dblp: Li Lu
https://dblp.org/pid/49/2793-1.html
dblp person page RSS feedWed, 06 Nov 2024 20:31:29 +0100en-USdaily1released under the CC0 1.0 licensedblp@dagstuhl.de (dblp team)dblp@dagstuhl.de (dblp team)Computers/Computer_Science/Publications/Bibliographieshttp://www.rssboard.org/rss-specificationhttps://dblp.org/img/logo.144x51.pngdblp: Li Luhttps://dblp.org/pid/49/2793-1.html14451A Lightweight and Chip-Level Reconfigurable Architecture for Next-Generation IoT End Devices.https://doi.org/10.1109/TC.2023.3343094Chong Zhang, Songfan Li, Yihang Song, Qianhe Meng, Li Lu, Hongzi Zhu, Xin Wang: A Lightweight and Chip-Level Reconfigurable Architecture for Next-Generation IoT End Devices.IEEE Trans. Computers73(3): 747-763 (2024)]]>https://dblp.org/rec/journals/tc/ZhangLSMLZW24Fri, 01 Mar 2024 00:00:00 +0100Watch Out Your Thumb Drive: Covert Data Theft From Portable Data Storage via Backscatter.https://doi.org/10.1109/TDSC.2023.3305607Shengyu Li, Songfan Li, Qingqing Liu, Yihang Song, Chong Zhang, Li Lu: Watch Out Your Thumb Drive: Covert Data Theft From Portable Data Storage via Backscatter.IEEE Trans. Dependable Secur. Comput.21(4): 2434-2447 (2024)]]>https://dblp.org/rec/journals/tdsc/LiLLSZL24Mon, 01 Jul 2024 01:00:00 +0200Frequency Scaling Meets Intermittency: Optimizing Task Rate for RFID-Scale Computing Devices.https://doi.org/10.1109/TMC.2023.3239515Songfan Li, Shengyu Li, Minghua Chen, Chao Song, Li Lu: Frequency Scaling Meets Intermittency: Optimizing Task Rate for RFID-Scale Computing Devices.IEEE Trans. Mob. Comput.23(2): 1689-1700 (2024)]]>https://dblp.org/rec/journals/tmc/LiLCSL24Thu, 01 Feb 2024 00:00:00 +0100LEGO: Empowering Chip-Level Functionality Plug-and-Play for Next-Generation IoT Devices.https://doi.org/10.1145/3582016.3582050Chong Zhang, Songfan Li, Yihang Song, Qianhe Meng, Minghua Chen, Yanxu Bai, Li Lu, Hongzi Zhu: LEGO: Empowering Chip-Level Functionality Plug-and-Play for Next-Generation IoT Devices.ASPLOS (3)2023: 404-418]]>https://dblp.org/rec/conf/asplos/ZhangLSMCB0Z23Sun, 01 Jan 2023 00:00:00 +0100Go Beyond RFID: Rethinking the Design of RFID Sensor Tags for Versatile Applications.https://doi.org/10.1145/3570361.3613284Songfan Li, Qianhe Meng, Yanxu Bai, Chong Zhang, Yihang Song, Shengyu Li, Li Lu: Go Beyond RFID: Rethinking the Design of RFID Sensor Tags for Versatile Applications.MobiCom2023: 69:1-69:16]]>https://dblp.org/rec/conf/mobicom/LiMBZSL023Sun, 01 Jan 2023 00:00:00 +0100μMote: Enabling Passive Chirp De-spreading and μW-level Long-Range Downlink for Backscatter Devices.https://www.usenix.org/conference/nsdi23/presentation/song-yihangYihang Song, Li Lu, Jiliang Wang, Chong Zhang, Hui Zheng, Shen Yang, Jinsong Han, Jian Li: μMote: Enabling Passive Chirp De-spreading and μW-level Long-Range Downlink for Backscatter Devices.NSDI2023: 1751-1766]]>https://dblp.org/rec/conf/nsdi/Song0WZZYHL23Sun, 01 Jan 2023 00:00:00 +0100Rethinking Power Efficiency for Next-Generation Processor-Free Sensing Devices.https://doi.org/10.3390/s22083074Yihang Song, Songfan Li, Chong Zhang, Shengyu Li, Li Lu: Rethinking