default search action
Li Lu 0001
Person information
- affiliation: University of Electronic Science and Technology of China, School of Computer Science and Engineering, Chengdu, China
- affiliation (2007 - 2009): Hong Kong University of Science and Technology, Hong Kong
- affiliation (PhD 2007): Chinese Academy of Science, Key Lab of Information Security, Beijing, China
Other persons with the same name
- Lu Li (aka: Li Lu) — disambiguation page
- Li Lu 0002 — Shanghai Jiaotong University, Institute of Image Processing and Pattern Recognition, China
- Li Lu 0003 — University of Southern California, Annenberg School of Communication, Los Angeles, CA, USA
- Li Lu 0004 — Qualcomm Technologies Inc., San Diego, CA, USA (and 1 more)
- Li Lu 0005 — RWTH Aachen University, Germany
- Li Lu 0006 — University of Illinois at Chicago, IL, USA
- Li Lu 0007 — Shanghai Jiaotong University, School of Electronic Information and Electrical Engineering, China
- Li Lu 0008 — Zhejiang University, School of Cyber Science and Technology, China (and 1 more)
- Li Lu 0009 — University Essen, Germany
- Li Lu 0010 — Central South University, School of Physics and Electronics, Changsha, China
- Li Lu 0011 — Hefei University of Technology, School of Electrical and Automatic Engineering, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Chao Song, Jie Wu, Kunyang Xian, Jianfeng Huang, Li Lu:
Spatio-temporal graph learning: Traffic flow prediction of mobile edge computing in 5G/6G vehicular networks. Comput. Networks 252: 110676 (2024) - [j37]Chong Zhang, Songfan Li, Yihang Song, Qianhe Meng, Li Lu, Hongzi Zhu, Xin Wang:
A Lightweight and Chip-Level Reconfigurable Architecture for Next-Generation IoT End Devices. IEEE Trans. Computers 73(3): 747-763 (2024) - [j36]Shengyu Li, Songfan Li, Qingqing Liu, Yihang Song, Chong Zhang, Li Lu:
Watch Out Your Thumb Drive: Covert Data Theft From Portable Data Storage via Backscatter. IEEE Trans. Dependable Secur. Comput. 21(4): 2434-2447 (2024) - [j35]Songfan Li, Shengyu Li, Minghua Chen, Chao Song, Li Lu:
Frequency Scaling Meets Intermittency: Optimizing Task Rate for RFID-Scale Computing Devices. IEEE Trans. Mob. Comput. 23(2): 1689-1700 (2024) - [c33]Qianhe Meng, Han Wang, Chong Zhang, Yihang Song, Songfan Li, Li Lu, Hongzi Zhu:
Processor-Sharing Internet of Things Architecture for Large-scale Deployment. SenSys 2024: 211-224 - 2023
- [c32]Chong Zhang, Songfan Li, Yihang Song, Qianhe Meng, Minghua Chen, Yanxu Bai, Li Lu, Hongzi Zhu:
LEGO: Empowering Chip-Level Functionality Plug-and-Play for Next-Generation IoT Devices. ASPLOS (3) 2023: 404-418 - [c31]Songfan Li, Qianhe Meng, Yanxu Bai, Chong Zhang, Yihang Song, Shengyu Li, Li Lu:
Go Beyond RFID: Rethinking the Design of RFID Sensor Tags for Versatile Applications. MobiCom 2023: 69:1-69:16 - [c30]Yihang Song, Li Lu, Jiliang Wang, Chong Zhang, Hui Zheng, Shen Yang, Jinsong Han, Jian Li:
μMote: Enabling Passive Chirp De-spreading and μW-level Long-Range Downlink for Backscatter Devices. NSDI 2023: 1751-1766 - 2022
- [j34]Yihang Song, Songfan Li, Chong Zhang, Shengyu Li, Li Lu:
Rethinking Power Efficiency for Next-Generation Processor-Free Sensing Devices. Sensors 22(8): 3074 (2022) - [j33]Chong Zhang, Li Lu, Yihang Song, Qianhe Meng, Junqin Zhang, Xiandong Shao, Guangyuan Zhang, Mengshu Hou:
Butterfly: μW Level ULP Sensor Nodes with High Task Throughput. Sensors 22(8): 3082 (2022) - [j32]Chong Zhang, Songfan Li, Yihang Song, Qianhe Meng, Li Lu, Mengshu Hou:
