Li Lu

Orcid: 0000-0002-4361-012X

Affiliations:
  • University of Electronic Science and Technology of China, School of Computer Science and Engineering, Chengdu, China
  • Hong Kong University of Science and Technology, Hong Kong (2007 - 2009)
  • Chinese Academy of Science, Key Lab of Information Security, Beijing, China (PhD 2007)


According to our database1, Li Lu authored at least 67 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Lightweight and Chip-Level Reconfigurable Architecture for Next-Generation IoT End Devices.
IEEE Trans. Computers, March, 2024

Frequency Scaling Meets Intermittency: Optimizing Task Rate for RFID-Scale Computing Devices.
IEEE Trans. Mob. Comput., February, 2024

Watch Out Your Thumb Drive: Covert Data Theft From Portable Data Storage via Backscatter.
IEEE Trans. Dependable Secur. Comput., 2024

Processor-Sharing Internet of Things Architecture for Large-scale Deployment.
Proceedings of the 22nd ACM Conference on Embedded Networked Sensor Systems, 2024

2023
μMote: Enabling Passive Chirp De-spreading and μW-level Long-Range Downlink for Backscatter Devices.
Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, 2023

Go Beyond RFID: Rethinking the Design of RFID Sensor Tags for Versatile Applications.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

LEGO: Empowering Chip-Level Functionality Plug-and-Play for Next-Generation IoT Devices.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2022
Chipnet: Enabling Large-scale Backscatter Network with Processor-free Devices.
ACM Trans. Sens. Networks, November, 2022

Butterfly: μW Level ULP Sensor Nodes with High Task Throughput.
Sensors, 2022

BioTouch: Reliable Re-Authentication via Finger Bio-Capacitance and Touching Behavior.
Sensors, 2022

Rethinking Power Efficiency for Next-Generation Processor-Free Sensing Devices.
Sensors, 2022

Pedestrian Flow Prediction and Route Recommendation with Business Events.
Sensors, 2022

ACM: Accuracy-Aware Collaborative Monitoring for Software-Defined Network-Wide Measurement.
Sensors, 2022

Passive DSSS: Empowering the Downlink Communication for Backscatter Systems.
Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation, 2022

Online ECG Emotion Recognition for Unknown Subjects via Hypergraph-Based Transfer Learning.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Cross-session Specific Emitter Identification using Adversarial Domain Adaptation with Wasserstein distance.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Realizing Power-efficient Encryption Communication for Computational RFID Tags.
Proceedings of the Tenth International Conference on Advanced Cloud and Big Data, 2022

2021
A Spectrum-Efficient Cross-Layer RF Distance Bounding Scheme.
Secur. Commun. Networks, 2021

Online Cross-subject Emotion Recognition from ECG via Unsupervised Domain Adaptation.
Proceedings of the 43rd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2021

2020
Robust Heart Rate Monitoring for Quasi-Periodic Motions by Wrist-Type PPG Signals.
IEEE J. Biomed. Health Informatics, 2020

I Sense You by Breath: Speaker Recognition via Breath Biometrics.
IEEE Trans. Dependable Secur. Comput., 2020

Internet-of-microchips: direct radio-to-bus communication with SPI backscatter.
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020

2019
A Novel Deep Learning-Based Collaborative Filtering Model for Recommendation System.
IEEE Trans. Cybern., 2019

Sentinel: Breaking the Bottleneck of Energy Utilization Efficiency in RF-Powered Devices.
IEEE Internet Things J., 2019

Edge-empowered accurate urban vehicle localization with cellular-aware trajectories.
CCF Trans. Netw., 2019

2018
Online Vehicle Front-Rear Distance Estimation With Urban Context-Aware Trajectories.
IEEE Trans. Veh. Technol., 2018

<i>R</i><sup>3</sup>: Reliable Over-the-Air Reprogramming on Computational RFIDs.
ACM Trans. Embed. Comput. Syst., 2018

Attention based collaborative filtering.
Neurocomputing, 2018

Bag of meta-words: A novel method to represent document for the sentiment classification.
Expert Syst. Appl., 2018

Variational Mode Decomposition-Based Heart Rate Estimation Using Wrist-Type Photoplethysmography During Physical Exercise.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

2017
ShakeIn: Secure User Authentication of Smartphones with Single-Handed Shakes.
IEEE Trans. Mob. Comput., 2017

An RFID Based Smartphone Proximity Absence Alert System.
IEEE Trans. Mob. Comput., 2017

Detecting Clocking Attack in Contactless Access Control Systems.
Proceedings of the Fifth International Conference on Advanced Cloud and Big Data, 2017

2016
A FMCW-Based Cross Layer RF Distance Bounding Scheme.
IEEE Trans. Wirel. Commun., 2016

POST: Exploiting Dynamic Sociality for Mobile Advertising in Vehicular Networks.
IEEE Trans. Parallel Distributed Syst., 2016

PURE: Blind Regression Modeling for Low Quality Data with Participatory Sensing.
IEEE Trans. Parallel Distributed Syst., 2016

Secure and Private RFID-Enabled Third-Party Supply Chain Systems.
IEEE Trans. Computers, 2016

R2: Over-the-air reprogramming on computational RFIDs.
Proceedings of the 2016 IEEE International Conference on RFID, 2016

RUPS: Fixing Relative Distances among Urban Vehicles with Context-Aware Trajectories.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium, 2016

2015
TIGHT: A Cross-Layer RF Distance Bounding Realization for Passive Wireless Devices.
IEEE Trans. Wirel. Commun., 2015

Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics.
IEEE Trans. Comput. Soc. Syst., 2015

From Interest to Location: Neighbor-Based Friend Recommendation in Social Media.
J. Comput. Sci. Technol., 2015

Vulnerability aware graphs for RFID protocol security benchmarking.
J. Comput. Syst. Sci., 2015

Improved perception-based spiking neuron learning rule for real-time user authentication.
Neurocomputing, 2015

Pworm: Passive and Real-Time Wormhole Detection Scheme for WSNs.
Int. J. Distributed Sens. Networks, 2015

BEST: a bidirectional efficiency-privacy transferable authentication protocol for RFID-enabled supply chain.
Int. J. Ad Hoc Ubiquitous Comput., 2015

ACTION: Breaking the Privacy Barrier for RFID Systems.
Ad Hoc Sens. Wirel. Networks, 2015

WiGen: Breaking the Privacy and Security Barriers for Group Management in RFID Systems.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Wireless firmware execution control in computational RFID systems.
Proceedings of the 2015 IEEE International Conference on RFID, 2015

FastID: An undeceived router for real-time identification of WiFi terminals.
Proceedings of the 14th IFIP Networking Conference, 2015

RTS Assisted Mobile Localization: Mitigating Jigsaw Puzzle Problem of Fingerprint Space with Extra Mile.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

2014
COLLECTOR: A secure RFID-enabled batch recall protocol.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Real-time and passive wormhole detection for wireless sensor networks.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

2013
Partial Probing for Scaling Overlay Routing.
IEEE Trans. Parallel Distributed Syst., 2013

Random Graph Based Benchmarking Methodology for RFID Security Protocols.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013

2012
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems.
Int. J. Distributed Sens. Networks, 2012

Analysis on Token-Controlled Public Key Encryption.
Proceedings of the 8th International Conference on Mobile Ad-hoc and Sensor Networks, 2012

2011
Security Analysis of an Improved MFE Public Key Cryptosystem.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
Refresh: Weak Privacy Model for RFID Systems.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
ACTION: Breaking the Privacy Barrier for RFID Systems.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

2008
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps.
IEEE Trans. Parallel Distributed Syst., 2008

2007
Privacy-preserving authentication with low computational overhead for RFID systems.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Storage-Awareness: RFID Private Authentication based on Sparse Tree.
Proceedings of the Third International Workshop on Security, 2007

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2007), 2007

Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

2006
Pairing-Based Multi-Recipient Public Key Encryption.
Proceedings of the 2006 International Conference on Security & Management, 2006

2005
A Random Walk Based Anonymous Peer-to-Peer Protocol Design.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005


  Loading...