Power Efficiency for Next-Generation Processor-Free Sensing Devices.Sensors22(8): 3074 (2022)]]>https://dblp.org/rec/journals/sensors/SongLZLL22Sat, 01 Jan 2022 00:00:00 +0100Butterfly: μW Level ULP Sensor Nodes with High Task Throughput.https://doi.org/10.3390/s22083082Chong Zhang, Li Lu, Yihang Song, Qianhe Meng, Junqin Zhang, Xiandong Shao, Guangyuan Zhang, Mengshu Hou: Butterfly: μW Level ULP Sensor Nodes with High Task Throughput.Sensors22(8): 3082 (2022)]]>https://dblp.org/rec/journals/sensors/ZhangLSMZSZH22Sat, 01 Jan 2022 00:00:00 +0100BioTouch: Reliable Re-Authentication via Finger Bio-Capacitance and Touching Behavior.https://doi.org/10.3390/s22093583Chong Zhang, Songfan Li, Yihang Song, Qianhe Meng, Li Lu, Mengshu Hou: BioTouch: Reliable Re-Authentication via Finger Bio-Capacitance and Touching Behavior.Sensors22(9): 3583 (2022)]]>https://dblp.org/rec/journals/sensors/ZhangLSMLH22Sat, 01 Jan 2022 00:00:00 +0100Pedestrian Flow Prediction and Route Recommendation with Business Events.https://doi.org/10.3390/s22197478Jiqing Gu, Chao Song, Zheng Ren, Li Lu, Wenjun Jiang, Ming Liu: Pedestrian Flow Prediction and Route Recommendation with Business Events.Sensors22(19): 7478 (2022)]]>https://dblp.org/rec/journals/sensors/GuSRLJL22Sat, 01 Jan 2022 00:00:00 +0100ACM: Accuracy-Aware Collaborative Monitoring for Software-Defined Network-Wide Measurement.https://doi.org/10.3390/s22207932Jiqing Gu, Chao Song, Haipeng Dai, Lei Shi, Jinqiu Wu, Li Lu: ACM: Accuracy-Aware Collaborative Monitoring for Software-Defined Network-Wide Measurement.Sensors22(20): 7932 (2022)]]>https://dblp.org/rec/journals/sensors/GuSDSWL22Sat, 01 Jan 2022 00:00:00 +0100Chipnet: Enabling Large-scale Backscatter Network with Processor-free Devices.https://doi.org/10.1145/3544492Yihang Song, Chao Song, Li Lu, Shen Yang, Songfan Li, Chong Zhang, Qianhe Meng, Xiandong Shao, Haili Wang: Chipnet: Enabling Large-scale Backscatter Network with Processor-free Devices.ACM Trans. Sens. Networks18(4): 61:1-61:26 (2022)]]>https://dblp.org/rec/journals/tosn/SongSLYLZMSW22Tue, 01 Nov 2022 00:00:00 +0100Realizing Power-efficient Encryption Communication for Computational RFID Tags.https://doi.org/10.1109/CBD58033.2022.00045Yihang Song, Li Lu, Jiqing Gu, Chong Zhang: Realizing Power-efficient Encryption Communication for Computational RFID Tags.CBD2022: 212-218]]>https://dblp.org/rec/conf/cbd/SongLGZ22Sat, 01 Jan 2022 00:00:00 +0100Cross-session Specific Emitter Identification using Adversarial Domain Adaptation with Wasserstein distance.https://doi.org/10.1109/ICPR56361.2022.9956207Yalan Ye, Chunji Wang, Hai Dong, Li Lu, Qiang Zhao: Cross-session Specific Emitter Identification using Adversarial Domain Adaptation with Wasserstein distance.ICPR2022: 3119-3124]]>https://dblp.org/rec/conf/icpr/YeWD0Z22Sat, 01 Jan 2022 00:00:00 +0100Online ECG Emotion Recognition for Unknown Subjects via Hypergraph-Based Transfer Learning.https://doi.org/10.24963/ijcai.2022/509Yalan Ye, Tongjie Pan, Qianhe Meng, Jingjing Li, Li Lu: Online ECG Emotion Recognition for Unknown Subjects via