Li Lu

Orcid: 0000-0001-5230-3749

Affiliations:
  • Zhejiang University, School of Cyber Science and Technology, China
  • Shanghai Jiao Tong University, Department of Computer Science and Engineering, China (former)


According to our database1, Li Lu authored at least 46 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Resilience Evaluation Framework on Ultrasonic Microphone Jammers.
IEEE Trans. Mob. Comput., February, 2024

AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception.
IEEE Trans. Inf. Forensics Secur., 2024

MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals Learning.
IEEE Trans. Dependable Secur. Comput., 2024

UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations.
IEEE Trans. Dependable Secur. Comput., 2024

Phoneme-Based Proactive Anti-Eavesdropping with Controlled Recording Privilege.
CoRR, 2024

2023
Toward Multi-User Authentication Using WiFi Signals.
IEEE/ACM Trans. Netw., October, 2023

VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., March, 2023

VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2023

FLTracer: Accurate Poisoning Attack Provenance in Federated Learning.
CoRR, 2023

Transferring Audio Deepfake Detection Capability across Languages.
Proceedings of the ACM Web Conference 2023, 2023

MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

FingerFaker: Spoofing Attack on COTS Fingerprint Recognition Without Victim's Knowledge.
Proceedings of the 21st ACM Conference on Embedded Networked Sensor Systems, 2023

InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Shift to Your Device: Data Augmentation for Device-Independent Speaker Verification Anti-Spoofing.
Proceedings of the IEEE International Conference on Acoustics, 2023

FITS: Matching Camera Fingerprints Subject to Software Noise Pollution.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
CamRadar: Hidden Camera Detection Leveraging Amplitude-modulated Sensor Images Embedded in Electromagnetic Emanations.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples.
CoRR, 2022

Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

A non-intrusive and adaptive speaker de-identification scheme using adversarial examples.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

mmPhone: Acoustic Eavesdropping on Loudspeakers via mmWave-characterized Piezoelectric Effect.
Proceedings of the IEEE INFOCOM 2022, 2022

Push the Limit of WiFi-based User Authentication towards Undefined Gestures.
Proceedings of the IEEE INFOCOM 2022, 2022

PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition.
Proceedings of the IEEE INFOCOM 2022, 2022

Big Brother is Listening: An Evaluation Framework on Ultrasonic Microphone Jammers.
Proceedings of the IEEE INFOCOM 2022, 2022

ActListener: Imperceptible Activity Surveillance by Pervasive Wireless Infrastructures.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

2021
An Indirect Eavesdropping Attack of Keystrokes on Touch Screen through Acoustic Sensing.
IEEE Trans. Mob. Comput., 2021

Continuous Authentication Through Finger Gesture Interaction for Smart Homes Using WiFi.
IEEE Trans. Mob. Comput., 2021

Enable Traditional Laptops with Virtual Writing Capability Leveraging Acoustic Signals.
Comput. J., 2021

MultiAuth: Enable Multi-User Authentication with Single Commodity WiFi Device.
Proceedings of the MobiHoc '21: The Twenty-second International Symposium on Theory, 2021

PassFace: Enabling Practical Anti-Spoofing Facial Recognition with Camera Fingerprinting.
Proceedings of the ICC 2021, 2021

2020
VocalLock: Sensing Vocal Tract for Passphrase-Independent User Authentication Leveraging Acoustic Signals on Smartphones.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

Acoustic-based sensing and applications: A survey.
Comput. Networks, 2020

BatComm: enabling inaudible acoustic communication with high-throughput for mobile devices.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020

2019
Lip Reading-Based User Authentication Through Acoustic Sensing on Smartphones.
IEEE/ACM Trans. Netw., 2019

Online cost-rejection rate scheduling for resource requests in hybrid clouds.
Parallel Comput., 2019

I3: Sensing Scrolling Human-Computer Interactions for Intelligent Interest Inference on Smartphones.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

WiZoom: Accurate Multipath Profiling using Commodity WiFi Devices with Limited Bandwidth.
Proceedings of the 16th Annual IEEE International Conference on Sensing, 2019

FingerPass: Finger Gesture-based Continuous User Authentication for Smart Homes Using Commodity WiFi.
Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2019

Poster: Inaudible High-throughput Communication Through Acoustic Signals.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

KeyListener: Inferring Keystrokes on QWERTY Keyboard of Touch Screen through Acoustic Signals.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Dynamically Adjusting Scale of a Kubernetes Cluster under QoS Guarantee.
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019

2018
A Double Auction Mechanism to Bridge Users' Task Requirements and Providers' Resources in Two-Sided Cloud Markets.
IEEE Trans. Parallel Distributed Syst., 2018

LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

VPad: Virtual Writing Tablet for Laptops Leveraging Acoustic Signals.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

2017
Online Cost-Aware Service Requests Scheduling in Hybrid Clouds for Cloud Bursting.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Cost-efficient VM configuration algorithm in the cloud using mix scaling strategy.
Proceedings of the IEEE International Conference on Communications, 2017

2016
An Energy Efficient Algorithm for Virtual Machine Allocation in Cloud Datacenters.
Proceedings of the Advanced Computer Architecture - 11th Conference, 2016


  Loading...