用于手部可穿戴设备的基于直拳动作检测的用户认证方法
Published:
Recommended citation: Jiadi Yu, Guancheng Liang, Li Lu, Xiangyu Xu. "用于手部可穿戴设备的基于直拳动作检测的用户认证方法." ZL201710328296.3. 2018. China.
Published:
Recommended citation: Jiadi Yu, Guancheng Liang, Li Lu, Xiangyu Xu. "用于手部可穿戴设备的基于直拳动作检测的用户认证方法." ZL201710328296.3. 2018. China.
Published:
I am the first student inventor and the major contributor of this patent.
Recommended citation: Jiadi Yu, Li Lu. "基于滑动式交互操作的推荐系统及方法." ZL201710315487.6. 2018. China.
Published:
I am the first student inventor and the major contributor of this patent.
Recommended citation: Jiadi Yu, Li Lu. "基于智能终端的声音装置进行唇读的用户认证方法及系统." ZL201710952236.9. 2018. China.
Published:
I am the first student inventor and the major contributor of this patent.
Recommended citation: Jiadi Yu, Li Lu. "远距离用户触控屏上全键盘输入获取方法." ZL201810410015.3. 2019. China.
Published:
I am the first student inventor and the major contributor of this patent.
Recommended citation: Guangtao Xue, Li Lu, Jiadi Yu, Shiyou Qian. "基于混合扩展方式的云端虚拟机的优化配置方法及其系统." ZL201610668665.9. 2019. China.
Published:
Recommended citation: Jiadi Yu, Hao Kong, Li Lu. "基于细粒度手指姿态的智能家居连续用户认证方法及系统." ZL201811206918.6. 2020. China.
Published:
I am the first student inventor and the major contributor of this patent.
Recommended citation: Jiadi Yu, Li Lu. "基于FMCW与特征表达迁移的声道用户验证方法及系统." ZL201910586991.9. 2020. China.
Published:
Recommended citation: Jiadi Yu, Hao Kong, Li Lu. "基于无线信号进行姿态无关的连续用户认证方法及系统." ZL201911140817.8. 2020. China.
Published:
Recommended citation: Jiadi Yu, Hao Kong, Li Lu. "基于无线信号进行多人用户认证方法及系统." ZL202011081529.2. 2021. China.
Published:
Recommended citation: Shui Long, Li Lu, Jiadi Yu. "基于Wi-Fi识别系统的信号转换方法." ZL202011043349.5. 2022. China.
Published:
Recommended citation: Li Lu, Lei Wang, Zhongjie Ba, Kui Ren. "基于内建传感器欠采样数据的通用语音信息恢复装置及方法." ZL202110615983.X. 2022. China.
Published:
Recommended citation: Li Lu, Meng Chen, Zhongjie Ba, Kui Ren. "基于神经网络生成模型的音素级声纹识别对抗样本构造系统和方法." ZL202111178765.0. 2024. China.
Published in Conference on Advanced Computer Architecture (CCF ACA 2016), 2016
Annual Conference on Adbanced Computer Architecture of China is the premier conference of computer system architecture in China.
Recommended citation: Ahmad Ali, Li Lu, Yanmin Zhu, Jiadi Yu. "An Energy Efficient Algorithm for Virtual Machine Allocation in Cloud Datacenters." Proceedings of Conference on Advanced Computer Architecture (CCF ACA). Weihai, Shandong, China. pp. 61-72. 2016. doi: 10.1007/978-981-10-2209-8_6.
Published in IEEE International Conference on Communications (IEEE ICC 2017), 2017
IEEE International Conference on Communications is the flagship conference of IEEE Communication Society (IEEE ComSoc). ICC is also a CCF-C conference.
Recommended citation: Li Lu, Jiadi Yu, Yanmin Zhu, Guangtao Xue, Shiyou Qian, Minglu Li. "Cost-Efficient VM Configuration Algorithm in the Cloud using Mix Scaling Strategy." Proceedings of IEEE International Conference on Communications (IEEE ICC). Paris, France. pp. 1-6. 2017. doi: 10.1109/ICC.2017.7997241.
Published in International Conference on Web Information Systems Engineering (WISE 2017), 2017
WISE is a CCF-C conference.
