Posts by Collection

patents

基于滑动式交互操作的推荐系统及方法

Published:

I am the first student inventor and the major contributor of this patent.

Recommended citation: Jiadi Yu, Li Lu. "基于滑动式交互操作的推荐系统及方法." ZL201710315487.6. 2018. China.

远距离用户触控屏上全键盘输入获取方法

Published:

I am the first student inventor and the major contributor of this patent.

Recommended citation: Jiadi Yu, Li Lu. "远距离用户触控屏上全键盘输入获取方法." ZL201810410015.3. 2019. China.

publications

An Energy Efficient Algorithm for Virtual Machine Allocation in Cloud Datacenters

Published in Conference on Advanced Computer Architecture (CCF ACA 2016), 2016

Annual Conference on Adbanced Computer Architecture of China is the premier conference of computer system architecture in China.

Recommended citation: Ahmad Ali, Li Lu, Yanmin Zhu, Jiadi Yu. "An Energy Efficient Algorithm for Virtual Machine Allocation in Cloud Datacenters." Proceedings of Conference on Advanced Computer Architecture (CCF ACA). Weihai, Shandong, China. pp. 61-72. 2016. doi: 10.1007/978-981-10-2209-8_6.

Cost-Efficient VM Configuration Algorithm in the Cloud using Mix Scaling Strategy

Published in IEEE International Conference on Communications (IEEE ICC 2017), 2017

IEEE International Conference on Communications is the flagship conference of IEEE Communication Society (IEEE ComSoc). ICC is also a CCF-C conference.

Recommended citation: Li Lu, Jiadi Yu, Yanmin Zhu, Guangtao Xue, Shiyou Qian, Minglu Li. "Cost-Efficient VM Configuration Algorithm in the Cloud using Mix Scaling Strategy." Proceedings of IEEE International Conference on Communications (IEEE ICC). Paris, France. pp. 1-6. 2017. doi: 10.1109/ICC.2017.7997241.

Online Cost-Aware Service Requests Scheduling in Hybrid Clouds for Cloud Bursting

Published in International Conference on Web Information Systems Engineering (WISE 2017), 2017

WISE is a CCF-C conference.

Recommended citation: Yanhua Cao, Li Lu, Jiadi Yu, Shiyou Qian, Yanmin Zhu, Minglu Li, Jian Cao, Zhong Wang, Juan Li, Guangtao Xue. "Online Cost-Aware Service Requests Scheduling in Hybrid Clouds for Cloud Bursting." Proceedings of International Conference on Web Information Systems Engineering (WISE). Moscow, Russia. pp. 259-274. 2017. doi: 10.1007/978-3-319-68783-4_18.

A Double Auction Mechanism to Bridge Users Task Requirements and Providers Resources in Two-Sided Cloud Markets

Published in IEEE Transactions on Parallel and Distributed Systems, 2017

IEEE TPDS is a CCF-A journal.

Recommended citation: Li Lu, Jiadi Yu, Yanmin Zhu, Minglu Li. "A Double Auction Mechanism to Bridge Users Task Requirements and Providers Resources in Two-Sided Cloud Markets." IEEE Transactions on Parallel and Distributed Systems. 29(4). pp. 720-733. 2018. doi: 10.1109/TPDS.2017.2781236.

LipPass: Lip Reading-based User Authentication Leveraging Acoustic Signals on Smartphones

Published in IEEE International Conference on Computer Communications (IEEE INFOCOM 2018), 2018

IEEE International Conference on Computer Communications is a top ranked international conference in computer networking and communication. IEEE INFOCOM is also a CCF-A conference.

Recommended citation: Li Lu, Jiadi Yu, Yingying Chen, Hongbo Liu, Yanmin Zhu, Yunfei Liu, Minglu Li. "LipPass: Lip Reading-based User Authentication Leveraging Acoustic Signals on Smartphones." Proceedings of IEEE International Conference on Computer Communications (IEEE INFOCOM). Honolulu, HI, USA. pp. 1466-1474. 2018. doi: 10.1109/INFOCOM.2018.8486283.

Online Cost-rejection Rate Scheduling for Resource Requests in Hybrid Clouds

Published in Parallel Computing, 2018

PARCOM is a CCF-B journal.

Recommended citation: Yanhua Cao, Li Lu, Jiadi Yu, Shiyou Qian, Yanmin Zhu, Minglu Li. "Online Cost-rejection Rate Scheduling for Resource Requests in Hybrid Clouds." Parallel Computing. 81(1). pp. 85-103. 2018. doi: 10.1016/j.parco.2018.12.003.

Lip Reading-based User Authentication through Acoustic Sensing on Smartphones

Published in IEEE/ACM Transactions on Networking, 2019

This work was reported by IEEE Spectrum on Feburary, 2019.

Recommended citation: Li Lu, Jiadi Yu, Yingying Chen, Hongbo Liu, Yanmin Zhu, Linghe Kong, Minglu Li. "Lip Reading-based User Authentication through Acoustic Sensing on Smartphones." IEEE/ACM Transactions on Networking. 27(1). pp. 447-460. 2019. doi: 10.1109/TNET.2019.2891733.

VPad: Virtual Writing Tablet for Laptops Leveraging Acoustic Signals

Published in The 24th International Conference on Parallel and Distributed Systems (IEEE ICPADS 2018), 2019

IEEE ICPADS is a CCF-C conference.

Recommended citation: Li Lu, Jian Liu, Jiadi Yu, Yingying Chen, Yanmin Zhu, Xiangyu Xu, Minglu Li. "VPad: Virtual Writing Tablet for Laptops Leveraging Acoustic Signals." Proceedings of International Conference on Parallel and Distributed Systems (IEEE ICPADS). Sentosa, Singapore. pp. 244-251. 2018. doi: 10.1109/PADSW.2018.8644615.

KeyListener: Inferring Keystrokes on QWERTY Keyboard of Touch Screen through Acoustic Signals

Published in IEEE International Conference on Computer Communications (IEEE INFOCOM 2019), 2019

IEEE International Conference on Computer Communications is a top ranked international conference in computer networking and communication. IEEE INFOCOM is also a CCF-A conference.

Recommended citation: Li Lu, Jiadi Yu, Yingying Chen, Yanmin Zhu, Xiangyu Xu, Guangtao Xue, Minglu Li. "KeyListener: Inferring Keystrokes on QWERTY Keyboard of Touch Screen through Acoustic Signals." Proceedings of IEEE International Conference on Computer Communications (IEEE INFOCOM). Paris, France. pp. 775-783. 2019. doi: 10.1109/INFOCOM.2019.8737591.

FingerPass: Finger Gesture-based Continuous User Authentication for Smart Homes Using Commodity WiFi

Published in ACM International Symposium on Mobile Ad Hoc Networking and Computing (ACM MobiHoc 2019), 2019

I am the co-first author of this paper. ACM International Symposium on Mobile Ad Hoc Networking and Computing is the premier international conference in mobile networking and computing. ACM MobiHoc is also a CCF-B conference.

Recommended citation: Hao Kong, Li Lu, Jiadi Yu, Yingying Chen, Yanmin Zhu, Linghe Kong, Minglu Li. "FingerPass: Finger Gesture-based Continuous User Authentication for Smart Homes Using Commodity WiFi." Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing (ACM MobiHoc). Catania, Italy. pp. 201-210. 2019. doi: 10.1145/3323679.3326518.

WiZoom: Accurate Multipath Profiling using Commodity WiFi Devices with Limited Bandwidth

Published in IEEE International Conference on Sensing, Communication and Networking (IEEE SECON 2019), 2019

IEEE International Conference on Sensing, Communication and Networking is a famous international conference in sensing and communication. IEEE SECON is also a CCF-B conference.

Recommended citation: Hua Xue, Jiadi Yu, Yanmin Zhu, Li Lu, Shiyou Qian, Minglu Li. "WiZoom: Accurate Multipath Profiling using Commodity WiFi Devices with Limited Bandwidth." Proceedings of IEEE International Conference on Sensing, Communication and Networking (IEEE SECON). Boston, MA, USA. pp. 1-9. 2019. doi: 10.1109/SAHCN.2019.8824859.

I3: Sensing Scrolling Human-Computer Interactions for Intelligent Interest Inference on Smartphones

Published in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2019

Proceedings of ACM Interaction Mobile Wearable Ubiquitous Technology is the premier international journal in ubiquitous computing, which is previously the top ranked international conference ACM UbiComp. This paper was also presented in ACM UbiComp 2019. ACM UbiComp is a CCF-A conference.