BioTouch: Reliable Re-Authentication via Finger Bio-Capacitance and Touching Behavior. Sensors 22(9): 3583 (2022) - [j31]Jiqing Gu, Chao Song, Zheng Ren, Li Lu, Wenjun Jiang, Ming Liu:
Pedestrian Flow Prediction and Route Recommendation with Business Events. Sensors 22(19): 7478 (2022) - [j30]Jiqing Gu, Chao Song, Haipeng Dai, Lei Shi, Jinqiu Wu, Li Lu:
ACM: Accuracy-Aware Collaborative Monitoring for Software-Defined Network-Wide Measurement. Sensors 22(20): 7932 (2022) - [j29]Yihang Song, Chao Song, Li Lu, Shen Yang, Songfan Li, Chong Zhang, Qianhe Meng, Xiandong Shao, Haili Wang:
Chipnet: Enabling Large-scale Backscatter Network with Processor-free Devices. ACM Trans. Sens. Networks 18(4): 61:1-61:26 (2022) - [c29]Yihang Song, Li Lu, Jiqing Gu, Chong Zhang:
Realizing Power-efficient Encryption Communication for Computational RFID Tags. CBD 2022: 212-218 - [c28]Yalan Ye, Chunji Wang, Hai Dong, Li Lu, Qiang Zhao:
Cross-session Specific Emitter Identification using Adversarial Domain Adaptation with Wasserstein distance. ICPR 2022: 3119-3124 - [c27]Yalan Ye, Tongjie Pan, Qianhe Meng, Jingjing Li, Li Lu:
Online ECG Emotion Recognition for Unknown Subjects via Hypergraph-Based Transfer Learning. IJCAI 2022: 3666-3672 - [c26]Songfan Li, Hui Zheng, Chong Zhang, Yihang Song, Shen Yang, Minghua Chen, Li Lu, Mo Li:
Passive DSSS: Empowering the Downlink Communication for Backscatter Systems. NSDI 2022: 913-928 - 2021
- [j28]Yihang Song, Songfan Li, Chong Zhang, Li Lu:
A Spectrum-Efficient Cross-Layer RF Distance Bounding Scheme. Secur. Commun. Networks 2021: 6668498:1-6668498:15 (2021) - [c25]Wenwen He, Yalan Ye, Yunxia Li, Tongjie Pan, Li Lu:
Online Cross-subject Emotion Recognition from ECG via Unsupervised Domain Adaptation. EMBC 2021: 1001-1005 - 2020
- [j27]Li Lu, Lingshuang Liu, Muhammad Jawad Hussain, Yongshuai Liu:
I Sense You by Breath: Speaker Recognition via Breath Biometrics. IEEE Trans. Dependable Secur. Comput. 17(2): 306-319 (2020) - [j26]Wenwen He, Yalan Ye, Li Lu, Yunfei Cheng, Yunxia Li, Zhengning Wang:
Robust Heart Rate Monitoring for Quasi-Periodic Motions by Wrist-Type PPG Signals. IEEE J. Biomed. Health Informatics 24(3): 636-648 (2020) - [c24]Songfan Li, Chong Zhang, Yihang Song, Hui Zheng, Lu Liu, Li Lu, Mo Li:
Internet-of-microchips: direct radio-to-bus communication with SPI backscatter. MobiCom 2020: 25:1-25:14
2010 – 2019
- 2019
- [j25]Hongzi Zhu, Fan Wu, Siyuan Cao, Shan Chang, Li Lu:
Edge-empowered accurate urban vehicle localization with cellular-aware trajectories. CCF Trans. Netw. 2(1): 12-27 (2019) - [j24]Songfan Li, Li Lu, Muhammad Jawad Hussain, Yalan Ye, Hongzi Zhu:
Sentinel: Breaking the Bottleneck of Energy Utilization Efficiency in RF-Powered Devices. IEEE Internet Things J. 6(1): 705-717 (2019) - [j23]Mingsheng Fu, Hong Qu, Zhang Yi, Li Lu, Yongsheng Liu:
A Novel Deep Learning-Based Collaborative Filtering Model for Recommendation System. IEEE Trans. Cybern. 49(3): 1084-1096 (2019) - 2018
- [j22]Mingsheng Fu, Hong Qu, Li Huang, Li Lu:
Bag of meta-words: A novel method to represent document for the sentiment classification. Expert Syst. Appl. 113: 33-43 (2018) - [j21]Mingsheng Fu, Hong Qu, Dagmawi Moges, Li Lu:
Attention based collaborative filtering. Neurocomputing 311: 88-98 (2018) - [j20]Die Wu, Li Lu, Muhammad Jawad Hussain, Songfan Li, Mo Li, Fengli Zhang:
R3: Reliable Over-the-Air Reprogramming on Computational RFIDs. ACM Trans. Embed. Comput. Syst. 17(1): 9:1-9:25 (2018) - [j19]Hongzi Zhu, Shan Chang, Wei Zhang, Fan Wu, Li Lu:
Online Vehicle Front-Rear Distance Estimation With Urban Context-Aware Trajectories. IEEE Trans. Veh. Technol. 67(2): 1063-1074 (2018) - [c23]Wenwen He, Yalan Ye, Yunxia Li, Haijin Xu, Li Lu, Wenxia Huang, Ming Sun:
Variational Mode Decomposition-Based Heart Rate Estimation Using Wrist-Type Photoplethysmography During Physical Exercise. ICPR 2018: 3766-3771 - 2017
- [j18]Muhammad Jawad Hussain, Li Lu, Shan Gao:
An RFID Based Smartphone Proximity Absence Alert System. IEEE Trans. Mob. Comput. 16(5): 1246-1257 (2017) - [j17]Hongzi Zhu, Jingmei Hu, Shan Chang, Li Lu:
ShakeIn: Secure User Authentication of Smartphones with Single-Handed Shakes. IEEE Trans. Mob. Comput. 16(10): 2901-2912 (2017) - [c22]Guixiang Tian, Li Lu, Muhammad Jawad Hussain:
Detecting Clocking Attack in Contactless Access Control Systems. CBD 2017: 285-290 - 2016
- [j16]Saiyu Qi, Yuanqing Zheng, Mo Li, Li Lu, Yunhao Liu:
Secure and Private RFID-Enabled Third-Party Supply Chain Systems. IEEE Trans. Computers 65(11): 3413-3426 (2016) - [j15]Shan Chang, Hongzi Zhu, Wei Zhang, Li Lu, Yanmin Zhu:
PURE: Blind Regression Modeling for Low Quality Data with Participatory Sensing. IEEE Trans. Parallel Distributed Syst. 27(4): 1199-1211 (2016) - [j14]Jun Qin, Hongzi Zhu, Yanmin Zhu, Li Lu, Guangtao Xue, Minglu Li:
POST: Exploiting Dynamic Sociality for Mobile Advertising in Vehicular Networks. IEEE Trans. Parallel Distributed Syst. 27(6): 1770-1782 (2016) - [j13]Li Lu, Muhammad Jawad Hussain, Zhigang Han:
A FMCW-Based Cross Layer RF Distance Bounding Scheme. IEEE Trans. Wirel. Commun. 15(6): 4009-4016 (2016) - [c21]Hongzi Zhu, Shan Chang, Li Lu, Wei Zhang:
RUPS: Fixing Relative Distances among Urban Vehicles with Context-Aware Trajectories. IPDPS 2016: 123-131 - [c20]Die Wu, Muhammad Jawad Hussain, Songfan Li, Li Lu:
R2: Over-the-air reprogramming on computational RFIDs. IEEE RFID 2016: 47-54 - 2015
- [j12]Li Lu, Yunhao Liu, Jinsong Han:
ACTION: Breaking the Privacy Barrier for RFID Systems. Ad Hoc Sens. Wirel. Networks 24(1-2): 135-159 (2015) - [j11]Saiyu Qi, Li Lu, Zhenjiang Li, Mo Li:
BEST: a bidirectional efficiency-privacy transferable authentication protocol for RFID-enabled supply chain. Int. J. Ad Hoc Ubiquitous Comput. 18(4): 234-244 (2015) - [j10]Li Lu, Muhammad Jawad Hussain, Guoxing Luo, Zhigang Han:
Pworm: Passive and Real-Time Wormhole Detection Scheme for WSNs. Int. J. Distributed Sens. Networks 11: 356382:1-356382:16 (2015) - [j9]Hong Qu, Xiurui Xie, Yongshuai Liu, Malu Zhang, Li Lu:
Improved perception-based spiking neuron learning rule for real-time user authentication. Neurocomputing 151: 310-318 (2015) - [j8]Shan Chang, Li Lu, Xiaoqiang Liu, Hui Song, Qingsong Yao:
Vulnerability aware graphs for RFID protocol security benchmarking. J. Comput. Syst. Sci. 81(6): 1027-1041 (2015) - [j7]Jin-Qi Zhu, Li Lu, Chun-Mei Ma:
From Interest to Location: Neighbor-Based Friend Recommendation in Social Media. J. Comput. Sci. Technol. 30(6): 1188-1200 (2015) - [j6]Li Lu, Yongshuai Liu:
Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics. IEEE Trans. Comput. Soc. Syst. 2(3): 53-64 (2015) - [j5]Muhammad Jawad Hussain, Li Lu, Hongzi Zhu:
TIGHT: A Cross-Layer RF Distance Bounding Realization for Passive Wireless Devices. IEEE Trans. Wirel. Commun. 14(6): 3076-3085 (2015) - [c19]Chao Song, Jie Wu, Li Lu, Ming Liu:
RTS Assisted Mobile Localization: Mitigating Jigsaw Puzzle Problem of Fingerprint Space with Extra Mile. MASS 2015: 434-442 - [c18]Li Lu, Runzhe Wang, Jing Ding, Wubin Mao, Wei Chen, Hongzi Zhu:
FastID: An undeceived router for real-time identification of WiFi terminals. Networking 2015: 1-9 - [c17]Wenyu Yang, Die Wu, Muhammad Jawad Hussain, Li Lu:
Wireless firmware execution control in computational RFID systems. IEEE RFID 2015: 129-136 - [c16]Li Lu, Muhammad Jawad Hussain, Hongzi Zhu:
WiGen: Breaking the Privacy and Security Barriers for Group Management in RFID Systems. TrustCom/BigDataSE/ISPA (1) 2015: 499-506 - 2014
- [c15]Guoxing Luo, Zhigang Han, Li Lu, Muhammad Jawad Hussain:
Real-time and passive wormhole detection for wireless sensor networks. ICPADS 2014: 592-599 - [c14]Saiyu Qi, Yuanqing Zheng, Mo Li, Li Lu, Yunhao Liu:
COLLECTOR: A secure RFID-enabled batch recall protocol. INFOCOM 2014: 1510-1518 - [c13]Jun Qin, Hongzi Zhu, Yanmin Zhu, Li Lu, Guangtao Xue, Minglu Li:
POST: Exploiting dynamic sociality for mobile advertising in vehicular networks. INFOCOM 2014: 1761-1769 - 2013
- [j4]Deke Guo, Hai Jin, Tao Chen, Jie Wu, Li Lu, Dongsheng Li, Xiaolei Zhou:
Partial Probing for Scaling Overlay Routing. IEEE Trans. Parallel Distributed Syst. 24(11): 2261-2272 (2013) - [c12]Shan Chang, Hui Song, Li Lu, Qingsong Yao, Yong Qi:
Random Graph Based Benchmarking Methodology for RFID Security Protocols. ICEBE 2013: 184-191 - 2012
- [j3]Li Lu, Jinsong Han, Lei Hu, Lionel M. Ni:
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems. Int. J. Distributed Sens. Networks 8 (2012) - [j2]Hui Zhao, Li Lu, Chao Song, Yue Wu:
IPARK: Location-Aware-Based Intelligent Parking Guidance over Infrastructureless VANETs. Int. J. Distributed Sens. Networks 8 (2012) - [c11]Saiyu Qi, Li Lu, Zhenjiang Li, Mo Li:
BEST: A Bidirectional Efficiency-Privacy Transferable Authentication Protocol for RFID-Enabled Supply Chain. ICPADS 2012: 424-431 - [c10]Changlu Lin, Yong Li, Sriramkrishnan Srinivasan, Li Lu:
Analysis on Token-Controlled Public Key Encryption. MSN 2012: 87-91 - 2011
- [c9]Xuyun Nie, Zhaohu Xu, Li Lu, Yongjian Liao:
Security Analysis of an Improved MFE Public Key Cryptosystem. CANS 2011: 118-125 - 2010
- [c8]Li Lu, Yunhao Liu, Xiang-Yang Li:
Refresh: Weak Privacy Model for RFID Systems. INFOCOM 2010: 704-712
2000 – 2009
- 2009
- [c7]Li Lu, Jinsong Han, Renyi Xiao, Yunhao Liu:
ACTION: Breaking the Privacy Barrier for RFID Systems. INFOCOM 2009: 1953-1961 - 2008
- [j1]Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Huai, Lionel M. Ni, Jian Ma:
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps. IEEE Trans. Parallel Distributed Syst. 19(10): 1325-1337 (2008) - 2007
- [c6]Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao Liu, Lionel M. Ni:
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols. IPDPS 2007: 1-10 - [c5]Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. Ni:
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems. PerCom 2007: 13-22 - [c4]Weijia Wang, Yong Li, Lei Hu, Li Lu:
Storage-Awareness: RFID Private Authentication based on Sparse Tree. SECPerU 2007: 61-66 - [c3]Fen Liu, Lei Hu, Li Lu, Weijia Wang:
Privacy-preserving authentication with low computational overhead for RFID systems. SecureComm 2007: 127-132 - 2006
- [c2]Li Lu, Lei Hu:
Pairing-Based Multi-Recipient Public Key Encryption. Security and Management 2006: 159-165 - 2005
- [c1]Jinsong Han, Yunhao Liu, Li Lu, Lei Hu, Abhishek P. Patil:
A Random Walk Based Anonymous Peer-to-Peer Protocol Design. ICCNMC 2005: 143-152
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 19:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint