Personal information

Verified email domains

Intelligent System Security, IoT Security, Ubiquitous Computing, Mobile Sensing
China

Biography

Li Lu is currently a tenure-track Research Professor in School of Cyber Science and Technology and College of Computer Science and Technology at Zhejiang University. He received his Ph.D., and B.E., B.Admin degrees from Shanghai Jiao Tong University and Xi'an Jiaotong University, respectively. He has visited Wireless Information Network Laboratory (WINLAB) and Department of Electrical and Computer Engineering at Rutgers University. He is the recipient of ACM China SIGAPP Chapter Rising Star Award and Doctoral Dissertation Award, Best Poster Runner-up Award of ACM MobiCom 2022, First Runner-up Poster Award of ACM MobiCom 2019, Distinguished Member of the IEEE INFOCOM’24 TPC. His research interests include intelligent system security, IoT security and ubiquitous computing.

Activities

Employment (2)

Zhejiang University: Hangzhou, Zhejiang, CN

2020-07 to present | Research Professor (School of Cyber Science and Technology)
Employment
Source: Self-asserted source
Li Lu

Rutgers The State University of New Jersey: New Brunswick, NJ, US

2018-10 to 2019-09 | Visiting Research Student (WINLAB and Dept. Electrical and Computer Engineering)
Employment
Source: Self-asserted source
Li Lu

Education and qualifications (3)

Shanghai Jiao Tong University: Shanghai, CN

2015-09 to 2020-06 | Philosophy of Doctor (Department of Computer Science and Engineering)
Education
Source: Self-asserted source
Li Lu

Xi'an Jiaotong University: Xi'an, Shaanxi, CN

2013-03 to 2015-06 | Bachelor of Administration (School of Management)
Education
Source: Self-asserted source
Li Lu

Xi'an Jiaotong University: Xi'an, Shaanxi, CN

2011-09 to 2015-06 | Bachelor of Engineering (Department of Computer Science and Technology)
Education
Source: Self-asserted source
Li Lu

Professional activities (6)

China Computer Federation: Beijing, CN

2024-10 to present | Senior Member
Membership
Source: Self-asserted source
Li Lu

IEEE Vehicular Technology Society: New York, NY, US

2024-08 to present | Committee Member (Technical Committee on Autonomous Vehicles )
Service
Source: Self-asserted source
Li Lu

China Computer Federation: Beijing, CN

2024-01 to present | Executive Committee Member (Technical Committee on Internet of Things)
Service
Source: Self-asserted source
Li Lu

China Computer Federation: Beijing, CN

2021-12 to present | Executive Committee Member (Technical Committee on Pervasive Computing)
Service
Source: Self-asserted source
Li Lu

Association for Computing Machinery: New York, NY, US

2021-09 to present | Professional Member
Membership
Source: Self-asserted source
Li Lu

IEEE: New York, NY, US

2020-12 to present | Member
Membership
Source: Self-asserted source
Li Lu

Works (50 of 58)

Items per page:
Page 1 of 2

DroneAudioID: A Lightweight Acoustic Fingerprint-Based Drone Authentication System for Secure Drone Delivery

IEEE Transactions on Information Forensics and Security
2025 | Journal article
Contributors: Meng Zhang; Li Lu; Yuhan Wu; Zheng Yan; Jiaqi Sun; Feng Lin; Kui Ren
Source: check_circle
Crossref

MagShadow: Physical Adversarial Example Attacks via Electromagnetic Injection

IEEE Transactions on Dependable and Secure Computing
2025 | Journal article
Contributors: Ziwei Liu; Feng Lin; Zhongjie Ba; Li Lu; Kui Ren
Source: check_circle
Crossref

AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception

IEEE Transactions on Information Forensics and Security
2024 | Journal article
Contributors: Meng Chen; Li Lu; Jiadi Yu; Zhongjie Ba; Feng Lin; Kui Ren
Source: check_circle
Crossref

An Imperceptible Eavesdropping Attack on WiFi Sensing Systems

IEEE/ACM Transactions on Networking
2024 | Journal article
Contributors: Li Lu; Meng Chen; Jiadi Yu; Zhongjie Ba; Feng Lin; Jinsong Han; Yanmin Zhu; Kui Ren
Source: check_circle
Crossref

Devil in the Room: Triggering Audio Backdoors in the Physical World

USENIX Security Symposium
2024 | Conference proceedings
Contributors: Meng Chen; Xiangyu Xu; Li Lu; Zhongjie Ba; Feng Lin; Kui Ren
Source: Self-asserted source
Li Lu

FLTracer: Accurate Poisoning Attack Provenance in Federated Learning

IEEE Transactions on Information Forensics and Security
2024 | Journal article
Contributors: Xinyu Zhang; Qingyu Liu; Zhongjie Ba; Yuan Hong; Tianhang Zheng; Feng Lin; Li Lu; Kui Ren
Source: check_circle
Crossref

FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition

USENIX Security Symposium
2024 | Conference paper
Contributors: Kun Wang; Xiangyu Xu; Li Lu; Zhongjie Ba; Feng Lin; Kui Ren
Source: Self-asserted source
Li Lu

Indelible “Footprints” of Inaudible Command Injection

IEEE Transactions on Information Forensics and Security
2024 | Journal article
Contributors: Zhongjie Ba; Bin Gong; Yuwei Wang; Yuxuan Liu; Peng Cheng; Feng Lin; Li Lu; Kui Ren
Source: check_circle
Crossref

PhaDe: Practical Phantom Spoofing Attack Detection for Autonomous Vehicles

IEEE Transactions on Information Forensics and Security
2024 | Journal article
Contributors: Feng Lin; Hao Yan; Jin Li; Ziwei Liu; Li Lu; Zhongjie Ba; Kui Ren
Source: check_circle
Crossref

Phoneme-Based Proactive Anti-Eavesdropping With Controlled Recording Privilege

IEEE Transactions on Dependable and Secure Computing
2024 | Journal article
Contributors: Peng Huang; Yao Wei; Peng Cheng; Zhongjie Ba; Li Lu; Feng Lin; Yang Wang; Kui Ren
Source: check_circle
Crossref

EMTrig: Physical Adversarial Examples Triggered by Electromagnetic Injection towards LiDAR Perception

2024-11-04 | Conference paper
Contributors: Ziwei Liu; Feng Lin; Teshi Meng; Benaouda Chouaib Baha-eddine; Li Lu; Qiang Xue; Kui Ren
Source: check_circle
Crossref

High-Quality Speech Recovery Through Soundproof Protections via mmWave Sensing

IEEE Transactions on Dependable and Secure Computing
2024-07 | Journal article
Contributors: Feng Lin; Chao Wang; Tiantian Liu; Ziwei Liu; Yijie Shen; Zhongjie Ba; Li Lu; Wenyao Xu; Kui Ren
Source: check_circle
Crossref

Conan's Bow Tie: A Streaming Voice Conversion for Real-Time VTuber Livestreaming

2024-03-18 | Conference paper
Contributors: Qianniu Chen; Zhehan Gu; Li Lu; Xiangyu Xu; Zhongjie Ba; Feng Lin; Zhenguang Liu; Kui Ren
Source: check_circle
Crossref

MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals Learning

IEEE Transactions on Dependable and Secure Computing
2024-01 | Journal article
Contributors: Yijie Shen; Feng Lin; Chao Wang; Tiantian Liu; Zhongjie Ba; Li Lu; Wenyao Xu; Kui Ren
Source: check_circle
Crossref

UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations

IEEE Transactions on Dependable and Secure Computing
2024-01 | Journal article
Contributors: Peng Cheng; Yuexin Wu; Yuan Hong; Zhongjie Ba; Feng Lin; Li Lu; Kui Ren
Source: check_circle
Crossref