Recommended citation: Li Lu, Jiadi Yu, Yingying Chen, Yanmin Zhu, Minglu Li, Xiangyu Xu. "I^3: Sensing Scrolling Human-Computer Interactions for Intelligent Interest Inference on Smartphones." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT). 3(3), pp. 97:1-97:22. London, England. 2019. doi: 10.1145/3351255.

An Indirect Eavesdropping Attack of Keystrokes on Touch Screen through Acoustic Sensing

Published in IEEE Transactions on Mobile Computing, 2019

I am the first student author of this paper. IEEE Transactions on Mobile Computing is the premier international journal on mobile computing and communication. IEEE TMC is a CCF-A journal.

Recommended citation: Jiadi Yu, Li Lu, Yingying Chen, Yanmin Zhu, Linghe Kong. "An Indirect Eavesdropping Attack of Keystrokes on Touch Screen through Acoustic Sensing." IEEE Transactions on Mobile Computing. vol. 20, no. 2, pp. 337-351. 2020. doi: 10.1109/TMC.2019.2947468.

Poster: Inaudible High-throughput Communication Through Acoustic Signals

Published in ACM Annual International Conference on Mobile Computing and Networking (ACM MobiCom 2019), 2019

This work received the first runner-up poster award of ACM MobiCom 2019.

Recommended citation: Yang Bai, Jian Liu, Yingying Chen, Li Lu, Jiadi Yu. "Poster: Inaudible High-throughput Communication Through Acoustic Signals." Proceedings of ACM Annual International Conference on Mobile Computing and Networking (ACM MobiCom). Los Cabos, Mexico. pp. 79:1-79:3. 2019. doi: 10.1145/3300061.3343405.

Enable Traditional Laptops with Virtual Writing Capability Leveraging Acoustic Signals

Published in The Computer Journal, 2020

The Computer Journal is a CCF-B journal.

Recommended citation: Li Lu, Jian Liu, Jiadi Yu, Yingying Chen, Yanmin Zhu, Linghe Kong, Minglu Li. "Enable Traditional Laptops with Virtual Writing Capability Leveraging Acoustic Signals." The Computer Journal. vol. 64, no. 12, pp. 1814–1831. 2021. doi: 10.1093/comjnl/bxz153.

Dynamically Adjusting Scale of a Kubernetes Cluster Under QoS Guarantee

Published in The 25th International Conference on Parallel and Distributed Systems (IEEE ICPADS 2019), 2020

IEEE ICPADS is a CCF-C conference.

Recommended citation: Qiang Wu, Jiadi Yu, Li Lu, Shiyou Qian, Guangtao Xue. " Dynamically Adjusting Scale of a Kubernetes Cluster Under QoS Guarantee." Proceedings of International Conference on Parallel and Distributed Systems (IEEE ICPADS). Tianjin, China. pp. 193-200. 2019. doi: 10.1109/ICPADS47876.2019.00037.

Continuous Authentication through Finger Gesture Interaction for Smart Homes Using WiFi

Published in IEEE Transactions on Mobile Computing, 2020

IEEE Transactions on Mobile Computing is the premier international journal on mobile computing and communication. IEEE TMC is a CCF-A journal.

Recommended citation: Hao Kong, Li Lu, Jiadi Yu, Yingying Chen, Feilong Tang. "Continuous Authentication through Finger Gesture Interaction for Smart Homes Using WiFi." IEEE Transactions on Mobile Computing. vol. 20, no. 11, pp. 3148-3162, 2020. doi: 10.1109/TMC.2020.2994955.

VocalLock: Sensing Vocal Tract for Passphrase-Independent User Authentication Leveraging Acoustic Signals on Smartphones

Published in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2020

Proceedings of ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies is the premier international journal in ubiquitous computing, which is previously the top ranked international conference ACM UbiComp. This paper was also presented in ACM UbiComp 2020. ACM UbiComp is a CCF-A conference.

Recommended citation: Li Lu, Jiadi Yu, Yingying Chen, Yan Wang. "VocalLock: Sensing Vocal Tract for Passphrase-Independent User Authentication Leveraging Acoustic Signals on Smartphones." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT). 4(2), pp. 51:1-51:24. Cancun, Mexico. 2020. doi: 10.1145/3397320.

Towards a Real-Time Anti-Theft Method for Mobile Devices Leveraging Acoustic Sensing

Published in Chinese Journal of Computers (计算机学报), 2020

Chinese Journal of Computers (计算机学报) is the top-level journal in the field of computer science and engineering of China. This journal is also a T1 Chinese high-quality technical journal in computing domain.

Recommended citation: Li Lu, Jiadi Yu, Minglu Li. "Towards a Real-Time Anti-Theft Method for Mobile Devices Leveraging Acoustic Sensing." Chinese Journal of Computers. 43(10). pp. 2002-2018. 2020. doi: 10.11897/SP.J.1016.2020.02002.

BatComm: Enabling Inaudible Acoustic Communication with High-throughput for Mobile Devices

Published in The 18th ACM Conference on Embedded Networked Sensor Systems (ACM SenSys 2020), 2020

ACM Conference on Embedded Networked Sensor Systems is the premier international conference in embedded sensing and networking systems. ACM SenSys is also a CCF-B conference.

Recommended citation: Yang Bai, Jian Liu, Li Lu, Yilin Yang, Yingying Chen, Jiadi Yu. "BatComm: Enabling Inaudible Acoustic Communication with High-throughput for Mobile Devices." Proceedings of ACM Conference on Embedded Networked Sensor Systems (ACM SenSys). Yokohama, Japan. 2020. doi: 10.1145/3384419.3430773.

Acoustic-based Sensing and Applications: A Survey

Published in Computer Networks, 2020

Computer Networks is a famous international journal on computer networks and communications, which is published by Springer. Computer Networks is a CCF-B journal.

Recommended citation: Yang Bai, Li Lu, Jerry Cheng, Jian Liu, Yingying Chen, Jiadi Yu. "Acoustic-based Sensing and Applications: A Survey." Computer Networks. vol. 181, pp. 107447:1-107447:19, 2020. doi: 10.1016/j.comnet.2020.107447.

MultiAuth: Enable Multi-User Authentication with Single Commodity WiFi Device

Published in ACM International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing (ACM MobiHoc 2021), 2021

ACM International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing is the premier international conference in mobile networking and computing. ACM MobiHoc is also a CCF-B conference.

Recommended citation: Hao Kong, Li Lu, Jiadi Yu, Yingying Chen, Xiangyu Xu, Feilong Tang, Yi-Chao Chen. "MultiAuth: Enable Multi-User Authentication with Single Commodity WiFi Device." Proceedings of ACM International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing (ACM MobiHoc). Shanghai, China. pp. 31-40. 2021. doi: 10.1145/3466772.3467032.

PassFace: Enabling Practical Anti-Spoofing Facial Recognition with Camera Fingerprinting

Published in IEEE International Conference on Communications (IEEE ICC 2021), 2021

IEEE International Conference on Communications is the flagship conference of IEEE ComSoc. IEEE ICC is also a CCF-C conference.

Recommended citation: Liu Liu, Hanlin Yu, Zhongjie Ba, Li Lu, Feng Lin, Kui Ren. "PassFace: Enabling Practical Anti-Spoofing Facial Recognition with Camera Fingerprinting." Proceedings of IEEE International Conference on Communications (IEEE ICC). Montreal, Canada. 2021. doi: 10.1109/ICC42927.2021.9501053.

mPose: Environment- and subject-agnostic 3D skeleton posture reconstruction leveraging a single mmWave device

Published in Smart Health, 2021

This paper is an invited paper of IEEE/ACM Conference on Connected Health Applications, Systems, and Engineering Technologies (IEEE/ACM CHASE 2021), and was presented in the conference.

Recommended citation: Cong Shi, Li Lu, Jian Liu, Yan Wang, Yingying Chen, Jiadi Yu. "mPose: Environment- and subject-agnostic 3D skeleton posture reconstruction leveraging a single mmWave device." Smart Health. vol. 23, pp. 100228:1-100228:14, 2022. doi: 10.1016/j.smhl.2021.100228.

PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition

Published in IEEE International Conference on Computer Communications (IEEE INFOCOM 2022), 2022

IEEE International Conference on Computer Communications is a top ranked international conference in computer networking and communication. IEEE INFOCOM is also a CCF-A conference. I am the corresponding author of this paper.