Recommended citation: Yanhua Cao, Li Lu, Jiadi Yu, Shiyou Qian, Yanmin Zhu, Minglu Li, Jian Cao, Zhong Wang, Juan Li, Guangtao Xue. "Online Cost-Aware Service Requests Scheduling in Hybrid Clouds for Cloud Bursting." Proceedings of International Conference on Web Information Systems Engineering (WISE). Moscow, Russia. pp. 259-274. 2017. doi: 10.1007/978-3-319-68783-4_18.
Published in IEEE Transactions on Parallel and Distributed Systems, 2017
IEEE TPDS is a CCF-A journal.
Recommended citation: Li Lu, Jiadi Yu, Yanmin Zhu, Minglu Li. "A Double Auction Mechanism to Bridge Users Task Requirements and Providers Resources in Two-Sided Cloud Markets." IEEE Transactions on Parallel and Distributed Systems. 29(4). pp. 720-733. 2018. doi: 10.1109/TPDS.2017.2781236.
Published in IEEE International Conference on Computer Communications (IEEE INFOCOM 2018), 2018
IEEE International Conference on Computer Communications is a top ranked international conference in computer networking and communication. IEEE INFOCOM is also a CCF-A conference.
Recommended citation: Li Lu, Jiadi Yu, Yingying Chen, Hongbo Liu, Yanmin Zhu, Yunfei Liu, Minglu Li. "LipPass: Lip Reading-based User Authentication Leveraging Acoustic Signals on Smartphones." Proceedings of IEEE International Conference on Computer Communications (IEEE INFOCOM). Honolulu, HI, USA. pp. 1466-1474. 2018. doi: 10.1109/INFOCOM.2018.8486283.
Published in Parallel Computing, 2018
PARCOM is a CCF-B journal.
Recommended citation: Yanhua Cao, Li Lu, Jiadi Yu, Shiyou Qian, Yanmin Zhu, Minglu Li. "Online Cost-rejection Rate Scheduling for Resource Requests in Hybrid Clouds." Parallel Computing. 81(1). pp. 85-103. 2018. doi: 10.1016/j.parco.2018.12.003.
Published in IEEE/ACM Transactions on Networking, 2019
This work was reported by IEEE Spectrum on Feburary, 2019.
Recommended citation: Li Lu, Jiadi Yu, Yingying Chen, Hongbo Liu, Yanmin Zhu, Linghe Kong, Minglu Li. "Lip Reading-based User Authentication through Acoustic Sensing on Smartphones." IEEE/ACM Transactions on Networking. 27(1). pp. 447-460. 2019. doi: 10.1109/TNET.2019.2891733.
Published in The 24th International Conference on Parallel and Distributed Systems (IEEE ICPADS 2018), 2019
IEEE ICPADS is a CCF-C conference.
Recommended citation: Li Lu, Jian Liu, Jiadi Yu, Yingying Chen, Yanmin Zhu, Xiangyu Xu, Minglu Li. "VPad: Virtual Writing Tablet for Laptops Leveraging Acoustic Signals." Proceedings of International Conference on Parallel and Distributed Systems (IEEE ICPADS). Sentosa, Singapore. pp. 244-251. 2018. doi: 10.1109/PADSW.2018.8644615.
Published in IEEE International Conference on Computer Communications (IEEE INFOCOM 2019), 2019
IEEE International Conference on Computer Communications is a top ranked international conference in computer networking and communication. IEEE INFOCOM is also a CCF-A conference.
Recommended citation: Li Lu, Jiadi Yu, Yingying Chen, Yanmin Zhu, Xiangyu Xu, Guangtao Xue, Minglu Li. "KeyListener: Inferring Keystrokes on QWERTY Keyboard of Touch Screen through Acoustic Signals." Proceedings of IEEE International Conference on Computer Communications (IEEE INFOCOM). Paris, France. pp. 775-783. 2019. doi: 10.1109/INFOCOM.2019.8737591.
Published in ACM International Symposium on Mobile Ad Hoc Networking and Computing (ACM MobiHoc 2019), 2019
I am the co-first author of this paper. ACM International Symposium on Mobile Ad Hoc Networking and Computing is the premier international conference in mobile networking and computing. ACM MobiHoc is also a CCF-B conference.