A Resilience Evaluation Framework on Ultrasonic Microphone Jammers

IEEE Transactions on Mobile Computing
2023 | Journal article
Contributors: Ming Gao; Yike Chen; Yimin Li; Lingfeng Zhang; Jianwei Liu; Li Lu; Feng Lin; Jinsong Han; Kui Ren
Source: check_circle
Crossref

InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise

Proceedings 2023 Network and Distributed System Security Symposium
2023 | Conference paper
Contributors: Peng Huang; Yao Wei; Peng Cheng; Zhongjie Ba; Li Lu; Feng Lin; Fan Zhang; Kui Ren
Source: Self-asserted source
Li Lu

Toward Multi-User Authentication Using WiFi Signals

IEEE/ACM Transactions on Networking
2023 | Journal article
Contributors: Hao Kong; Li Lu; Jiadi Yu; Yingying Chen; Xiangyu Xu; Feng Lyu
Source: check_circle
Crossref

BypTalker: An Adaptive Adversarial Example Attack to Bypass Prefilter-enabled Speaker Recognition

2023 19th International Conference on Mobility, Sensing and Networking (MSN)
2023-12-14 | Conference paper
Contributors: Qianniu Chen; Kang Fu; Li Lu; Meng Chen; Zhongjie Ba; Feng Lin; Kui Ren
Source: Self-asserted source
Li Lu

FITS: Matching Camera Fingerprints Subject to Software Noise Pollution

2023-11-15 | Conference paper
Contributors: Liu Liu; Xinwen Fu; Xiaodong Chen; Jianpeng Wang; Zhongjie Ba; Feng Lin; Li Lu; Kui Ren
Source: check_circle
Crossref

FingerFaker: Spoofing Attack on COTS Fingerprint Recognition Without Victim's Knowledge

2023-11-12 | Conference paper
Contributors: Yijie Shen; Zhe Ma; Feng Lin; Hao Yan; Zhongjie Ba; Li Lu; Wenyao Xu; Kui Ren
Source: check_circle
Crossref

VoiceCloak

Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
2023-06-12 | Journal article
Contributors: Meng Chen; Li Lu; Junhao Wang; Jiadi Yu; Yingying Chen; Zhibo Wang; Zhongjie Ba; Feng Lin; Kui Ren
Source: check_circle
Crossref

Shift to Your Device: Data Augmentation for Device-Independent Speaker Verification Anti-Spoofing

ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
2023-06-04 | Conference paper
Contributors: Junhao Wang; Li Lu; Zhongjie Ba; Feng Lin; Kui Ren
Source: Self-asserted source
Li Lu

MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks

2023 IEEE Symposium on Security and Privacy (SP)
2023-05 | Conference paper
Contributors: Tiantian Liu; Feng Lin; Zhangsen Wang; Chao Wang; Zhongjie Ba; Li Lu; Wenyao Xu; Kui Ren
Source: Self-asserted source
Li Lu

Transferring Audio Deepfake Detection Capability across Languages

2023-04-30 | Conference paper
Contributors: Zhongjie Ba; Qing Wen; Peng Cheng; Yuwei Wang; Feng Lin; Li Lu; Zhenguang Liu
Source: check_circle
Crossref

VoiceListener

Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
2023-03-27 | Journal article
Contributors: Lei Wang; Meng Chen; Li Lu; Zhongjie Ba; Feng Lin; Kui Ren
Source: check_circle
Crossref

CamRadar

Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
2022-12-21 | Journal article
Contributors: Ziwei Liu; Feng Lin; Chao Wang; Yijie Shen; Zhongjie Ba; Li Lu; Wenyao Xu; Kui Ren
Source: check_circle
Crossref

Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain

Proceedings of the Twentieth ACM Conference on Embedded Networked Sensor Systems
2022-11-06 | Conference paper
Contributors: Qianniu Chen; Meng Chen; Li Lu; Jiadi Yu; Yingying Chen; Zhibo Wang; Zhongjie Ba; Feng Lin; Kui Ren
Source: Self-asserted source
Li Lu