Recommended citation: Meng Chen, Li Lu*, Zhongjie Ba, Kui Ren. "PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition." Proceedings of IEEE International Conference on Computer Communications (IEEE INFOCOM). London, United Kingdom. pp. 1419-1428. 2022. doi: 10.1109/INFOCOM48880.2022.9796934.

A Non-intrusive and Adaptive Speaker De-Identification Scheme Using Adversarial Examples

Published in The 28th Annual Conference on Mobile Computing and Networking (ACM MobiCom 2022), 2022

This work received the Best Poster Runner-up Award of ACM MobiCom 2022.

Recommended citation: Meng Chen, Li Lu*, Jiadi Yu, Yingying Chen, Zhongjie Ba, Feng Lin, Kui Ren. "A Non-intrusive and Adaptive Speaker De-Identification Scheme Using Adversarial Examples." Proceedings of the 28th Annual Conference on Mobile Computing and Networking (ACM MobiCom 2022). Sydney, Australia. pp. 853-855. 2022. doi: 10.1145/3495243.3558260.

ActListener: Imperceptible Activity Surveillance by Pervasive Wireless Infrastructures

Published in IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2022), 2022

IEEE International Conference on Distributed Computing Systems is a premier international conference in distrubited computing and communication areas. IEEE ICDCS is also a CCF-B conference.

Recommended citation: Li Lu*, Zhongjie Ba, Feng Lin, Jinsong Han, Kui Ren. "ActListener: Imperceptible Activity Surveillance by Pervasive Wireless Infrastructures." Proceedings of IEEE International Conference on Distributed Computing Systems (IEEE ICDCS). Bologna, Italy. pp. 776-786. 2022. doi: 10.1109/ICDCS54860.2022.00080.

Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain

Published in The 20th ACM Conference on Embedded Networked Sensor Systems (ACM SenSys 2022), 2022

ACM Conference on Embedded Networked Sensor Systems is the premier international conference in embedded sensing and networking systems. ACM SenSys is also one of the conferences in Mobile Computing of CSRankings and a CCF-B conference. I am the corresponding author of this paper.

Recommended citation: Qianniu Chen, Meng Chen, Li Lu*, Jiadi Yu, Yingying Chen, Zhibo Wang, Zhongjie Ba, Feng Lin, Kui Ren. "Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain." Proceedings of ACM Conference on Embedded Networked Sensor Systems (ACM SenSys). Boston, MA, USA. pp. 710-724. 2022. doi: 10.1145/3560905.3568518.

Towards Multi-User Authentication Using WiFi Signals

Published in IEEE/ACM Transactions on Networking, 2022

IEEE/ACM Transactions on Networking is a premier journal on computer networking and communications, which is co-sponsored by IEEE ComSoc, IEEE CS and ACM with SIGCOMM. IEEE/ACM ToN is a CCF-A journal. I am the corresponding author of this paper.

Recommended citation: Hao Kong, Li Lu*, Jiadi Yu, Yingying Chen, Xiangyu Xu, Feng Lyu. "Towards Multi-User Authentication Using WiFi Signals." IEEE/ACM Transactions on Networking. vol. 31, no. 5, pp. 2117-2132. 2023. doi: 10.1109/TNET.2023.3237686.

VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices

Published in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2023

Proceedings of ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies is the premier international journal in ubiquitous computing, which was previously the top ranked international conference ACM UbiComp. ACM UbiComp is a CCF-A conference.

Recommended citation: Lei Wang, Meng Chen, Li Lu*, Zhongjie Ba, Feng Lin, Kui Ren. "VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT). 7(1), pp. 32:1-32:22. Cancun, Mexico. 2023. doi: 10.1145/3580789.

Shift to Your Device: Data Augmentation for Device-Independent Speaker Verification Anti-Spoofing

Published in Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (IEEE ICASSP), 2023

IEEE International Conference on Acoustics, Speech and Signal Processing is the flagship journal of IEEE Signal Processing Society. IEEE ICASSP is a CCF-B conference.

Recommended citation: Junhao Wang, Li Lu*, Zhongjie Ba, Feng Lin, Kui Ren. "Shift to Your Device: Data Augmentation for Device-Independent Speaker Verification Anti-Spoofing." Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (IEEE ICASSP). Rhodes Island, Greece. 2023. doi: 10.1109/ICASSP49357.2023.10097168.

VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility

Published in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2023

Proceedings of ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies is the premier international journal in ubiquitous computing, which was previously the top ranked international conference ACM UbiComp. ACM UbiComp is a CCF-A conference.

Recommended citation: Meng Chen, Li Lu*, Junhao Wang, Jiadi Yu, Yingying Chen, Zhibo Wang, Zhongjie Ba, Feng Lin, Kui Ren. "VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT). 7(2), pp. 48:1-48:21. Cancun, Mexico. 2023. doi: 10.1145/3596266.

BypTalker: An Adaptive Adversarial Example Attack to Bypass Prefilter-enabled Speaker Recognition

Published in Proceedings of IEEE International Conference on Mobility, Sensing and Networking (IEEE MSN 2023), 2023

IEEE MSN is a CCF-C conference.

Recommended citation: Qianniu Chen, Kang Fu, Li Lu*, Meng Chen, Zhongjie Ba, Feng Lin, Kui Ren. "BypTalker: An Adaptive Adversarial Example Attack to Bypass Prefilter-enabled Speaker Recognition." Proceedings of IEEE International Conference on Mobility, Sensing and Networking (IEEE MSN). Nanjing, Jiangsu, China. 2023. doi: to appear.

AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception

Published in IEEE Transactions on Information Forensics and Security, 2023

IEEE Transactions on Information Forensics and Security is a premier journal on information security and signal processing, which is sponsored by IEEE Signal Processing Society. IEEE TIFS is a CCF-A journal.

Recommended citation: Meng Chen, Li Lu*, Jiadi Yu, Zhongjie Ba, Feng Lin, Kui Ren. "AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception." IEEE Transactions on Information Forensics and Security. 19, pp. 1948-1962. 2024. doi: 10.1109/TIFS.2023.3345639.

Conan’s Bow Tie: A Streaming Voice Conversion for Real-Time VTuber Livestreaming

Published in Proceedings of ACM IUI, 2024

ACM Conference on Intelligent User Interfaces is the annual premiere venue of the intersection of Artificial Intelligence (AI) and Human-Computer Interaction (HCI). ACM IUI is a CCF-B conference.

Recommended citation: Qianniu Chen, Zhehan Gu, Li Lu*, Xiangyu Xu, Zhongjie Ba, Feng Lin, Zhenguang Liu, Kui Ren. "Conan's Bow Tie: A Streaming Voice Conversion for Real-Time VTuber Livestreaming." Proceedings of ACM IUI. Greenville, SC, USA. pp. 35-50. 2024. doi: 10.1145/3640543.3645146.

FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition

Published in Proceedings of USENIX Security Symposium, 2024

USENIX Security Symposium is one of the Big Four international conferences on cyber security. USENIX SEC is a CCF-A conference.

Recommended citation: Kun Wang, Xiangyu Xu, Li Lu*, Zhongjie Ba, Feng Lin, Kui Ren. "FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition." Proceedings of USENIX Security Symposium. Philadelphia, PA, USA. 2024. doi: to appear.

Devil in the Room: Triggering Audio Backdoors in the Physical World

Published in Proceedings of USENIX Security Symposium, 2024

USENIX Security Symposium is one of the Big Four international conferences on cyber security. USENIX SEC is a CCF-A conference.

Recommended citation: Meng Chen, Xiangyu Xu, Li Lu*, Zhongjie Ba, Feng Lin, Kui Ren. "Devil in the Room: Triggering Audio Backdoors in the Physical World." Proceedings of USENIX Security Symposium. Philadelphia, PA, USA. 2024. doi: to appear.

talks

Cost-Efficient VM Configuration Algorithm in the Cloud using Mix Scaling Strategy

Published:

Benefiting from the pay-per-use pricing model of cloud computing, many companies migrate their services and applications from typical expensive infrastructures to the cloud. However, due to fluctuations in the workload of services and applications, making a cost-efficient VM configuration decision in the cloud remains a critical challenge. Even experienced administrators cannot accurately predict the workload in the future. Since the pricing model of cloud provider is convex other than linear that often assumed in past research, instead of typical scaling out strategy. In this paper, we adopt mix scale strategy. Based on this observation, we model an optimization problem aiming to minimize the VM configuration cost under the constraint of migration delay. Taking advantages of Lyapunov optimization techniques, we propose a mix scale online algorithm which achieves more cost-efficiency than that of scale out strategy.