Recommended citation: Hao Kong, Li Lu, Jiadi Yu, Yingying Chen, Yanmin Zhu, Linghe Kong, Minglu Li. "FingerPass: Finger Gesture-based Continuous User Authentication for Smart Homes Using Commodity WiFi." Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing (ACM MobiHoc). Catania, Italy. pp. 201-210. 2019. doi: 10.1145/3323679.3326518.
Published in IEEE International Conference on Sensing, Communication and Networking (IEEE SECON 2019), 2019
IEEE International Conference on Sensing, Communication and Networking is a famous international conference in sensing and communication. IEEE SECON is also a CCF-B conference.
Recommended citation: Hua Xue, Jiadi Yu, Yanmin Zhu, Li Lu, Shiyou Qian, Minglu Li. "WiZoom: Accurate Multipath Profiling using Commodity WiFi Devices with Limited Bandwidth." Proceedings of IEEE International Conference on Sensing, Communication and Networking (IEEE SECON). Boston, MA, USA. pp. 1-9. 2019. doi: 10.1109/SAHCN.2019.8824859.
Published in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2019
Proceedings of ACM Interaction Mobile Wearable Ubiquitous Technology is the premier international journal in ubiquitous computing, which is previously the top ranked international conference ACM UbiComp. This paper was also presented in ACM UbiComp 2019. ACM UbiComp is a CCF-A conference.
Recommended citation: Li Lu, Jiadi Yu, Yingying Chen, Yanmin Zhu, Minglu Li, Xiangyu Xu. "I^3: Sensing Scrolling Human-Computer Interactions for Intelligent Interest Inference on Smartphones." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT). 3(3), pp. 97:1-97:22. London, England. 2019. doi: 10.1145/3351255.
Published in IEEE Transactions on Mobile Computing, 2019
I am the first student author of this paper. IEEE Transactions on Mobile Computing is the premier international journal on mobile computing and communication. IEEE TMC is a CCF-A journal.
Recommended citation: Jiadi Yu, Li Lu, Yingying Chen, Yanmin Zhu, Linghe Kong. "An Indirect Eavesdropping Attack of Keystrokes on Touch Screen through Acoustic Sensing." IEEE Transactions on Mobile Computing. vol. 20, no. 2, pp. 337-351. 2020. doi: 10.1109/TMC.2019.2947468.
Published in ACM Annual International Conference on Mobile Computing and Networking (ACM MobiCom 2019), 2019
This work received the first runner-up poster award of ACM MobiCom 2019.
Recommended citation: Yang Bai, Jian Liu, Yingying Chen, Li Lu, Jiadi Yu. "Poster: Inaudible High-throughput Communication Through Acoustic Signals." Proceedings of ACM Annual International Conference on Mobile Computing and Networking (ACM MobiCom). Los Cabos, Mexico. pp. 79:1-79:3. 2019. doi: 10.1145/3300061.3343405.
Published in The Computer Journal, 2020
The Computer Journal is a CCF-B journal.
Recommended citation: Li Lu, Jian Liu, Jiadi Yu, Yingying Chen, Yanmin Zhu, Linghe Kong, Minglu Li. "Enable Traditional Laptops with Virtual Writing Capability Leveraging Acoustic Signals." The Computer Journal. vol. 64, no. 12, pp. 1814–1831. 2021. doi: 10.1093/comjnl/bxz153.
Published in The 25th International Conference on Parallel and Distributed Systems (IEEE ICPADS 2019), 2020
IEEE ICPADS is a CCF-C conference.
Recommended citation: Qiang Wu, Jiadi Yu, Li Lu, Shiyou Qian, Guangtao Xue. " Dynamically Adjusting Scale of a Kubernetes Cluster Under QoS Guarantee." Proceedings of International Conference on Parallel and Distributed Systems (IEEE ICPADS). Tianjin, China. pp. 193-200. 2019. doi: 10.1109/ICPADS47876.2019.00037.
Published in IEEE Transactions on Mobile Computing, 2020
IEEE Transactions on Mobile Computing is the premier international journal on mobile computing and communication. IEEE TMC is a CCF-A journal.
Recommended citation: Hao Kong, Li Lu, Jiadi Yu, Yingying Chen, Feilong Tang. "Continuous Authentication through Finger Gesture Interaction for Smart Homes Using WiFi." IEEE Transactions on Mobile Computing. vol. 20, no. 11, pp. 3148-3162, 2020. doi: 10.1109/TMC.2020.2994955.
