Li Lu

According to our database1, Li Lu authored at least 43 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
A Novel Deep Learning-Based Collaborative Filtering Model for Recommendation System.
IEEE Trans. Cybernetics, 2019

Sentinel: Breaking the Bottleneck of Energy Utilization Efficiency in RF-Powered Devices.
IEEE Internet of Things Journal, 2019

2018
Online Vehicle Front-Rear Distance Estimation With Urban Context-Aware Trajectories.
IEEE Trans. Vehicular Technology, 2018

R3: Reliable Over-the-Air Reprogramming on Computational RFIDs.
ACM Trans. Embedded Comput. Syst., 2018

Attention based collaborative filtering.
Neurocomputing, 2018

Bag of meta-words: A novel method to represent document for the sentiment classification.
Expert Syst. Appl., 2018

Variational Mode Decomposition-Based Heart Rate Estimation Using Wrist-Type Photoplethysmography During Physical Exercise.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

2017
ShakeIn: Secure User Authentication of Smartphones with Single-Handed Shakes.
IEEE Trans. Mob. Comput., 2017

An RFID Based Smartphone Proximity Absence Alert System.
IEEE Trans. Mob. Comput., 2017

Detecting Clocking Attack in Contactless Access Control Systems.
Proceedings of the Fifth International Conference on Advanced Cloud and Big Data, 2017

2016
A FMCW-Based Cross Layer RF Distance Bounding Scheme.
IEEE Trans. Wireless Communications, 2016

POST: Exploiting Dynamic Sociality for Mobile Advertising in Vehicular Networks.
IEEE Trans. Parallel Distrib. Syst., 2016

PURE: Blind Regression Modeling for Low Quality Data with Participatory Sensing.
IEEE Trans. Parallel Distrib. Syst., 2016

Secure and Private RFID-Enabled Third-Party Supply Chain Systems.
IEEE Trans. Computers, 2016

R2: Over-the-air reprogramming on computational RFIDs.
Proceedings of the 2016 IEEE International Conference on RFID, 2016

RUPS: Fixing Relative Distances among Urban Vehicles with Context-Aware Trajectories.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium, 2016

2015
TIGHT: A Cross-Layer RF Distance Bounding Realization for Passive Wireless Devices.
IEEE Trans. Wireless Communications, 2015

Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics.
IEEE Trans. Comput. Social Systems, 2015

From Interest to Location: Neighbor-Based Friend Recommendation in Social Media.
J. Comput. Sci. Technol., 2015

Vulnerability aware graphs for RFID protocol security benchmarking.
J. Comput. Syst. Sci., 2015

Improved perception-based spiking neuron learning rule for real-time user authentication.
Neurocomputing, 2015

Pworm: Passive and Real-Time Wormhole Detection Scheme for WSNs.
IJDSN, 2015

BEST: a bidirectional efficiency-privacy transferable authentication protocol for RFID-enabled supply chain.
IJAHUC, 2015

ACTION: Breaking the Privacy Barrier for RFID Systems.
Ad Hoc & Sensor Wireless Networks, 2015

WiGen: Breaking the Privacy and Security Barriers for Group Management in RFID Systems.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Wireless firmware execution control in computational RFID systems.
Proceedings of the 2015 IEEE International Conference on RFID, 2015

FastID: An undeceived router for real-time identification of WiFi terminals.
Proceedings of the 14th IFIP Networking Conference, 2015

2014
POST: Exploiting dynamic sociality for mobile advertising in vehicular networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

COLLECTOR: A secure RFID-enabled batch recall protocol.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Real-time and passive wormhole detection for wireless sensor networks.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

2013
Random Graph Based Benchmarking Methodology for RFID Security Protocols.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013

2012
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems.
IJDSN, 2012

Analysis on Token-Controlled Public Key Encryption.
Proceedings of the 8th International Conference on Mobile Ad-hoc and Sensor Networks, 2012

BEST: A Bidirectional Efficiency-Privacy Transferable Authentication Protocol for RFID-Enabled Supply Chain.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

2010
Refresh: Weak Privacy Model for RFID Systems.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
ACTION: Breaking the Privacy Barrier for RFID Systems.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

2008
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps.
IEEE Trans. Parallel Distrib. Syst., 2008

2007
Privacy-preserving authentication with low computational overhead for RFID systems.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Storage-Awareness: RFID Private Authentication based on Sparse Tree.
Proceedings of the Third International Workshop on Security, 2007

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2007), 2007

Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

2006
Pairing-Based Multi-Recipient Public Key Encryption.
Proceedings of the 2006 International Conference on Security & Management, 2006

2005
A Random Walk Based Anonymous Peer-to-Peer Protocol Design.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005


  Loading...