Hypergraph-Based Transfer Learning.IJCAI2022: 3666-3672]]>https://dblp.org/rec/conf/ijcai/YePM0022Sat, 01 Jan 2022 00:00:00 +0100Passive DSSS: Empowering the Downlink Communication for Backscatter Systems.https://www.usenix.org/conference/nsdi22/presentation/li-songfanSongfan Li, Hui Zheng, Chong Zhang, Yihang Song, Shen Yang, Minghua Chen, Li Lu, Mo Li: Passive DSSS: Empowering the Downlink Communication for Backscatter Systems.NSDI2022: 913-928]]>https://dblp.org/rec/conf/nsdi/LiZZSYC0022Sat, 01 Jan 2022 00:00:00 +0100A Spectrum-Efficient Cross-Layer RF Distance Bounding Scheme.https://doi.org/10.1155/2021/6668498Yihang Song, Songfan Li, Chong Zhang, Li Lu: A Spectrum-Efficient Cross-Layer RF Distance Bounding Scheme.Secur. Commun. Networks2021: 6668498:1-6668498:15 (2021)]]>https://dblp.org/rec/journals/scn/SongLZL21Fri, 01 Jan 2021 00:00:00 +0100Online Cross-subject Emotion Recognition from ECG via Unsupervised Domain Adaptation.https://doi.org/10.1109/EMBC46164.2021.9630433Wenwen He, Yalan Ye, Yunxia Li, Tongjie Pan, Li Lu: Online Cross-subject Emotion Recognition from ECG via Unsupervised Domain Adaptation.EMBC2021: 1001-1005]]>https://dblp.org/rec/conf/embc/HeYLPL21Fri, 01 Jan 2021 00:00:00 +0100I Sense You by Breath: Speaker Recognition via Breath Biometrics.https://doi.org/10.1109/TDSC.2017.2767587Li Lu, Lingshuang Liu, Muhammad Jawad Hussain, Yongshuai Liu: I Sense You by Breath: Speaker Recognition via Breath Biometrics.IEEE Trans. Dependable Secur. Comput.17(2): 306-319 (2020)]]>https://dblp.org/rec/journals/tdsc/LuLHL20Wed, 01 Jan 2020 00:00:00 +0100Robust Heart Rate Monitoring for Quasi-Periodic Motions by Wrist-Type PPG Signals.https://doi.org/10.1109/JBHI.2019.2912708Wenwen He, Yalan Ye, Li Lu, Yunfei Cheng, Yunxia Li, Zhengning Wang: Robust Heart Rate Monitoring for Quasi-Periodic Motions by Wrist-Type PPG Signals.IEEE J. Biomed. Health Informatics24(3): 636-648 (2020)]]>https://dblp.org/rec/journals/titb/HeYLCLW20Wed, 01 Jan 2020 00:00:00 +0100Internet-of-microchips: direct radio-to-bus communication with SPI backscatter.https://doi.org/10.1145/3372224.3419182Songfan Li, Chong Zhang, Yihang Song, Hui Zheng, Lu Liu, Li Lu, Mo Li: Internet-of-microchips: direct radio-to-bus communication with SPI backscatter.MobiCom2020: 25:1-25:14]]>https://dblp.org/rec/conf/mobicom/LiZSZL0020Wed, 01 Jan 2020 00:00:00 +0100Edge-empowered accurate urban vehicle localization with cellular-aware trajectories.https://doi.org/10.1007/s42045-018-0005-yHongzi Zhu, Fan Wu, Siyuan Cao, Shan Chang, Li Lu: Edge-empowered accurate urban vehicle localization with cellular-aware trajectories.CCF Trans. Netw.2(1): 12-27 (2019)]]>https://dblp.org/rec/journals/ccfton/ZhuWCCL19Tue, 01 Jan 2019 00:00:00 +0100Sentinel: Breaking the Bottleneck of Energy Utilization Efficiency in RF-Powered Devices.https://doi.org/10.1109/JIOT.2018.2854374Songfan Li, Li Lu, Muhammad Jawad Hussain, Yalan Ye, Hongzi Zhu: Sentinel: Breaking the Bottleneck of Energy Utilization Efficiency in RF-Powered Devices.IEEE Internet Things J.6(1): 705-717 (2019)]]>https://dblp.org/rec/journals/iotj/LiLHYZ19Tue, 01 Jan 2019 00:00:00 +0100A Novel Deep Learning-Based Collaborative Filtering Model for Recommendation System.https://doi.org/10.1109/TCYB.2018.2795041Mingsheng Fu, Hong Qu, Zhang Yi, Li Lu, Yongsheng Liu: A Novel Deep Learning-Based Collaborative Filtering Model for Recommendation System.IEEE Trans. Cybern.49(3): 1084-1096 (2019)]]>https://dblp.org/rec/journals/tcyb/FuQYLL19Tue, 01 Jan 2019 00:00:00 +0100Bag of meta-words: A novel method to represent document for the sentiment classification.https://doi.org/10.1016/j.eswa.2018.06.052Mingsheng Fu, Hong Qu, Li Huang, Li Lu: Bag of meta-words: A novel method to represent document for the sentiment classification.Expert Syst. Appl.113: 33-43 (2018)]]>https://dblp.org/rec/journals/eswa/FuQHL18Mon, 01 Jan 2018 00:00:00 +0100Attention based collaborative filtering.https://doi.org/10.1016/j.neucom.2018.05.049Mingsheng Fu, Hong Qu, Dagmawi Moges, Li Lu: Attention based collaborative filtering.Neurocomputing311: 88-98 (2018)]]>https://dblp.org/rec/journals/ijon/FuQML18Mon, 01 Jan 2018 00:00:00 +0100R3: Reliable Over-the-Air Reprogramming on Computational RFIDs.https://doi.org/10.1145/3070720Die Wu, Li Lu, Muhammad Jawad Hussain, Songfan Li, Mo Li, Fengli Zhang: R3: Reliable Over-the-Air Reprogramming on Computational RFIDs.ACM Trans. Embed. Comput. Syst.17(1): 9:1-9:25 (2018)]]>https://dblp.org/rec/journals/tecs/WuLHLLZ18Mon, 01 Jan 2018 00:00:00 +0100Online Vehicle Front-Rear Distance Estimation With Urban Context-Aware Trajectories.https://doi.org/10.1109/TVT.2017.2751594Hongzi Zhu, Shan Chang, Wei Zhang, Fan Wu, Li Lu: Online Vehicle Front-Rear Distance Estimation With Urban Context-Aware Trajectories.IEEE Trans. Veh. Technol.67(2): 1063-1074 (2018)]]>https://dblp.org/rec/journals/tvt/ZhuCZWL18Mon, 01 Jan 2018 00:00:00 +0100Variational Mode Decomposition-Based Heart Rate Estimation Using Wrist-Type Photoplethysmography During Physical Exercise.https://doi.org/10.1109/ICPR.2018.8545685Wenwen He, Yalan Ye, Yunxia Li, Haijin Xu, Li Lu, Wenxia Huang, Ming Sun: Variational Mode Decomposition-Based Heart Rate Estimation Using Wrist-Type Photoplethysmography During Physical Exercise.ICPR2018: 3766-3771]]>https://dblp.org/rec/conf/icpr/HeYLXLHS18Mon, 01 Jan 2018 00:00:00 +0100An RFID Based Smartphone Proximity Absence Alert System.https://doi.org/10.1109/TMC.2016.2591524Muhammad Jawad Hussain, Li Lu, Shan Gao: An RFID Based Smartphone Proximity Absence Alert System.IEEE Trans. Mob. Comput.16(5): 1246-1257 (2017)]]>https://dblp.org/rec/journals/tmc/HussainLG17Sun, 01 Jan 2017 00:00:00 +0100ShakeIn: Secure User Authentication of Smartphones with Single-Handed Shakes.https://doi.org/10.1109/TMC.2017.2651820Hongzi Zhu, Jingmei Hu, Shan Chang, Li Lu: ShakeIn: Secure User Authentication of Smartphones with Single-Handed Shakes.IEEE Trans. Mob. Comput.16(10): 2901-2912 (2017)]]>https://dblp.org/rec/journals/tmc/ZhuHCL17Sun, 01 Jan 2017 00:00:00 +0100Detecting Clocking Attack in Contactless Access Control Systems.https://doi.org/10.1109/CBD.2017.56Guixiang Tian, Li Lu, Muhammad Jawad Hussain: Detecting Clocking Attack in Contactless Access Control Systems.CBD2017: 285-290]]>https://dblp.org/rec/conf/cbd/TianLH17Sun, 01 Jan 2017 00:00:00 +0100Secure and Private RFID-Enabled Third-Party Supply Chain Systems.https://doi.org/10.1109/TC.2016.2538260Saiyu Qi, Yuanqing Zheng, Mo Li, Li Lu, Yunhao Liu: Secure and Private RFID-Enabled Third-Party Supply Chain Systems.IEEE Trans. Computers65(11): 3413-3426 (2016)]]>https://dblp.org/rec/journals/tc/QiZLLL16Fri, 01 Jan 2016 00:00:00 +0100PURE: Blind Regression Modeling for Low Quality Data with Participatory Sensing.https://doi.org/10.1109/TPDS.2015.2427805Shan Chang, Hongzi Zhu, Wei Zhang, Li Lu, Yanmin Zhu: PURE: Blind Regression Modeling for Low Quality Data with Participatory Sensing.IEEE Trans. Parallel Distributed Syst.27(4): 1199-1211 (2016)]]>https://dblp.org/rec/journals/tpds/ChangZZLZ16Fri, 01 Jan 2016 00:00:00 +0100POST: Exploiting Dynamic Sociality for Mobile Advertising in Vehicular Networks.https://doi.org/10.1109/TPDS.2015.2467392Jun Qin, Hongzi Zhu, Yanmin Zhu, Li Lu, Guangtao Xue, Minglu Li: POST: Exploiting Dynamic Sociality for Mobile Advertising in Vehicular Networks.IEEE Trans. Parallel Distributed Syst.27(6): 1770-1782 (2016)]]>https://dblp.org/rec/journals/tpds/QinZZLXL16Fri, 01 Jan 2016 00:00:00 +0100A FMCW-Based Cross Layer RF Distance Bounding Scheme.https://doi.org/10.1109/TWC.2016.2532858Li Lu, Muhammad Jawad Hussain, Zhigang Han: A FMCW-Based Cross Layer RF Distance Bounding Scheme.IEEE Trans. Wirel. Commun.15(6): 4009-4016 (2016)]]>https://dblp.org/rec/journals/twc/LuHH16Fri, 01 Jan 2016 00:00:00 +0100RUPS: Fixing Relative Distances among Urban Vehicles with Context-Aware Trajectories.https://doi.org/10.1109/IPDPS.2016.20Hongzi Zhu, Shan Chang, Li Lu, Wei Zhang: RUPS: Fixing Relative Distances among Urban Vehicles with Context-Aware Trajectories.IPDPS2016: 123-131]]>https://dblp.org/rec/conf/ipps/ZhuCLZ16Fri, 01 Jan 2016 00:00:00 +0100R2: Over-the-air reprogramming on computational RFIDs.https://doi.org/10.1109/RFID.2016.7488004Die Wu, Muhammad Jawad Hussain, Songfan Li, Li Lu: R2: Over-the-air reprogramming on computational RFIDs.IEEE RFID2016: 47-54]]>https://dblp.org/rec/conf/rfid/WuHLL16Fri, 01 Jan 2016 00:00:00 +0100ACTION: Breaking the Privacy Barrier for RFID Systems.http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-24-number-1-2-2014/ahswn-24-1-2-p-135-159/Li Lu, Yunhao Liu, Jinsong Han: ACTION: Breaking the Privacy Barrier for RFID Systems.Ad Hoc Sens. Wirel. Networks24(1-2): 135-159 (2015)]]>https://dblp.org/rec/journals/ahswn/LuLH15Thu, 01 Jan 2015 00:00:00 +0100BEST: a bidirectional efficiency-privacy transferable authentication protocol for RFID-enabled supply chain.https://doi.org/10.1504/IJAHUC.2015.069061Saiyu Qi, Li Lu, Zhenjiang Li, Mo Li: BEST: a bidirectional efficiency-privacy transferable authentication protocol for RFID-enabled supply chain.Int. J. Ad Hoc Ubiquitous Comput.18(4): 234-244 (2015)]]>https://dblp.org/rec/journals/ijahuc/QiLLL15Thu, 01 Jan 2015 00:00:00 +0100Pworm: Passive and Real-Time Wormhole Detection Scheme for WSNs.https://doi.org/10.1155/2015/356382Li Lu, Muhammad Jawad Hussain, Guoxing Luo, Zhigang Han: Pworm: Passive and Real-Time Wormhole Detection Scheme for WSNs.Int. J. Distributed Sens. Networks11: 356382:1-356382:16 (2015)]]>https://dblp.org/rec/journals/ijdsn/LuHLH15Thu, 01 Jan 2015 00:00:00 +0100Improved perception-based spiking neuron learning rule for real-time user authentication.https://doi.org/10.1016/j.neucom.2014.09.034Hong Qu, Xiurui Xie, Yongshuai Liu, Malu Zhang, Li Lu: Improved perception-based spiking neuron learning rule for real-time user authentication.Neurocomputing151: 310-318 (2015)]]>https://dblp.org/rec/journals/ijon/QuXLZL15Thu, 01 Jan 2015 00:00:00 +0100Vulnerability aware graphs for RFID protocol security benchmarking.https://doi.org/10.1016/j.jcss.2014.12.015Shan Chang, Li Lu, Xiaoqiang Liu, Hui Song, Qingsong Yao: Vulnerability aware graphs for RFID protocol security benchmarking.J. Comput. Syst. Sci.81(6): 1027-1041 (2015)]]>https://dblp.org/rec/journals/jcss/ChangLLSY15Thu, 01 Jan 2015 00:00:00 +0100From Interest to Location: Neighbor-Based Friend Recommendation in Social Media.https://doi.org/10.1007/s11390-015-1593-3Jin-Qi Zhu, Li Lu, Chun-Mei Ma: From Interest to Location: Neighbor-Based Friend Recommendation in Social Media.J. Comput. Sci. Technol.30(6): 1188-1200 (2015)]]>https://dblp.org/rec/journals/jcst/ZhuLM15Thu, 01 Jan 2015 00:00:00 +0100Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics.https://doi.org/10.1109/TCSS.2016.2517648Li Lu, Yongshuai Liu: Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics.IEEE Trans. Comput. Soc. Syst.2(3): 53-64 (2015)]]>https://dblp.org/rec/journals/tcss/LuL15Thu, 01 Jan 2015 00:00:00 +0100TIGHT: A Cross-Layer RF Distance Bounding Realization for Passive Wireless Devices.https://doi.org/10.1109/TWC.2015.2400440Muhammad Jawad Hussain, Li Lu, Hongzi Zhu: TIGHT: A Cross-Layer RF Distance Bounding Realization for Passive Wireless Devices.IEEE Trans. Wirel. Commun.14(6): 3076-3085 (2015)]]>https://dblp.org/rec/journals/twc/HussainLZ15Thu, 01 Jan 2015 00:00:00 +0100RTS Assisted Mobile Localization: Mitigating Jigsaw Puzzle Problem of Fingerprint Space with Extra Mile.https://doi.org/10.1109/MASS.2015.43Chao Song, Jie Wu, Li Lu, Ming Liu: RTS Assisted Mobile Localization: Mitigating Jigsaw Puzzle Problem of Fingerprint Space with Extra Mile.MASS2015: 434-442]]>https://dblp.org/rec/conf/mass/SongWLL15Thu, 01 Jan 2015 00:00:00 +0100FastID: An undeceived router for real-time identification of WiFi terminals.https://doi.org/10.1109/IFIPNetworking.2015.7145328Li Lu, Runzhe Wang, Jing Ding, Wubin Mao, Wei Chen, Hongzi Zhu: FastID: An undeceived router for real-time identification of WiFi terminals.Networking2015: 1-9]]>https://dblp.org/rec/conf/networking/LuWDMCZ15Thu, 01 Jan 2015 00:00:00 +0100Wireless firmware execution control in computational RFID systems.https://doi.org/10.1109/RFID.2015.7113083Wenyu Yang, Die Wu, Muhammad Jawad Hussain, Li Lu: Wireless firmware execution control in computational RFID systems.IEEE RFID2015: 