Published in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2020
Proceedings of ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies is the premier international journal in ubiquitous computing, which is previously the top ranked international conference ACM UbiComp. This paper was also presented in ACM UbiComp 2020. ACM UbiComp is a CCF-A conference.
Recommended citation: Li Lu, Jiadi Yu, Yingying Chen, Yan Wang. "VocalLock: Sensing Vocal Tract for Passphrase-Independent User Authentication Leveraging Acoustic Signals on Smartphones." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT). 4(2), pp. 51:1-51:24. Cancun, Mexico. 2020. doi: 10.1145/3397320.
Published in Chinese Journal of Computers (计算机学报), 2020
Chinese Journal of Computers (计算机学报) is the top-level journal in the field of computer science and engineering of China. This journal is also a T1 Chinese high-quality technical journal in computing domain.
Recommended citation: Li Lu, Jiadi Yu, Minglu Li. "Towards a Real-Time Anti-Theft Method for Mobile Devices Leveraging Acoustic Sensing." Chinese Journal of Computers. 43(10). pp. 2002-2018. 2020. doi: 10.11897/SP.J.1016.2020.02002.
Published in The 18th ACM Conference on Embedded Networked Sensor Systems (ACM SenSys 2020), 2020
ACM Conference on Embedded Networked Sensor Systems is the premier international conference in embedded sensing and networking systems. ACM SenSys is also a CCF-B conference.
Recommended citation: Yang Bai, Jian Liu, Li Lu, Yilin Yang, Yingying Chen, Jiadi Yu. "BatComm: Enabling Inaudible Acoustic Communication with High-throughput for Mobile Devices." Proceedings of ACM Conference on Embedded Networked Sensor Systems (ACM SenSys). Yokohama, Japan. 2020. doi: 10.1145/3384419.3430773.
Published in Computer Networks, 2020
Computer Networks is a famous international journal on computer networks and communications, which is published by Springer. Computer Networks is a CCF-B journal.
Recommended citation: Yang Bai, Li Lu, Jerry Cheng, Jian Liu, Yingying Chen, Jiadi Yu. "Acoustic-based Sensing and Applications: A Survey." Computer Networks. vol. 181, pp. 107447:1-107447:19, 2020. doi: 10.1016/j.comnet.2020.107447.
Published in ACM International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing (ACM MobiHoc 2021), 2021
ACM International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing is the premier international conference in mobile networking and computing. ACM MobiHoc is also a CCF-B conference.
Recommended citation: Hao Kong, Li Lu, Jiadi Yu, Yingying Chen, Xiangyu Xu, Feilong Tang, Yi-Chao Chen. "MultiAuth: Enable Multi-User Authentication with Single Commodity WiFi Device." Proceedings of ACM International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing (ACM MobiHoc). Shanghai, China. pp. 31-40. 2021. doi: 10.1145/3466772.3467032.
Published in Smart Health, 2021
This paper is an invited paper of IEEE/ACM Conference on Connected Health Applications, Systems, and Engineering Technologies (IEEE/ACM CHASE 2021), and was presented in the conference.
Recommended citation: Cong Shi, Li Lu, Jian Liu, Yan Wang, Yingying Chen, Jiadi Yu. "mPose: Environment- and subject-agnostic 3D skeleton posture reconstruction leveraging a single mmWave device." Smart Health. vol. 23, pp. 100228:1-100228:14, 2022. doi: 10.1016/j.smhl.2021.100228.
Published in IEEE International Conference on Computer Communications (IEEE INFOCOM 2022), 2022
IEEE International Conference on Computer Communications is a top ranked international conference in computer networking and communication. IEEE INFOCOM is also a CCF-A conference. I am the corresponding author of this paper.
Recommended citation: Meng Chen, Li Lu*, Zhongjie Ba, Kui Ren. "PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition." Proceedings of IEEE International Conference on Computer Communications (IEEE INFOCOM). London, United Kingdom. pp. 1419-1428. 2022. doi: 10.1109/INFOCOM48880.2022.9796934.
Published in The 28th Annual Conference on Mobile Computing and Networking (ACM MobiCom 2022), 2022
This work received the Best Poster Runner-up Award of ACM MobiCom 2022.
Recommended citation: Meng Chen, Li Lu*, Jiadi Yu, Yingying Chen, Zhongjie Ba, Feng Lin, Kui Ren. "A Non-intrusive and Adaptive Speaker De-Identification Scheme Using Adversarial Examples." Proceedings of the 28th Annual Conference on Mobile Computing and Networking (ACM MobiCom 2022). Sydney, Australia. pp. 853-855. 2022. doi: 10.1145/3495243.3558260.
Published in IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2022), 2022
IEEE International Conference on Distributed Computing Systems is a premier international conference in distrubited computing and communication areas. IEEE ICDCS is also a CCF-B conference.
Recommended citation: Li Lu*, Zhongjie Ba, Feng Lin, Jinsong Han, Kui Ren. "ActListener: Imperceptible Activity Surveillance by Pervasive Wireless Infrastructures." Proceedings of IEEE International Conference on Distributed Computing Systems (IEEE ICDCS). Bologna, Italy. pp. 776-786. 2022. doi: 10.1109/ICDCS54860.2022.00080.
Published in The 20th ACM Conference on Embedded Networked Sensor Systems (ACM SenSys 2022), 2022
ACM Conference on Embedded Networked Sensor Systems is the premier international conference in embedded sensing and networking systems. ACM SenSys is also one of the conferences in Mobile Computing of CSRankings and a CCF-B conference. I am the corresponding author of this paper.
Recommended citation: Qianniu Chen, Meng Chen, Li Lu*, Jiadi Yu, Yingying Chen, Zhibo Wang, Zhongjie Ba, Feng Lin, Kui Ren. "Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain." Proceedings of ACM Conference on Embedded Networked Sensor Systems (ACM SenSys). Boston, MA, USA. pp. 710-724. 2022. doi: 10.1145/3560905.3568518.
Published in IEEE/ACM Transactions on Networking, 2022
IEEE/ACM Transactions on Networking is a premier journal on computer networking and communications, which is co-sponsored by IEEE ComSoc, IEEE CS and ACM with SIGCOMM. IEEE/ACM ToN is a CCF-A journal. I am the corresponding author of this paper.
Recommended citation: Hao Kong, Li Lu*, Jiadi Yu, Yingying Chen, Xiangyu Xu, Feng Lyu. "Towards Multi-User Authentication Using WiFi Signals." IEEE/ACM Transactions on Networking. vol. 31, no. 5, pp. 2117-2132. 2023. doi: 10.1109/TNET.2023.3237686.
Published in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2023
Proceedings of ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies is the premier international journal in ubiquitous computing, which was previously the top ranked international conference ACM UbiComp. ACM UbiComp is a CCF-A conference.
Recommended citation: Lei Wang, Meng Chen, Li Lu*, Zhongjie Ba, Feng Lin, Kui Ren. "VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT). 7(1), pp. 32:1-32:22. Cancun, Mexico. 2023. doi: 10.1145/3580789.
Published in Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (IEEE ICASSP), 2023
IEEE International Conference on Acoustics, Speech and Signal Processing is the flagship journal of IEEE Signal Processing Society. IEEE ICASSP is a CCF-B conference.
Recommended citation: Junhao Wang, Li Lu*, Zhongjie Ba, Feng Lin, Kui Ren. "Shift to Your Device: Data Augmentation for Device-Independent Speaker Verification Anti-Spoofing." Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (IEEE ICASSP). Rhodes Island, Greece. 2023. doi: 10.1109/ICASSP49357.2023.10097168.
Published in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2023
Proceedings of ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies is the premier international journal in ubiquitous computing, which was previously the top ranked international conference ACM UbiComp. ACM UbiComp is a CCF-A conference.
Recommended citation: Meng Chen, Li Lu*, Junhao Wang, Jiadi Yu, Yingying Chen, Zhibo Wang, Zhongjie Ba, Feng Lin, Kui Ren. "VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT). 7(2), pp. 48:1-48:21. Cancun, Mexico. 2023. doi: 10.1145/3596266.
Published in Proceedings of IEEE International Conference on Mobility, Sensing and Networking (IEEE MSN 2023), 2023
IEEE MSN is a CCF-C conference.
Recommended citation: Qianniu Chen, Kang Fu, Li Lu*, Meng Chen, Zhongjie Ba, Feng Lin, Kui Ren. "BypTalker: An Adaptive Adversarial Example Attack to Bypass Prefilter-enabled Speaker Recognition." Proceedings of IEEE International Conference on Mobility, Sensing and Networking (IEEE MSN). Nanjing, Jiangsu, China. pp. 496-503. 2023. doi: 10.1109/MSN60784.2023.00077.
Published in IEEE Transactions on Information Forensics and Security, 2023
IEEE Transactions on Information Forensics and Security is a premier journal on information security and signal processing, which is sponsored by IEEE Signal Processing Society. IEEE TIFS is a CCF-A journal.
Recommended citation: Meng Chen, Li Lu*, Jiadi Yu, Zhongjie Ba, Feng Lin, Kui Ren. "AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception." IEEE Transactions on Information Forensics and Security. 19, pp. 1948-1962. 2024. doi: 10.1109/TIFS.2023.3345639.
Published in Proceedings of ACM IUI, 2024
ACM Conference on Intelligent User Interfaces is the annual premiere venue of the intersection of Artificial Intelligence (AI) and Human-Computer Interaction (HCI). ACM IUI is a CCF-B conference.
Recommended citation: Qianniu Chen, Zhehan Gu, Li Lu*, Xiangyu Xu, Zhongjie Ba, Feng Lin, Zhenguang Liu, Kui Ren. "Conan's Bow Tie: A Streaming Voice Conversion for Real-Time VTuber Livestreaming." Proceedings of ACM IUI. Greenville, SC, USA. pp. 35-50. 2024. doi: 10.1145/3640543.3645146.
Published in IEEE/ACM Transactions on Networking, 2024
IEEE/ACM Transactions on Networking is a premier journal on computer networking and communications, which is co-sponsored by IEEE ComSoc, IEEE CS and ACM with SIGCOMM. IEEE/ACM ToN is a CCF-A journal.
Recommended citation: Li Lu, Meng Chen, Zhongjie Ba, Feng Lin, Jinsong Han, Yanmin Zhu, Kui Ren. "An Imperceptible Eavesdropping Attack on WiFi Sensing Systems." IEEE/ACM Transactions on Networking. 32(5), pp. 4009-4024. 2024. doi: 10.1109/TNET.2024.3403839.
Published in Proceedings of USENIX Security Symposium, 2024
USENIX Security Symposium is one of the Big Four international conferences on cyber security. USENIX SEC is a CCF-A conference.
Recommended citation: Kun Wang, Xiangyu Xu, Li Lu*, Zhongjie Ba, Feng Lin, Kui Ren. "FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition." Proceedings of USENIX Security Symposium. Philadelphia, PA, USA. 2024. doi: to appear.
Published in Proceedings of USENIX Security Symposium, 2024
USENIX Security Symposium is one of the Big Four international conferences on cyber security. USENIX SEC is a CCF-A conference.
Recommended citation: Meng Chen, Xiangyu Xu, Li Lu*, Zhongjie Ba, Feng Lin, Kui Ren. "Devil in the Room: Triggering Audio Backdoors in the Physical World." Proceedings of USENIX Security Symposium. Philadelphia, PA, USA. 2024. doi: to appear.
Published:
Benefiting from the pay-per-use pricing model of cloud computing, many companies migrate their services and applications from typical expensive infrastructures to the cloud. However, due to fluctuations in the workload of services and applications, making a cost-efficient VM configuration decision in the cloud remains a critical challenge. Even experienced administrators cannot accurately predict the workload in the future. Since the pricing model of cloud provider is convex other than linear that often assumed in past research, instead of typical scaling out strategy. In this paper, we adopt mix scale strategy. Based on this observation, we model an optimization problem aiming to minimize the VM configuration cost under the constraint of migration delay. Taking advantages of Lyapunov optimization techniques, we propose a mix scale online algorithm which achieves more cost-efficiency than that of scale out strategy.
Published:
To prevent users’ privacy from leakage, more and more mobile devices employ biometric-based authentication approaches, such as fingerprint, face recognition, voiceprint authentications, etc., to enhance the privacy protection. However, these approaches are vulnerable to replay attacks. Although state-of-art solutions utilize liveness verification to combat the attacks, existing approaches are sensitive to ambient environments, such as ambient lights and surrounding audible noises. Towards this end, we explore liveness verification of user authentication leveraging users’ lip movements, which are robust to noisy environments. In this paper, we propose a lip reading-based user authentication system, $LipPass$, which extracts unique behavioral characteristics of users’ speaking lips leveraging build-in audio devices on smartphones for user authentication. We first investigate Doppler profiles of acoustic signals caused by users’ speaking lips, and find that there are unique lip movement patterns for different individuals. To characterize the lip movements, we propose a deep learning-based method to extract efficient features from Doppler profiles, and employ Support Vector Machine and Support Vector Domain Description to construct binary classifiers and spoofer detectors for user identification and spoofer detection, respectively. Afterwards, we develop a binary tree-based authentication approach to accurately identify each individual leveraging these binary classifiers and spoofer detectors with respect to registered users.
Published:
Due to my visit to United States from Oct. 2018, I did not attend the IEEE INFOCOM 2019 held in Paris, France. I made the slide for the paper presentation, and my labmate, Xiangyu Xu, presented the paper on behalf of me.
Published:
In IEEE SECON 2019, except for this paper, I also present three other papers for the authors who cannot go to Boston due to visa reasons.
Published:
I was invited to present our work at College of Information Engineering of Zhejiang University of Technology. The talk is mainly about the application of mobile and ubiquitous sensing on cyber security and privacy problems.
Published:
Nowadays, the container-based virtualization technologies have become very popular due to lightweight nature, scalability, flexibility and others. Kubernetes is one of the most popular container cluster management systems, which enables users to deploy applications on the container easily, so more and more web applications are deployed in a Kubernetes clusters. However, a Kubernetes cluster is generally designed to handle the peak of workloads, so that most of resources are idle in usual time, which results in an huge waste of resource. Hence, it is necessary to design a system to improve the cluster resource utilization and promise Quality of Service (QoS) in a Kubernetes cluster. In this paper, we propose a generic system to dynamically adjust the scale of a Kubernetes cluster, which is able to reduce the waste of resource on the premise of QoS guarantee. The proposed system contains four modules: monitor module, QoS module, scaling module, and executing module. First, the monitor module uses two open-source tools, Heapster and InfluxDB, to monitor and store real-time status of a Kubernetes cluster. Then, to guarantee QoS in the Kubernetes cluster, the QoS module presents a method to automatically decide a threshold of CPU utilization that is able to meet requirements of a specific application. Next, the scaling module provides a cluster scaling algorithm to get an ideal number of nodes in the Kubernetes cluster, which is used to allocate resources in a cluster-level allocation. Finally, according to the ideal number of nodes, the executing module adjusts the scale of the Kubernetes cluster to carry out the application.
Published:
Recent years have witnessed the surge of biometric-based user authentication for mobile devices due to its promising security and convenience. As a natural and widely-existed behavior, human speaking has been exploited for user authentication. Existing voice-based user authentication explores the unique characteristics from either the voiceprint or mouth movements, which is vulnerable to replay attacks and mimic attacks. During speaking, the vocal tract, including the static shape and dynamic movements, also exhibits the individual uniqueness, and they are hardly eavesdropped and imitated by adversaries. Hence, our work aims to employ the individual uniqueness of vocal tract to realize user authentication on mobile devices. Moreover, most voice-based user authentications are passphrase-dependent, which significantly degrade the user experience. Thus, such user authentications are pressed to be implemented in a passphrase-independent manner while being able to resist various attacks. In this paper, we propose a user authentication system, VocalLock, which senses the whole vocal tract during speaking to identify different individuals in a passphrase-independent manner on smartphones leveraging acoustic signals. VocalLock first utilizes FMCW on acoustic signals to characterize both the static shape and dynamic movements of the vocal tract during speaking, and then constructs a passphrase-independent user authentication model based on the unique characteristics of vocal tract through GMM-UBM. The proposed VocalLock can resist various spoofing attacks, while achieving a satisfactory user experience.
Published:
The Chinese title of this talk is 模型驱动的通用内建传感器语音感知威胁研究.
Published:
Due to the epidemic prevention policy of COVID-19 in China, I did not attend the IEEE ICDCS 2022 held in Bologna, Italy. I made the slide for the paper presentation, and my labmate@Rutgers, Wenjin Zhang, presented the paper on behalf of me.
Published:
This talk’s Chinese name is 智能语音系统安全.
Published:
This talk’s Chinese name is 声波与语音:从工具到安全.
Published:
This talk’s Chinese name is 智能语音系统安全.