A non-intrusive and adaptive speaker de-identification scheme using adversarial examples

Proceedings of the 28th Annual International Conference on Mobile Computing And Networking
2022-10-14 | Conference poster
Contributors: Li Lu; Meng Chen; Li Lu; Jiadi Yu; Yingying Chen; Zhongjie Ba; Feng Lin; Kui Ren
Source: Self-asserted source
Li Lu

ActListener: Imperceptible Activity Surveillance by Pervasive Wireless Infrastructures

2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)
2022-07 | Conference paper
Contributors: Li Lu; Li Lu; Zhongjie Ba; Feng Lin; Jinsong Han; Kui Ren
Source: Self-asserted source
Li Lu

Big Brother is Listening: An Evaluation Framework on Ultrasonic Microphone Jammers

IEEE INFOCOM 2022 - IEEE Conference on Computer Communications
2022-05-02 | Conference paper
Contributors: Li Lu; Yike Chen; Ming Gao; Yimin Li; Lingfeng Zhang; Li Lu; Feng Lin; Jinsong Han; Kui Ren
Source: Self-asserted source
Li Lu

mmPhone: Acoustic Eavesdropping on Loudspeakers via mmWave-characterized Piezoelectric Effect

IEEE INFOCOM 2022 - IEEE Conference on Computer Communications
2022-05-02 | Conference paper
Contributors: Li Lu; Chao Wang; Feng Lin; Tiantian Liu; Ziwei Liu; Yijie Shen; Zhongjie Ba; Li Lu; Wenyao Xu; Kui Ren
Source: Self-asserted source
Li Lu

PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition

IEEE INFOCOM 2022 - IEEE Conference on Computer Communications
2022-05-02 | Conference paper
Contributors: Li Lu; Meng Chen; Li Lu; Zhongjie Ba; Kui Ren
Source: Self-asserted source
Li Lu

Push the Limit of WiFi-based User Authentication towards Undefined Gestures

IEEE INFOCOM 2022 - IEEE Conference on Computer Communications
2022-05-02 | Conference paper
Contributors: Li Lu; Hao Kong; Li Lu; Jiadi Yu; Yanmin Zhu; Feilong Tang; Yi-Chao Chen; Linghe Kong; Feng Lyu
Source: Self-asserted source
Li Lu

mPose: Environment- and subject-agnostic 3D skeleton posture reconstruction leveraging a single mmWave device

Smart Health
2022-03 | Journal article
Contributors: Cong Shi; Li Lu; Jian Liu; Yan Wang; Yingying Chen; Jiadi Yu
Source: check_circle
Crossref

Continuous Authentication Through Finger Gesture Interaction for Smart Homes Using WiFi

IEEE Transactions on Mobile Computing
2021-11-01 | Journal article
Contributors: Hao Kong; Li Lu; Jiadi Yu; Yingying Chen; Feilong Tang
Source: check_circle
Crossref

MultiAuth: Enable Multi-User Authentication with Single Commodity WiFi Device

Proceedings of the Twenty-second International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing
2021-07-26 | Conference paper
Source: Self-asserted source
Li Lu

PassFace: Enabling Practical Anti-Spoofing Facial Recognition with Camera Fingerprinting

ICC 2021 - IEEE International Conference on Communications
2021-06 | Conference paper
Source: Self-asserted source
Li Lu

An Indirect Eavesdropping Attack of Keystrokes on Touch Screen through Acoustic Sensing

IEEE Transactions on Mobile Computing
2021-02-01 | Journal article
Contributors: Jiadi Yu; Li Lu; Yingying Chen; Yanmin Zhu; Linghe Kong
Source: check_circle
Crossref