LipPass: Lip Reading-based User Authentication Leveraging Acoustic Signals on Smartphones

Published:

To prevent users’ privacy from leakage, more and more mobile devices employ biometric-based authentication approaches, such as fingerprint, face recognition, voiceprint authentications, etc., to enhance the privacy protection. However, these approaches are vulnerable to replay attacks. Although state-of-art solutions utilize liveness verification to combat the attacks, existing approaches are sensitive to ambient environments, such as ambient lights and surrounding audible noises. Towards this end, we explore liveness verification of user authentication leveraging users’ lip movements, which are robust to noisy environments. In this paper, we propose a lip reading-based user authentication system, $LipPass$, which extracts unique behavioral characteristics of users’ speaking lips leveraging build-in audio devices on smartphones for user authentication. We first investigate Doppler profiles of acoustic signals caused by users’ speaking lips, and find that there are unique lip movement patterns for different individuals. To characterize the lip movements, we propose a deep learning-based method to extract efficient features from Doppler profiles, and employ Support Vector Machine and Support Vector Domain Description to construct binary classifiers and spoofer detectors for user identification and spoofer detection, respectively. Afterwards, we develop a binary tree-based authentication approach to accurately identify each individual leveraging these binary classifiers and spoofer detectors with respect to registered users.

Dynamically Adjusting Scale of a Kubernetes Cluster Under QoS Guarantee

Published:

Nowadays, the container-based virtualization technologies have become very popular due to lightweight nature, scalability, flexibility and others. Kubernetes is one of the most popular container cluster management systems, which enables users to deploy applications on the container easily, so more and more web applications are deployed in a Kubernetes clusters. However, a Kubernetes cluster is generally designed to handle the peak of workloads, so that most of resources are idle in usual time, which results in an huge waste of resource. Hence, it is necessary to design a system to improve the cluster resource utilization and promise Quality of Service (QoS) in a Kubernetes cluster. In this paper, we propose a generic system to dynamically adjust the scale of a Kubernetes cluster, which is able to reduce the waste of resource on the premise of QoS guarantee. The proposed system contains four modules: monitor module, QoS module, scaling module, and executing module. First, the monitor module uses two open-source tools, Heapster and InfluxDB, to monitor and store real-time status of a Kubernetes cluster. Then, to guarantee QoS in the Kubernetes cluster, the QoS module presents a method to automatically decide a threshold of CPU utilization that is able to meet requirements of a specific application. Next, the scaling module provides a cluster scaling algorithm to get an ideal number of nodes in the Kubernetes cluster, which is used to allocate resources in a cluster-level allocation. Finally, according to the ideal number of nodes, the executing module adjusts the scale of the Kubernetes cluster to carry out the application.

VocalLock: Sensing Vocal Tract for Passphrase-Independent User Authentication Leveraging Acoustic Signals on Smartphones

Published:

Recent years have witnessed the surge of biometric-based user authentication for mobile devices due to its promising security and convenience. As a natural and widely-existed behavior, human speaking has been exploited for user authentication. Existing voice-based user authentication explores the unique characteristics from either the voiceprint or mouth movements, which is vulnerable to replay attacks and mimic attacks. During speaking, the vocal tract, including the static shape and dynamic movements, also exhibits the individual uniqueness, and they are hardly eavesdropped and imitated by adversaries. Hence, our work aims to employ the individual uniqueness of vocal tract to realize user authentication on mobile devices. Moreover, most voice-based user authentications are passphrase-dependent, which significantly degrade the user experience. Thus, such user authentications are pressed to be implemented in a passphrase-independent manner while being able to resist various attacks. In this paper, we propose a user authentication system, VocalLock, which senses the whole vocal tract during speaking to identify different individuals in a passphrase-independent manner on smartphones leveraging acoustic signals. VocalLock first utilizes FMCW on acoustic signals to characterize both the static shape and dynamic movements of the vocal tract during speaking, and then constructs a passphrase-independent user authentication model based on the unique characteristics of vocal tract through GMM-UBM. The proposed VocalLock can resist various spoofing attacks, while achieving a satisfactory user experience.