129-136]]>https://dblp.org/rec/conf/rfid/YangWHL15Thu, 01 Jan 2015 00:00:00 +0100WiGen: Breaking the Privacy and Security Barriers for Group Management in RFID Systems.https://doi.org/10.1109/Trustcom.2015.412Li Lu, Muhammad Jawad Hussain, Hongzi Zhu: WiGen: Breaking the Privacy and Security Barriers for Group Management in RFID Systems.TrustCom/BigDataSE/ISPA (1)2015: 499-506]]>https://dblp.org/rec/conf/trustcom/LuHZ15Thu, 01 Jan 2015 00:00:00 +0100Real-time and passive wormhole detection for wireless sensor networks.https://doi.org/10.1109/PADSW.2014.7097858Guoxing Luo, Zhigang Han, Li Lu, Muhammad Jawad Hussain: Real-time and passive wormhole detection for wireless sensor networks.ICPADS2014: 592-599]]>https://dblp.org/rec/conf/icpads/LuoHLH14Wed, 01 Jan 2014 00:00:00 +0100COLLECTOR: A secure RFID-enabled batch recall protocol.https://doi.org/10.1109/INFOCOM.2014.6848086Saiyu Qi, Yuanqing Zheng, Mo Li, Li Lu, Yunhao Liu: COLLECTOR: A secure RFID-enabled batch recall protocol.INFOCOM2014: 1510-1518]]>https://dblp.org/rec/conf/infocom/QiZLLL14Wed, 01 Jan 2014 00:00:00 +0100POST: Exploiting dynamic sociality for mobile advertising in vehicular networks.https://doi.org/10.1109/INFOCOM.2014.6848114Jun Qin, Hongzi Zhu, Yanmin Zhu, Li Lu, Guangtao Xue, Minglu Li: POST: Exploiting dynamic sociality for mobile advertising in vehicular networks.INFOCOM2014: 1761-1769]]>https://dblp.org/rec/conf/infocom/QinZZLXL14Wed, 01 Jan 2014 00:00:00 +0100Partial Probing for Scaling Overlay Routing.https://doi.org/10.1109/TPDS.2012.326Deke Guo, Hai Jin, Tao Chen, Jie Wu, Li Lu, Dongsheng Li, Xiaolei Zhou: Partial Probing for Scaling Overlay Routing.IEEE Trans. Parallel Distributed Syst.24(11): 2261-2272 (2013)]]>https://dblp.org/rec/journals/tpds/GuoJCWLLZ13Tue, 01 Jan 2013 00:00:00 +0100Random Graph Based Benchmarking Methodology for RFID Security Protocols.https://doi.org/10.1109/ICEBE.2013.28Shan Chang, Hui Song, Li Lu, Qingsong Yao, Yong Qi: Random Graph Based Benchmarking Methodology for RFID Security Protocols.ICEBE2013: 184-191]]>https://dblp.org/rec/conf/icebe/ChangSLYQ13Tue, 01 Jan 2013 00:00:00 +0100Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems.https://doi.org/10.1155/2012/153912Li Lu, Jinsong Han, Lei Hu, Lionel M. Ni: Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems.Int. J. Distributed Sens. Networks8 (2012)]]>https://dblp.org/rec/journals/ijdsn/LuHHN12Sun, 01 Jan 2012 00:00:00 +0100BEST: A Bidirectional Efficiency-Privacy Transferable Authentication Protocol for RFID-Enabled Supply Chain.https://doi.org/10.1109/ICPADS.2012.65Saiyu Qi, Li Lu, Zhenjiang Li, Mo Li: BEST: A Bidirectional Efficiency-Privacy Transferable Authentication Protocol for RFID-Enabled Supply Chain.ICPADS2012: 424-431]]>https://dblp.org/rec/conf/icpads/QiLLL12Sun, 01 Jan 2012 00:00:00 +0100Analysis on Token-Controlled Public Key Encryption.https://doi.org/10.1109/MSN.2012.18Changlu Lin, Yong Li, Sriramkrishnan Srinivasan, Li Lu: Analysis on Token-Controlled Public Key Encryption.MSN2012: 87-91]]>https://dblp.org/rec/conf/msn/LinLSL12Sun, 01 Jan 2012 