Publications

Devil in the Room: Triggering Audio Backdoors in the Physical World

Published in Proceedings of USENIX Security Symposium, 2024

USENIX Security Symposium is one of the Big Four international conferences on cyber security. USENIX SEC is a CCF-A conference.

Recommended citation: Meng Chen, Xiangyu Xu, Li Lu*, Zhongjie Ba, Feng Lin, Kui Ren. "Devil in the Room: Triggering Audio Backdoors in the Physical World." Proceedings of USENIX Security Symposium. Philadelphia, PA, USA. 2024. doi: to appear.

FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition

Published in Proceedings of USENIX Security Symposium, 2024

USENIX Security Symposium is one of the Big Four international conferences on cyber security. USENIX SEC is a CCF-A conference.

Recommended citation: Kun Wang, Xiangyu Xu, Li Lu*, Zhongjie Ba, Feng Lin, Kui Ren. "FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition." Proceedings of USENIX Security Symposium. Philadelphia, PA, USA. 2024. doi: to appear.

An Imperceptible Eavesdropping Attack on WiFi Sensing Systems

Published in IEEE/ACM Transactions on Networking, 2024

IEEE/ACM Transactions on Networking is a premier journal on computer networking and communications, which is co-sponsored by IEEE ComSoc, IEEE CS and ACM with SIGCOMM. IEEE/ACM ToN is a CCF-A journal.

Recommended citation: Li Lu, Meng Chen, Zhongjie Ba, Feng Lin, Jinsong Han, Yanmin Zhu, Kui Ren. "An Imperceptible Eavesdropping Attack on WiFi Sensing Systems." IEEE/ACM Transactions on Networking. 32(5), pp. 4009-4024. 2024. doi: 10.1109/TNET.2024.3403839.

Conan’s Bow Tie: A Streaming Voice Conversion for Real-Time VTuber Livestreaming

Published in Proceedings of ACM IUI, 2024

ACM Conference on Intelligent User Interfaces is the annual premiere venue of the intersection of Artificial Intelligence (AI) and Human-Computer Interaction (HCI). ACM IUI is a CCF-B conference.

Recommended citation: Qianniu Chen, Zhehan Gu, Li Lu*, Xiangyu Xu, Zhongjie Ba, Feng Lin, Zhenguang Liu, Kui Ren. "Conan's Bow Tie: A Streaming Voice Conversion for Real-Time VTuber Livestreaming." Proceedings of ACM IUI. Greenville, SC, USA. pp. 35-50. 2024. doi: 10.1145/3640543.3645146.

AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception

Published in IEEE Transactions on Information Forensics and Security, 2023

IEEE Transactions on Information Forensics and Security is a premier journal on information security and signal processing, which is sponsored by IEEE Signal Processing Society. IEEE TIFS is a CCF-A journal.

Recommended citation: Meng Chen, Li Lu*, Jiadi Yu, Zhongjie Ba, Feng Lin, Kui Ren. "AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception." IEEE Transactions on Information Forensics and Security. 19, pp. 1948-1962. 2024. doi: 10.1109/TIFS.2023.3345639.

BypTalker: An Adaptive Adversarial Example Attack to Bypass Prefilter-enabled Speaker Recognition

Published in Proceedings of IEEE International Conference on Mobility, Sensing and Networking (IEEE MSN 2023), 2023

IEEE MSN is a CCF-C conference.

Recommended citation: Qianniu Chen, Kang Fu, Li Lu*, Meng Chen, Zhongjie Ba, Feng Lin, Kui Ren. "BypTalker: An Adaptive Adversarial Example Attack to Bypass Prefilter-enabled Speaker Recognition." Proceedings of IEEE International Conference on Mobility, Sensing and Networking (IEEE MSN). Nanjing, Jiangsu, China. pp. 496-503. 2023. doi: 10.1109/MSN60784.2023.00077.

VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility

Published in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2023

Proceedings of ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies is the premier international journal in ubiquitous computing, which was previously the top ranked international conference ACM UbiComp. ACM UbiComp is a CCF-A conference.

