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-11 17:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint