​
Login / Signup
Li Lu
ORCID
Publication Activity (10 Years)
Years Active: 2016-2024
Publications (10 Years): 52
Top Topics
Speaker Recognition
Lip Reading
User Authentication
Acoustic Signals
Top Venues
INFOCOM
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
IEEE Trans. Mob. Comput.
SenSys
</>
Publications
</>
Meng Chen
,
Li Lu
,
Jiadi Yu
,
Zhongjie Ba
,
Feng Lin
,
Kui Ren
AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Ming Gao
,
Yike Chen
,
Yimin Li
,
Lingfeng Zhang
,
Jianwei Liu
,
Li Lu
,
Feng Lin
,
Jinsong Han
,
Kui Ren
A Resilience Evaluation Framework on Ultrasonic Microphone Jammers.
IEEE Trans. Mob. Comput.
23 (2) (2024)
Qianniu Chen
,
Zhehan Gu
,
Li Lu
,
Xiangyu Xu
,
Zhongjie Ba
,
Feng Lin
,
Zhenguang Liu
,
Kui Ren
Conan's Bow Tie: A Streaming Voice Conversion for Real-Time VTuber Livestreaming.
IUI
(2024)
Xiangyu Xu
,
Yu Chen
,
Zhen Ling
,
Li Lu
,
Junzhou Luo
,
Xinwen Fu
mmEar: Push the Limit of COTS mmWave Eavesdropping on Headphones.
INFOCOM
(2024)
Peng Cheng
,
Yuexin Wu
,
Yuan Hong
,
Zhongjie Ba
,
Feng Lin
,
Li Lu
,
Kui Ren
UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Kun Wang
,
Xiangyu Xu
,
Li Lu
,
Zhongjie Ba
,
Feng Lin
,
Kui Ren
FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition.
USENIX Security Symposium
(2024)
Zhongjie Ba
,
Qingyu Liu
,
Zhenguang Liu
,
Shuang Wu
,
Feng Lin
,
Li Lu
,
Kui Ren
Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection.
AAAI
(2024)
Tiantian Liu
,
Feng Lin
,
Zhongjie Ba
,
Li Lu
,
Zhan Qin
,
Kui Ren
MicGuard: A Comprehensive Detection System against Out-of-band Injection Attacks for Different Level Microphone-based Devices.
USENIX Security Symposium
(2024)
Feng Lin
,
Hao Yan
,
Jin Li
,
Ziwei Liu
,
Li Lu
,
Zhongjie Ba
,
Kui Ren
PhaDe: Practical Phantom Spoofing Attack Detection for Autonomous Vehicles.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Yijie Shen
,
Feng Lin
,
Chao Wang
,
Tiantian Liu
,
Zhongjie Ba
,
Li Lu
,
Wenyao Xu
,
Kui Ren
MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals Learning.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Meng Chen
,
Xiangyu Xu
,
Li Lu
,
Zhongjie Ba
,
Feng Lin
,
Kui Ren
Devil in the Room: Triggering Audio Backdoors in the Physical World.
USENIX Security Symposium
(2024)
Zhongjie Ba
,
Qingyu Liu
,
Zhenguang Liu
,
Shuang Wu
,
Feng Lin
,
Li Lu
,
Kui Ren
Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection.
CoRR
(2024)
Feng Lin
,
Chao Wang
,
Tiantian Liu
,
Ziwei Liu
,
Yijie Shen
,
Zhongjie Ba
,
Li Lu
,
Wenyao Xu
,
Kui Ren
High-Quality Speech Recovery Through Soundproof Protections via mmWave Sensing.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Junhao Wang
,
Li Lu
,
Zhongjie Ba
,
Feng Lin
,
Kui Ren
Shift to Your Device: Data Augmentation for Device-Independent Speaker Verification Anti-Spoofing.
ICASSP
(2023)
Yijie Shen
,
Zhe Ma
,
Feng Lin
,
Hao Yan
,
Zhongjie Ba
,
Li Lu
,
Wenyao Xu
,
Kui Ren
FingerFaker: Spoofing Attack on COTS Fingerprint Recognition Without Victim's Knowledge.
SenSys
(2023)
Hao Kong
,
Li Lu
,
Jiadi Yu
,
Yingying Chen
,
Xiangyu Xu
,
Feng Lyu
Toward Multi-User Authentication Using WiFi Signals.
IEEE/ACM Trans. Netw.
31 (5) (2023)
Meng Chen
,
Li Lu
,
Junhao Wang
,
Jiadi Yu
,
Yingying Chen
,
Zhibo Wang
,
Zhongjie Ba
,
Feng Lin
,
Kui Ren
VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
7 (2) (2023)
Peng Huang
,
Yao Wei
,
Peng Cheng
,
Zhongjie Ba
,
Li Lu
,
Feng Lin
,
Fan Zhang
,
Kui Ren
InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise.
NDSS
(2023)
Tiantian Liu
,
Feng Lin
,
Zhangsen Wang
,
Chao Wang
,
Zhongjie Ba
,
Li Lu
,
Wenyao Xu
,
Kui Ren
MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.
SP
(2023)
Qianniu Chen
,
Kang Fu
,
Li Lu
,
Meng Chen
,
Zhongjie Ba
,
Feng Lin
,
Kui Ren
BypTalker: An Adaptive Adversarial Example Attack to Bypass Prefilter-enabled Speaker Recognition.
MSN
(2023)
Lei Wang
,
Meng Chen
,
Li Lu
,
Zhongjie Ba
,
Feng Lin
,
Kui Ren
VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
7 (1) (2023)
Zhongjie Ba
,
Qing Wen
,
Peng Cheng
,
Yuwei Wang
,
Feng Lin
,
Li Lu
,
Zhenguang Liu
Transferring Audio Deepfake Detection Capability across Languages.
WWW
(2023)
Li Lu
,
Zhongjie Ba
,
Feng Lin
,
Jinsong Han
,
Kui Ren
ActListener: Imperceptible Activity Surveillance by Pervasive Wireless Infrastructures.
ICDCS
(2022)
Hao Kong
,
Li Lu
,
Jiadi Yu
,
Yanmin Zhu
,
Feilong Tang
,
Yingying Chen
,
Linghe Kong
,
Feng Lyu
Push the Limit of WiFi-based User Authentication towards Undefined Gestures.
INFOCOM
(2022)
Chao Wang
,
Feng Lin
,
Tiantian Liu
,
Ziwei Liu
,
Yijie Shen
,
Zhongjie Ba
,
Li Lu
,
Wenyao Xu
,
Kui Ren
mmPhone: Acoustic Eavesdropping on Loudspeakers via mmWave-characterized Piezoelectric Effect.
INFOCOM
(2022)
Ziwei Liu
,
Feng Lin
,
Chao Wang
,
Yijie Shen
,
Zhongjie Ba
,
Li Lu
,
Wenyao Xu
,
Kui Ren
CamRadar: Hidden Camera Detection Leveraging Amplitude-modulated Sensor Images Embedded in Electromagnetic Emanations.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
6 (4) (2022)
Meng Chen
,
Li Lu
,
Jiadi Yu
,
Yingying Chen
,
Zhongjie Ba
,
Feng Lin
,
Kui Ren
A non-intrusive and adaptive speaker de-identification scheme using adversarial examples.
MobiCom
(2022)
Meng Chen
,
Li Lu
,
Jiadi Yu
,
Yingying Chen
,
Zhongjie Ba
,
Feng Lin
,
Kui Ren
Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples.
CoRR
(2022)
Meng Chen
,
Li Lu
,
Zhongjie Ba
,
Kui Ren
PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition.
INFOCOM
(2022)
Qianniu Chen
,
Meng Chen
,
Li Lu
,
Jiadi Yu
,
Yingying Chen
,
Zhibo Wang
,
Zhongjie Ba
,
Feng Lin
,
Kui Ren
Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain.
SenSys
(2022)
Li Lu
,
Jian Liu
,
Jiadi Yu
,
Yingying Chen
,
Yanmin Zhu
,
Linghe Kong
,
Minglu Li
Enable Traditional Laptops with Virtual Writing Capability Leveraging Acoustic Signals.
Comput. J.
64 (12) (2021)
Jiadi Yu
,
Li Lu
,
Yingying Chen
,
Yanmin Zhu
,
Linghe Kong
An Indirect Eavesdropping Attack of Keystrokes on Touch Screen through Acoustic Sensing.
IEEE Trans. Mob. Comput.
20 (2) (2021)
Hao Kong
,
Li Lu
,
Jiadi Yu
,
Yingying Chen
,
Xiangyu Xu
,
Feilong Tang
,
Yi-Chao Chen
MultiAuth: Enable Multi-User Authentication with Single Commodity WiFi Device.
MobiHoc
(2021)
Hao Kong
,
Li Lu
,
Jiadi Yu
,
Yingying Chen
,
Feilong Tang
Continuous Authentication Through Finger Gesture Interaction for Smart Homes Using WiFi.
IEEE Trans. Mob. Comput.
20 (11) (2021)
Liu Liu
,
Hanlin Yu
,
Zhongjie Ba
,
Li Lu
,
Feng Lin
,
Kui Ren
PassFace: Enabling Practical Anti-Spoofing Facial Recognition with Camera Fingerprinting.
ICC
(2021)
Yang Bai
,
Li Lu
,
Jerry Cheng
,
Jian Liu
,
Yingying Chen
,
Jiadi Yu
Acoustic-based sensing and applications: A survey.
Comput. Networks
181 (2020)
Li Lu
,
Jiadi Yu
,
Yingying Chen
,
Yan Wang
VocalLock: Sensing Vocal Tract for Passphrase-Independent User Authentication Leveraging Acoustic Signals on Smartphones.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
4 (2) (2020)
Yang Bai
,
Jian Liu
,
Li Lu
,
Yilin Yang
,
Yingying Chen
,
Jiadi Yu
BatComm: enabling inaudible acoustic communication with high-throughput for mobile devices.
SenSys
(2020)
Yang Bai
,
Jian Liu
,
Yingying Chen
,
Li Lu
,
Jiadi Yu
Poster: Inaudible High-throughput Communication Through Acoustic Signals.
MobiCom
(2019)
Qiang Wu
,
Jiadi Yu
,
Li Lu
,
Shiyou Qian
,
Guangtao Xue
Dynamically Adjusting Scale of a Kubernetes Cluster under QoS Guarantee.
ICPADS
(2019)
Li Lu
,
Jiadi Yu
,
Yingying Chen
,
Yanmin Zhu
,
Minglu Li
,
Xiangyu Xu
I3: Sensing Scrolling Human-Computer Interactions for Intelligent Interest Inference on Smartphones.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
3 (3) (2019)
Li Lu
,
Jiadi Yu
,
Yingying Chen
,
Yanmin Zhu
,
Xiangyu Xu
,
Guangtao Xue
,
Minglu Li
KeyListener: Inferring Keystrokes on QWERTY Keyboard of Touch Screen through Acoustic Signals.
INFOCOM
(2019)
Hao Kong
,
Li Lu
,
Jiadi Yu
,
Yingying Chen
,
Linghe Kong
,
Minglu Li
FingerPass: Finger Gesture-based Continuous User Authentication for Smart Homes Using Commodity WiFi.
MobiHoc
(2019)
Hua Xue
,
Jiadi Yu
,
Yanmin Zhu
,
Li Lu
,
Shiyou Qian
,
Minglu Li
WiZoom: Accurate Multipath Profiling using Commodity WiFi Devices with Limited Bandwidth.
SECON
(2019)
Yanhua Cao
,
Li Lu
,
Jiadi Yu
,
Shiyou Qian
,
Yanmin Zhu
,
Minglu Li
Online cost-rejection rate scheduling for resource requests in hybrid clouds.
Parallel Comput.
81 (2019)
Li Lu
,
Jiadi Yu
,
Yingying Chen
,
Hongbo Liu
,
Yanmin Zhu
,
Linghe Kong
,
Minglu Li
Lip Reading-Based User Authentication Through Acoustic Sensing on Smartphones.
IEEE/ACM Trans. Netw.
27 (1) (2019)
Li Lu
,
Jiadi Yu
,
Yanmin Zhu
,
Minglu Li
A Double Auction Mechanism to Bridge Users' Task Requirements and Providers' Resources in Two-Sided Cloud Markets.
IEEE Trans. Parallel Distributed Syst.
29 (4) (2018)
Li Lu
,
Jian Liu
,
Jiadi Yu
,
Yingying Chen
,
Yanmin Zhu
,
Xiangyu Xu
,
Minglu Li
VPad: Virtual Writing Tablet for Laptops Leveraging Acoustic Signals.
ICPADS
(2018)
Li Lu
,
Jiadi Yu
,
Yingying Chen
,
Hongbo Liu
,
Yanmin Zhu
,
Yunfei Liu
,
Minglu Li
LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals.
INFOCOM
(2018)
Yanhua Cao
,
Li Lu
,
Jiadi Yu
,
Shiyou Qian
,
Yanmin Zhu
,
Minglu Li
,
Jian Cao
,
Zhong Wang
,
Juan Li
,
Guangtao Xue
Online Cost-Aware Service Requests Scheduling in Hybrid Clouds for Cloud Bursting.
WISE (1)
(2017)
Li Lu
,
Jiadi Yu
,
Yanmin Zhu
,
Guangtao Xue
,
Shiyou Qian
,
Minglu Li
Cost-efficient VM configuration algorithm in the cloud using mix scaling strategy.
ICC
(2017)
Ahmad Ali
,
Li Lu
,
Yanmin Zhu
,
Jiadi Yu
An Energy Efficient Algorithm for Virtual Machine Allocation in Cloud Datacenters.
ACA
(2016)