Recommended citation: Meng Chen, Li Lu*, Junhao Wang, Jiadi Yu, Yingying Chen, Zhibo Wang, Zhongjie Ba, Feng Lin, Kui Ren. "VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT). 7(2), pp. 48:1-48:21. Cancun, Mexico. 2023. doi: 10.1145/3596266.

Shift to Your Device: Data Augmentation for Device-Independent Speaker Verification Anti-Spoofing

Published in Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (IEEE ICASSP), 2023

IEEE International Conference on Acoustics, Speech and Signal Processing is the flagship journal of IEEE Signal Processing Society. IEEE ICASSP is a CCF-B conference.

Recommended citation: Junhao Wang, Li Lu*, Zhongjie Ba, Feng Lin, Kui Ren. "Shift to Your Device: Data Augmentation for Device-Independent Speaker Verification Anti-Spoofing." Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (IEEE ICASSP). Rhodes Island, Greece. 2023. doi: 10.1109/ICASSP49357.2023.10097168.

VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices

Published in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2023

Proceedings of ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies is the premier international journal in ubiquitous computing, which was previously the top ranked international conference ACM UbiComp. ACM UbiComp is a CCF-A conference.

Recommended citation: Lei Wang, Meng Chen, Li Lu*, Zhongjie Ba, Feng Lin, Kui Ren. "VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT). 7(1), pp. 32:1-32:22. Cancun, Mexico. 2023. doi: 10.1145/3580789.

Towards Multi-User Authentication Using WiFi Signals

Published in IEEE/ACM Transactions on Networking, 2022

IEEE/ACM Transactions on Networking is a premier journal on computer networking and communications, which is co-sponsored by IEEE ComSoc, IEEE CS and ACM with SIGCOMM. IEEE/ACM ToN is a CCF-A journal. I am the corresponding author of this paper.

Recommended citation: Hao Kong, Li Lu*, Jiadi Yu, Yingying Chen, Xiangyu Xu, Feng Lyu. "Towards Multi-User Authentication Using WiFi Signals." IEEE/ACM Transactions on Networking. vol. 31, no. 5, pp. 2117-2132. 2023. doi: 10.1109/TNET.2023.3237686.

Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain

Published in The 20th ACM Conference on Embedded Networked Sensor Systems (ACM SenSys 2022), 2022

ACM Conference on Embedded Networked Sensor Systems is the premier international conference in embedded sensing and networking systems. ACM SenSys is also one of the conferences in Mobile Computing of CSRankings and a CCF-B conference. I am the corresponding author of this paper.

Recommended citation: Qianniu Chen, Meng Chen, Li Lu*, Jiadi Yu, Yingying Chen, Zhibo Wang, Zhongjie Ba, Feng Lin, Kui Ren. "Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain." Proceedings of ACM Conference on Embedded Networked Sensor Systems (ACM SenSys). Boston, MA, USA. pp. 710-724. 2022. doi: 10.1145/3560905.3568518.

ActListener: Imperceptible Activity Surveillance by Pervasive Wireless Infrastructures

Published in IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2022), 2022

IEEE International Conference on Distributed Computing Systems is a premier international conference in distrubited computing and communication areas. IEEE ICDCS is also a CCF-B conference.

Recommended citation: Li Lu*, Zhongjie Ba, Feng Lin, Jinsong Han, Kui Ren. "ActListener: Imperceptible Activity Surveillance by Pervasive Wireless Infrastructures." Proceedings of IEEE International Conference on Distributed Computing Systems (IEEE ICDCS). Bologna, Italy. pp. 776-786. 2022. doi: 10.1109/ICDCS54860.2022.00080.

A Non-intrusive and Adaptive Speaker De-Identification Scheme Using Adversarial Examples

Published in The 28th Annual Conference on Mobile Computing and Networking (ACM MobiCom 2022), 2022

This work received the Best Poster Runner-up Award of ACM MobiCom 2022.

Recommended citation: Meng Chen, Li Lu*, Jiadi Yu, Yingying Chen, Zhongjie Ba, Feng Lin, Kui Ren. "A Non-intrusive and Adaptive Speaker De-Identification Scheme Using Adversarial Examples." Proceedings of the 28th Annual Conference on Mobile Computing and Networking (ACM MobiCom 2022). Sydney, Australia. pp. 853-855. 2022. doi: 10.1145/3495243.3558260.

PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition

Published in IEEE International Conference on Computer Communications (IEEE INFOCOM 2022), 2022

IEEE International Conference on Computer Communications is a top ranked international conference in computer networking and communication. IEEE INFOCOM is also a CCF-A conference. I am the corresponding author of this paper.

Recommended citation: Meng Chen, Li Lu*, Zhongjie Ba, Kui Ren. "PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition." Proceedings of IEEE International Conference on Computer Communications (IEEE INFOCOM). London, United Kingdom. pp. 1419-1428. 2022. doi: 10.1109/INFOCOM48880.2022.9796934.

mPose: Environment- and subject-agnostic 3D skeleton posture reconstruction leveraging a single mmWave device

Published in Smart Health, 2021

This paper is an invited paper of IEEE/ACM Conference on Connected Health Applications, Systems, and Engineering Technologies (IEEE/ACM CHASE 2021), and was presented in the conference.

Recommended citation: Cong Shi, Li Lu, Jian Liu, Yan Wang, Yingying Chen, Jiadi Yu. "mPose: Environment- and subject-agnostic 3D skeleton posture reconstruction leveraging a single mmWave device." Smart Health. vol. 23, pp. 100228:1-100228:14, 2022. doi: 10.1016/j.smhl.2021.100228.

MultiAuth: Enable Multi-User Authentication with Single Commodity WiFi Device

Published in ACM International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing (ACM MobiHoc 2021), 2021

ACM International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing is the premier international conference in mobile networking and computing. ACM MobiHoc is also a CCF-B conference.

Recommended citation: Hao Kong, Li Lu, Jiadi Yu, Yingying Chen, Xiangyu Xu, Feilong Tang, Yi-Chao Chen. "MultiAuth: Enable Multi-User Authentication with Single Commodity WiFi Device." Proceedings of ACM International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing (ACM MobiHoc). Shanghai, China. pp. 31-40. 2021. doi: 10.1145/3466772.3467032.

Acoustic-based Sensing and Applications: A Survey

Published in Computer Networks, 2020

Computer Networks is a famous international journal on computer networks and communications, which is published by Springer. Computer Networks is a CCF-B journal.

Recommended citation: Yang Bai, Li Lu, Jerry Cheng, Jian Liu, Yingying Chen, Jiadi Yu. "Acoustic-based Sensing and Applications: A Survey." Computer Networks. vol. 181, pp. 107447:1-107447:19, 2020. doi: 10.1016/j.comnet.2020.107447.

BatComm: Enabling Inaudible Acoustic Communication with High-throughput for Mobile Devices

Published in The 18th ACM Conference on Embedded Networked Sensor Systems (ACM SenSys 2020), 2020

ACM Conference on Embedded Networked Sensor Systems is the premier international conference in embedded sensing and networking systems. ACM SenSys is also a CCF-B conference.

Recommended citation: Yang Bai, Jian Liu, Li Lu, Yilin Yang, Yingying Chen, Jiadi Yu. "BatComm: Enabling Inaudible Acoustic Communication with High-throughput for Mobile Devices." Proceedings of ACM Conference on Embedded Networked Sensor Systems (ACM SenSys). Yokohama, Japan. 2020. doi: 10.1145/3384419.3430773.

Towards a Real-Time Anti-Theft Method for Mobile Devices Leveraging Acoustic Sensing

Published in Chinese Journal of Computers (计算机学报), 2020

Chinese Journal of Computers (计算机学报) is the top-level journal in the field of computer science and engineering of China. This journal is also a T1 Chinese high-quality technical journal in computing domain.

Recommended citation: Li Lu, Jiadi Yu, Minglu Li. "Towards a Real-Time Anti-Theft Method for Mobile Devices Leveraging Acoustic Sensing." Chinese Journal of Computers. 43(10). pp. 2002-2018. 2020. doi: 10.11897/SP.J.1016.2020.02002.

VocalLock: Sensing Vocal Tract for Passphrase-Independent User Authentication Leveraging Acoustic Signals on Smartphones

Published in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2020

Proceedings of ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies is the premier international journal in ubiquitous computing, which is previously the top ranked international conference ACM UbiComp. This paper was also presented in ACM UbiComp 2020. ACM UbiComp is a CCF-A conference.

Recommended citation: Li Lu, Jiadi Yu, Yingying Chen, Yan Wang. "VocalLock: Sensing Vocal Tract for Passphrase-Independent User Authentication Leveraging Acoustic Signals on Smartphones." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT). 4(2), pp. 51:1-51:24. Cancun, Mexico. 2020. doi: 10.1145/3397320.

Continuous Authentication through Finger Gesture Interaction for Smart Homes Using WiFi

Published in IEEE Transactions on Mobile Computing, 2020

IEEE Transactions on Mobile Computing is the premier international journal on mobile computing and communication. IEEE TMC is a CCF-A journal.

Recommended citation: Hao Kong, Li Lu, Jiadi Yu, Yingying Chen, Feilong Tang. "Continuous Authentication through Finger Gesture Interaction for Smart Homes Using WiFi." IEEE Transactions on Mobile Computing. vol. 20, no. 11, pp. 3148-3162, 2020. doi: 10.1109/TMC.2020.2994955.

Dynamically Adjusting Scale of a Kubernetes Cluster Under QoS Guarantee

Published in The 25th International Conference on Parallel and Distributed Systems (IEEE ICPADS 2019), 2020

IEEE ICPADS is a CCF-C conference.

Recommended citation: Qiang Wu, Jiadi Yu, Li Lu, Shiyou Qian, Guangtao Xue. " Dynamically Adjusting Scale of a Kubernetes Cluster Under QoS Guarantee." Proceedings of International Conference on Parallel and Distributed Systems (IEEE ICPADS). Tianjin, China. pp. 193-200. 2019. doi: 10.1109/ICPADS47876.2019.00037.

Enable Traditional Laptops with Virtual Writing Capability Leveraging Acoustic Signals

Published in The Computer Journal, 2020

The Computer Journal is a CCF-B journal.

Recommended citation: Li Lu, Jian Liu, Jiadi Yu, Yingying Chen, Yanmin Zhu, Linghe Kong, Minglu Li. "Enable Traditional Laptops with Virtual Writing Capability Leveraging Acoustic Signals." The Computer Journal. vol. 64, no. 12, pp. 1814–1831. 2021. doi: 10.1093/comjnl/bxz153.

Poster: Inaudible High-throughput Communication Through Acoustic Signals

Published in ACM Annual International Conference on Mobile Computing and Networking (ACM MobiCom 2019), 2019

This work received the first runner-up poster award of ACM MobiCom 2019.

Recommended citation: Yang Bai, Jian Liu, Yingying Chen, Li Lu, Jiadi Yu. "Poster: Inaudible High-throughput Communication Through Acoustic Signals." Proceedings of ACM Annual International Conference on Mobile Computing and Networking (ACM MobiCom). Los Cabos, Mexico. pp. 79:1-79:3. 2019. doi: 10.1145/3300061.3343405.

An Indirect Eavesdropping Attack of Keystrokes on Touch Screen through Acoustic Sensing

Published in IEEE Transactions on Mobile Computing, 2019

I am the first student author of this paper. IEEE Transactions on Mobile Computing is the premier international journal on mobile computing and communication. IEEE TMC is a CCF-A journal.

Recommended citation: Jiadi Yu, Li Lu, Yingying Chen, Yanmin Zhu, Linghe Kong. "An Indirect Eavesdropping Attack of Keystrokes on Touch Screen through Acoustic Sensing." IEEE Transactions on Mobile Computing. vol. 20, no. 2, pp. 337-351. 2020. doi: 10.1109/TMC.2019.2947468.

I3: Sensing Scrolling Human-Computer Interactions for Intelligent Interest Inference on Smartphones

Published in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2019

Proceedings of ACM Interaction Mobile Wearable Ubiquitous Technology is the premier international journal in ubiquitous computing, which is previously the top ranked international conference ACM UbiComp. This paper was also presented in ACM UbiComp 2019. ACM UbiComp is a CCF-A conference.

Recommended citation: Li Lu, Jiadi Yu, Yingying Chen, Yanmin Zhu, Minglu Li, Xiangyu Xu. "I^3: Sensing Scrolling Human-Computer Interactions for Intelligent Interest Inference on Smartphones." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT). 3(3), pp. 97:1-97:22. London, England. 2019. doi: 10.1145/3351255.

WiZoom: Accurate Multipath Profiling using Commodity WiFi Devices with Limited Bandwidth

Published in IEEE International Conference on Sensing, Communication and Networking (IEEE SECON 2019), 2019

IEEE International Conference on Sensing, Communication and Networking is a famous international conference in sensing and communication. IEEE SECON is also a CCF-B conference.

Recommended citation: Hua Xue, Jiadi Yu, Yanmin Zhu, Li Lu, Shiyou Qian, Minglu Li. "WiZoom: Accurate Multipath Profiling using Commodity WiFi Devices with Limited Bandwidth." Proceedings of IEEE International Conference on Sensing, Communication and Networking (IEEE SECON). Boston, MA, USA. pp. 1-9. 2019. doi: 10.1109/SAHCN.2019.8824859.

FingerPass: Finger Gesture-based Continuous User Authentication for Smart Homes Using Commodity WiFi

Published in ACM International Symposium on Mobile Ad Hoc Networking and Computing (ACM MobiHoc 2019), 2019

I am the co-first author of this paper. ACM International Symposium on Mobile Ad Hoc Networking and Computing is the premier international conference in mobile networking and computing. ACM MobiHoc is also a CCF-B conference.

Recommended citation: Hao Kong, Li Lu, Jiadi Yu, Yingying Chen, Yanmin Zhu, Linghe Kong, Minglu Li. "FingerPass: Finger Gesture-based Continuous User Authentication for Smart Homes Using Commodity WiFi." Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing (ACM MobiHoc). Catania, Italy. pp. 201-210. 2019. doi: 10.1145/3323679.3326518.

KeyListener: Inferring Keystrokes on QWERTY Keyboard of Touch Screen through Acoustic Signals

Published in IEEE International Conference on Computer Communications (IEEE INFOCOM 2019), 2019

IEEE International Conference on Computer Communications is a top ranked international conference in computer networking and communication. IEEE INFOCOM is also a CCF-A conference.

Recommended citation: Li Lu, Jiadi Yu, Yingying Chen, Yanmin Zhu, Xiangyu Xu, Guangtao Xue, Minglu Li. "KeyListener: Inferring Keystrokes on QWERTY Keyboard of Touch Screen through Acoustic Signals." Proceedings of IEEE International Conference on Computer Communications (IEEE INFOCOM). Paris, France. pp. 775-783. 2019. doi: 10.1109/INFOCOM.2019.8737591.

VPad: Virtual Writing Tablet for Laptops Leveraging Acoustic Signals

Published in The 24th International Conference on Parallel and Distributed Systems (IEEE ICPADS 2018), 2019

IEEE ICPADS is a CCF-C conference.

Recommended citation: Li Lu, Jian Liu, Jiadi Yu, Yingying Chen, Yanmin Zhu, Xiangyu Xu, Minglu Li. "VPad: Virtual Writing Tablet for Laptops Leveraging Acoustic Signals." Proceedings of International Conference on Parallel and Distributed Systems (IEEE ICPADS). Sentosa, Singapore. pp. 244-251. 2018. doi: 10.1109/PADSW.2018.8644615.

Lip Reading-based User Authentication through Acoustic Sensing on Smartphones

Published in IEEE/ACM Transactions on Networking, 2019

This work was reported by IEEE Spectrum on Feburary, 2019.

Recommended citation: Li Lu, Jiadi Yu, Yingying Chen, Hongbo Liu, Yanmin Zhu, Linghe Kong, Minglu Li. "Lip Reading-based User Authentication through Acoustic Sensing on Smartphones." IEEE/ACM Transactions on Networking. 27(1). pp. 447-460. 2019. doi: 10.1109/TNET.2019.2891733.

Online Cost-rejection Rate Scheduling for Resource Requests in Hybrid Clouds

Published in Parallel Computing, 2018

PARCOM is a CCF-B journal.

Recommended citation: Yanhua Cao, Li Lu, Jiadi Yu, Shiyou Qian, Yanmin Zhu, Minglu Li. "Online Cost-rejection Rate Scheduling for Resource Requests in Hybrid Clouds." Parallel Computing. 81(1). pp. 85-103. 2018. doi: 10.1016/j.parco.2018.12.003.

LipPass: Lip Reading-based User Authentication Leveraging Acoustic Signals on Smartphones

Published in IEEE International Conference on Computer Communications (IEEE INFOCOM 2018), 2018

IEEE International Conference on Computer Communications is a top ranked international conference in computer networking and communication. IEEE INFOCOM is also a CCF-A conference.

Recommended citation: Li Lu, Jiadi Yu, Yingying Chen, Hongbo Liu, Yanmin Zhu, Yunfei Liu, Minglu Li. "LipPass: Lip Reading-based User Authentication Leveraging Acoustic Signals on Smartphones." Proceedings of IEEE International Conference on Computer Communications (IEEE INFOCOM). Honolulu, HI, USA. pp. 1466-1474. 2018. doi: 10.1109/INFOCOM.2018.8486283.

A Double Auction Mechanism to Bridge Users Task Requirements and Providers Resources in Two-Sided Cloud Markets

Published in IEEE Transactions on Parallel and Distributed Systems, 2017

IEEE TPDS is a CCF-A journal.

Recommended citation: Li Lu, Jiadi Yu, Yanmin Zhu, Minglu Li. "A Double Auction Mechanism to Bridge Users Task Requirements and Providers Resources in Two-Sided Cloud Markets." IEEE Transactions on Parallel and Distributed Systems. 29(4). pp. 720-733. 2018. doi: 10.1109/TPDS.2017.2781236.

Online Cost-Aware Service Requests Scheduling in Hybrid Clouds for Cloud Bursting

Published in International Conference on Web Information Systems Engineering (WISE 2017), 2017

WISE is a CCF-C conference.

Recommended citation: Yanhua Cao, Li Lu, Jiadi Yu, Shiyou Qian, Yanmin Zhu, Minglu Li, Jian Cao, Zhong Wang, Juan Li, Guangtao Xue. "Online Cost-Aware Service Requests Scheduling in Hybrid Clouds for Cloud Bursting." Proceedings of International Conference on Web Information Systems Engineering (WISE). Moscow, Russia. pp. 259-274. 2017. doi: 10.1007/978-3-319-68783-4_18.

Cost-Efficient VM Configuration Algorithm in the Cloud using Mix Scaling Strategy

Published in IEEE International Conference on Communications (IEEE ICC 2017), 2017

IEEE International Conference on Communications is the flagship conference of IEEE Communication Society (IEEE ComSoc). ICC is also a CCF-C conference.

Recommended citation: Li Lu, Jiadi Yu, Yanmin Zhu, Guangtao Xue, Shiyou Qian, Minglu Li. "Cost-Efficient VM Configuration Algorithm in the Cloud using Mix Scaling Strategy." Proceedings of IEEE International Conference on Communications (IEEE ICC). Paris, France. pp. 1-6. 2017. doi: 10.1109/ICC.2017.7997241.

An Energy Efficient Algorithm for Virtual Machine Allocation in Cloud Datacenters

Published in Conference on Advanced Computer Architecture (CCF ACA 2016), 2016

Annual Conference on Adbanced Computer Architecture of China is the premier conference of computer system architecture in China.

Recommended citation: Ahmad Ali, Li Lu, Yanmin Zhu, Jiadi Yu. "An Energy Efficient Algorithm for Virtual Machine Allocation in Cloud Datacenters." Proceedings of Conference on Advanced Computer Architecture (CCF ACA). Weihai, Shandong, China. pp. 61-72. 2016. doi: 10.1007/978-981-10-2209-8_6.