Sign in
Li Lu
ORCID
Publication Activity (10 Years)
Years Active: 2016-2024
Publications (10 Years): 41
Top Topics
Speaker Recognition
User Authentication
Acoustic Signal
Lip Reading
Top Venues
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
INFOCOM
IEEE Trans. Mob. Comput.
ICC
</>
Publications
</>
Meng Chen
,
Li Lu
,
Jiadi Yu
,
Zhongjie Ba
,
Feng Lin
,
Kui Ren
AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Ming Gao
,
Yike Chen
,
Yimin Li
,
Lingfeng Zhang
,
Jianwei Liu
,
Li Lu
,
Feng Lin
,
Jinsong Han
,
Kui Ren
A Resilience Evaluation Framework on Ultrasonic Microphone Jammers.
IEEE Trans. Mob. Comput.
23 (2) (2024)
Peng Cheng
,
Yuexin Wu
,
Yuan Hong
,
Zhongjie Ba
,
Feng Lin
,
Li Lu
,
Kui Ren
UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Yijie Shen
,
Feng Lin
,
Chao Wang
,
Tiantian Liu
,
Zhongjie Ba
,
Li Lu
,
Wenyao Xu
,
Kui Ren
MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals Learning.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Junhao Wang
,
Li Lu
,
Zhongjie Ba
,
Feng Lin
,
Kui Ren
Shift to Your Device: Data Augmentation for Device-Independent Speaker Verification Anti-Spoofing.
ICASSP
(2023)
Hao Kong
,
Li Lu
,
Jiadi Yu
,
Yingying Chen
,
Xiangyu Xu
,
Feng Lyu
Toward Multi-User Authentication Using WiFi Signals.
IEEE/ACM Trans. Netw.
31 (5) (2023)
Meng Chen
,
Li Lu
,
Junhao Wang
,
Jiadi Yu
,
Yingying Chen
,
Zhibo Wang
,
Zhongjie Ba
,
Feng Lin
,
Kui Ren
VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
7 (2) (2023)
Peng Huang
,
Yao Wei
,
Peng Cheng
,
Zhongjie Ba
,
Li Lu
,
Feng Lin
,
Fan Zhang
,
Kui Ren
InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise.
NDSS
(2023)
Tiantian Liu
,
Feng Lin
,
Zhangsen Wang
,
Chao Wang
,
Zhongjie Ba
,
Li Lu
,
Wenyao Xu
,
Kui Ren
MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.
SP
(2023)
Lei Wang
,
Meng Chen
,
Li Lu
,
Zhongjie Ba
,
Feng Lin
,
Kui Ren
VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
7 (1) (2023)
Zhongjie Ba
,
Qing Wen
,
Peng Cheng
,
Yuwei Wang
,
Feng Lin
,
Li Lu
,
Zhenguang Liu
Transferring Audio Deepfake Detection Capability across Languages.
WWW
(2023)
Li Lu
,
Zhongjie Ba
,
Feng Lin
,
Jinsong Han
,
Kui Ren
ActListener: Imperceptible Activity Surveillance by Pervasive Wireless Infrastructures.
ICDCS
(2022)
Hao Kong
,
Li Lu
,
Jiadi Yu
,
Yanmin Zhu
,
Feilong Tang
,
Yingying Chen
,
Linghe Kong
,
Feng Lyu
Push the Limit of WiFi-based User Authentication towards Undefined Gestures.
INFOCOM
(2022)
Chao Wang
,
Feng Lin
,
Tiantian Liu
,
Ziwei Liu
,
Yijie Shen
,
Zhongjie Ba
,
Li Lu
,
Wenyao Xu
,
Kui Ren
mmPhone: Acoustic Eavesdropping on Loudspeakers via mmWave-characterized Piezoelectric Effect.
INFOCOM
(2022)
Ziwei Liu
,
Feng Lin
,
Chao Wang
,
Yijie Shen
,
Zhongjie Ba
,
Li Lu
,
Wenyao Xu
,
Kui Ren
CamRadar: Hidden Camera Detection Leveraging Amplitude-modulated Sensor Images Embedded in Electromagnetic Emanations.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
6 (4) (2022)
Meng Chen
,
Li Lu
,
Jiadi Yu
,
Yingying Chen
,
Zhongjie Ba
,
Feng Lin
,
Kui Ren
A non-intrusive and adaptive speaker de-identification scheme using adversarial examples.
MobiCom
(2022)
Meng Chen
,
Li Lu
,
Jiadi Yu
,
Yingying Chen
,
Zhongjie Ba
,
Feng Lin
,
Kui Ren
Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples.
CoRR
(2022)
Meng Chen
,
Li Lu
,
Zhongjie Ba
,
Kui Ren
PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition.
INFOCOM
(2022)
Qianniu Chen
,
Meng Chen
,
Li Lu
,
Jiadi Yu
,
Yingying Chen
,
Zhibo Wang
,
Zhongjie Ba
,
Feng Lin
,
Kui Ren
Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain.
SenSys
(2022)
Li Lu
,
Jian Liu
,
Jiadi Yu
,
Yingying Chen
,
Yanmin Zhu
,
Linghe Kong
,
Minglu Li
Enable Traditional Laptops with Virtual Writing Capability Leveraging Acoustic Signals.
Comput. J.
64 (12) (2021)
Jiadi Yu
,
Li Lu
,
Yingying Chen
,
Yanmin Zhu
,
Linghe Kong
An Indirect Eavesdropping Attack of Keystrokes on Touch Screen through Acoustic Sensing.
IEEE Trans. Mob. Comput.
20 (2) (2021)
Hao Kong
,
Li Lu
,
Jiadi Yu
,
Yingying Chen
,
Xiangyu Xu
,
Feilong Tang
,
Yi-Chao Chen
MultiAuth: Enable Multi-User Authentication with Single Commodity WiFi Device.
MobiHoc
(2021)
Hao Kong
,
Li Lu
,
Jiadi Yu
,
Yingying Chen
,
Feilong Tang
Continuous Authentication Through Finger Gesture Interaction for Smart Homes Using WiFi.
IEEE Trans. Mob. Comput.
20 (11) (2021)
Liu Liu
,
Hanlin Yu
,
Zhongjie Ba
,
Li Lu
,
Feng Lin
,
Kui Ren
PassFace: Enabling Practical Anti-Spoofing Facial Recognition with Camera Fingerprinting.
ICC
(2021)
Yang Bai
,
Li Lu
,
Jerry Cheng
,
Jian Liu
,
Yingying Chen
,
Jiadi Yu
Acoustic-based sensing and applications: A survey.
Comput. Networks
181 (2020)
Li Lu
,
Jiadi Yu
,
Yingying Chen
,
Yan Wang
VocalLock: Sensing Vocal Tract for Passphrase-Independent User Authentication Leveraging Acoustic Signals on Smartphones.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
4 (2) (2020)
Yang Bai
,
Jian Liu
,
Li Lu
,
Yilin Yang
,
Yingying Chen
,
Jiadi Yu
BatComm: enabling inaudible acoustic communication with high-throughput for mobile devices.
SenSys
(2020)
Yang Bai
,
Jian Liu
,
Yingying Chen
,
Li Lu
,
Jiadi Yu
Poster: Inaudible High-throughput Communication Through Acoustic Signals.
MobiCom
(2019)
Qiang Wu
,
Jiadi Yu
,
Li Lu
,
Shiyou Qian
,
Guangtao Xue
Dynamically Adjusting Scale of a Kubernetes Cluster under QoS Guarantee.
ICPADS
(2019)
Li Lu
,
Jiadi Yu
,
Yingying Chen
,
Yanmin Zhu
,
Minglu Li
,
Xiangyu Xu
I3: Sensing Scrolling Human-Computer Interactions for Intelligent Interest Inference on Smartphones.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
3 (3) (2019)
Li Lu
,
Jiadi Yu
,
Yingying Chen
,
Yanmin Zhu
,
Xiangyu Xu
,
Guangtao Xue
,
Minglu Li
KeyListener: Inferring Keystrokes on QWERTY Keyboard of Touch Screen through Acoustic Signals.
INFOCOM
(2019)
Hao Kong
,
Li Lu
,
Jiadi Yu
,
Yingying Chen
,
Linghe Kong
,
Minglu Li
FingerPass: Finger Gesture-based Continuous User Authentication for Smart Homes Using Commodity WiFi.
MobiHoc
(2019)
Hua Xue
,
Jiadi Yu
,
Yanmin Zhu
,
Li Lu
,
Shiyou Qian
,
Minglu Li
WiZoom: Accurate Multipath Profiling using Commodity WiFi Devices with Limited Bandwidth.
SECON
(2019)
Yanhua Cao
,
Li Lu
,
Jiadi Yu
,
Shiyou Qian
,
Yanmin Zhu
,
Minglu Li
Online cost-rejection rate scheduling for resource requests in hybrid clouds.
Parallel Comput.
81 (2019)
Li Lu
,
Jiadi Yu
,
Yingying Chen
,
Hongbo Liu
,
Yanmin Zhu
,
Linghe Kong
,
Minglu Li
Lip Reading-Based User Authentication Through Acoustic Sensing on Smartphones.
IEEE/ACM Trans. Netw.
27 (1) (2019)
Li Lu
,
Jiadi Yu
,
Yanmin Zhu
,
Minglu Li
A Double Auction Mechanism to Bridge Users' Task Requirements and Providers' Resources in Two-Sided Cloud Markets.
IEEE Trans. Parallel Distributed Syst.
29 (4) (2018)
Li Lu
,
Jian Liu
,
Jiadi Yu
,
Yingying Chen
,
Yanmin Zhu
,
Xiangyu Xu
,
Minglu Li
VPad: Virtual Writing Tablet for Laptops Leveraging Acoustic Signals.
ICPADS
(2018)
Li Lu
,
Jiadi Yu
,
Yingying Chen
,
Hongbo Liu
,
Yanmin Zhu
,
Yunfei Liu
,
Minglu Li
LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals.
INFOCOM
(2018)
Yanhua Cao
,
Li Lu
,
Jiadi Yu
,
Shiyou Qian
,
Yanmin Zhu
,
Minglu Li
,
Jian Cao
,
Zhong Wang
,
Juan Li
,
Guangtao Xue
Online Cost-Aware Service Requests Scheduling in Hybrid Clouds for Cloud Bursting.
WISE (1)
(2017)
Li Lu
,
Jiadi Yu
,
Yanmin Zhu
,
Guangtao Xue
,
Shiyou Qian
,
Minglu Li
Cost-efficient VM configuration algorithm in the cloud using mix scaling strategy.
ICC
(2017)
Ahmad Ali
,
Li Lu
,
Yanmin Zhu
,
Jiadi Yu
An Energy Efficient Algorithm for Virtual Machine Allocation in Cloud Datacenters.
ACA
(2016)