00:00:00 +0100Security Analysis of an Improved MFE Public Key Cryptosystem.https://doi.org/10.1007/978-3-642-25513-7_9Xuyun Nie, Zhaohu Xu, Li Lu, Yongjian Liao: Security Analysis of an Improved MFE Public Key Cryptosystem.CANS2011: 118-125]]>https://dblp.org/rec/conf/cans/NieXLL11Sat, 01 Jan 2011 00:00:00 +0100Refresh: Weak Privacy Model for RFID Systems.https://doi.org/10.1109/INFCOM.2010.5462153Li Lu, Yunhao Liu, Xiang-Yang Li: Refresh: Weak Privacy Model for RFID Systems.INFOCOM2010: 704-712]]>https://dblp.org/rec/conf/infocom/LuLL10Fri, 01 Jan 2010 00:00:00 +0100ACTION: Breaking the Privacy Barrier for RFID Systems.https://doi.org/10.1109/INFCOM.2009.5062117Li Lu, Jinsong Han, Renyi Xiao, Yunhao Liu: ACTION: Breaking the Privacy Barrier for RFID Systems.INFOCOM2009: 1953-1961]]>https://dblp.org/rec/conf/infocom/LuHXL09Thu, 01 Jan 2009 00:00:00 +0100Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps.https://doi.org/10.1109/TPDS.2008.15Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Huai, Lionel M. Ni, Jian Ma: Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps.IEEE Trans. Parallel Distributed Syst.19(10): 1325-1337 (2008)]]>https://dblp.org/rec/journals/tpds/LuHLHHNM08Tue, 01 Jan 2008 00:00:00 +0100Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols.https://doi.org/10.1109/IPDPS.2007.370284Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao Liu, Lionel M. Ni: Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols.IPDPS2007: 1-10]]>https://dblp.org/rec/conf/ipps/LuHHHLN07Mon, 01 Jan 2007 00:00:00 +0100Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems.https://doi.org/10.1109/PERCOM.2007.13Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. Ni: Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems.PerCom2007: 13-22]]>https://dblp.org/rec/conf/percom/LuHHLN07Mon, 01 Jan 2007 00:00:00 +0100Storage-Awareness: RFID Private Authentication based on Sparse Tree.https://doi.org/10.1109/SECPERU.2007.13Weijia Wang, Yong Li, Lei Hu, Li Lu: Storage-Awareness: RFID Private Authentication based on Sparse Tree.SECPerU2007: 61-66]]>https://dblp.org/rec/conf/secperu/Wang0HL07Mon, 01 Jan 2007 00:00:00 +0100Privacy-preserving authentication with low computational overhead for RFID systems.https://doi.org/10.1109/SECCOM.2007.4550319Fen Liu, Lei Hu, Li Lu, Weijia Wang: Privacy-preserving authentication with low computational overhead for RFID systems.SecureComm2007: 127-132]]>https://dblp.org/rec/conf/securecomm/LiuHLW07Mon, 01 Jan 2007 00:00:00 +0100Pairing-Based Multi-Recipient Public Key Encryption.https://dblp.org/pid/49/2793-1.htmlLi Lu, Lei Hu: Pairing-Based Multi-Recipient Public Key Encryption.Security and Management2006: 159-165]]>https://dblp.org/rec/conf/csreaSAM/LuH06Sun, 01 Jan 2006 00:00:00 +0100A Random Walk Based Anonymous Peer-to-Peer Protocol Design.https://doi.org/10.1007/11534310_17Jinsong Han, Yunhao Liu, Li Lu, Lei Hu, Abhishek P. Patil: A Random Walk Based Anonymous Peer-to-Peer Protocol Design.ICCNMC2005: 143-152]]>https://dblp.org/rec/conf/iccnmc/HanLLHP05Sat, 01 Jan 2005 00:00:00 +0100