Acoustic-based sensing and applications: A survey

Computer Networks
2020-11 | Journal article
Part of ISSN: 1389-1286
Source: Self-asserted source
Li Lu

BatComm: enabling inaudible acoustic communication with high-throughput for mobile devices

Proceedings of the 18th Conference on Embedded Networked Sensor Systems
2020-11-16 | Conference paper
Source: Self-asserted source
Li Lu

Towards a Real-Time Anti-Theft Method for Mobile Devices Leveraging Acoustic Sensing

Chinese Journal of Computers
2020-10 | Journal article
Source: Self-asserted source
Li Lu

VocalLock: Sensing Vocal Tract for Passphrase-Independent User Authentication Leveraging Acoustic Signals on Smartphones

Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
2020-06-15 | Journal article
Part of ISSN: 2474-9567
Part of ISSN: 2474-9567
Source: Self-asserted source
Li Lu

Enable Traditional Laptops with Virtual Writing Capability Leveraging Acoustic Signals

The Computer Journal
2020-01-10 | Journal article
Part of ISSN: 0010-4620
Part of ISSN: 1460-2067
Source: Self-asserted source
Li Lu

Dynamically Adjusting Scale of a Kubernetes Cluster under QoS Guarantee

2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS)
2019-12 | Conference paper
Source: Self-asserted source
Li Lu

Poster: Inaudible High-throughput Communication Through Acoustic Signals

The 25th Annual International Conference on Mobile Computing and Networking - MobiCom '19
2019-10-21 | Conference poster
Source: Self-asserted source
Li Lu

I3: Sensing Scrolling Human-Computer Interactions for Intelligent Interest Inference on Smartphones

Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
2019-09-09 | Journal article
Part of ISSN: 2474-9567
Source: Self-asserted source
Li Lu

FingerPass: Finger Gesture-based Continuous User Authentication for Smart Homes Using Commodity WiFi

ACM International Symposium on Mobile Ad Hoc Networking and Computing (ACM MobiHoc 2019)
2019-07 | Conference paper
Source: Self-asserted source
Li Lu

WiZoom: Accurate Multipath Profiling using Commodity WiFi Devices with Limited Bandwidth

IEEE International Conference on Sensing, Communication and Networking (IEEE SECON 2019)
2019-06 | Conference paper
Source: Self-asserted source
Li Lu

KeyListener: Inferring Keystrokes on QWERTY Keyboard of Touch Screen through Acoustic Signals

IEEE International Conference on Computer Communications (IEEE INFOCOM 2019)
2019-04 | Conference paper
Source: Self-asserted source
Li Lu
Items per page:
Page 1 of 2

Peer review (86 reviews for 26 publications/grants)

Review activity for ACM computing surveys. (1)
Review activity for ACM transactions on computing for healthcare. (1)
Review activity for ACM transactions on sensor networks. (5)
Review activity for Automotive innovation. (1)
Review activity for Computer methods and programs in biomedicine. (1)
Review activity for Computer networks. (4)
Review activity for Computer science review. (1)
Review activity for IEEE access : (2)
Review activity for IEEE internet of things journal. (10)
Review activity for IEEE network. (2)
Review activity for IEEE transactions on computers. (10)
Review activity for IEEE transactions on dependable and secure computing. (4)
Review activity for IEEE transactions on information forensics and security. (1)
Review activity for IEEE transactions on mobile computing. (7)
Review activity for IEEE transactions on multimedia. (1)
Review activity for IEEE transactions on network science and engineering. (3)
Review activity for IEEE transactions on services computing. (3)
Review activity for IEEE transactions on vehicular technology. (2)
Review activity for IEEE/ACM transactions on networking : (17)
Review activity for Journal of cloud computing. (2)
Review activity for Journal of cybersecurity and privacy. (1)
Review activity for Journal of information security and applications. (1)
Review activity for Pattern recognition. (1)
Review activity for Pervasive and mobile computing. (2)
Review activity for Sensors. (2)
Review activity for Smart health (1)