What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Li Lu
Google Scholar
ORCID:
0000-0001-5230-3749
14
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
DroneAudioID: A Lightweight Acoustic Fingerprint-Based Drone Authentication System for Secure Drone Delivery.
Meng Zhang
Li Lu
Yuhan Wu
Zheng Yan
Jiaqi Sun
Feng Lin
Kui Ren
2025
conf/sp
From One Stolen Utterance: Assessing the Risks of Voice Cloning in the AIGC Era.
Kun Wang
Meng Chen
Li Lu
Jingwen Feng
Qianniu Chen
Zhongjie Ba
Kui Ren
Chun Chen
2025
journals/tifs
Liquid Crystal Mimics Your Heart: A Physical Spoofing Attack Against PPG-Based Systems.
Junhao Wang
Li Lu
Hao Kong
Feng Lin
Zhongjie Ba
Kui Ren
2024
journals/tifs
AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception.
Meng Chen
Li Lu
Jiadi Yu
Zhongjie Ba
Feng Lin
Kui Ren
2024
journals/tifs
PhaDe: Practical Phantom Spoofing Attack Detection for Autonomous Vehicles.
Feng Lin
Hao Yan
Jin Li
Ziwei Liu
Li Lu
Zhongjie Ba
Kui Ren
2024
journals/tifs
Indelible "Footprints" of Inaudible Command Injection.
Zhongjie Ba
Bin Gong
Yuwei Wang
Yuxuan Liu
Peng Cheng
Feng Lin
Li Lu
Kui Ren
2024
journals/tifs
FLTracer: Accurate Poisoning Attack Provenance in Federated Learning.
Xinyu Zhang
Qingyu Liu
Zhongjie Ba
Yuan Hong
Tianhang Zheng
Feng Lin
Li Lu
Kui Ren
2024
conf/uss
MicGuard: A Comprehensive Detection System against Out-of-band Injection Attacks for Different Level Microphone-based Devices.
Tiantian Liu
Feng Lin
Zhongjie Ba
Li Lu
Zhan Qin
Kui Ren
2024
conf/uss
FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition.
Kun Wang
Xiangyu Xu
Li Lu
Zhongjie Ba
Feng Lin
Kui Ren
2024
conf/uss
Devil in the Room: Triggering Audio Backdoors in the Physical World.
Meng Chen
Xiangyu Xu
Li Lu
Zhongjie Ba
Feng Lin
Kui Ren
2024
conf/sp
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features.
Peng Cheng
Yuwei Wang
Peng Huang
Zhongjie Ba
Xiaodong Lin
Feng Lin
Li Lu
Kui Ren
2023
conf/ccs
FITS: Matching Camera Fingerprints Subject to Software Noise Pollution.
Liu Liu
Xinwen Fu
Xiaodong Chen
Jianpeng Wang
Zhongjie Ba
Feng Lin
Li Lu
Kui Ren
2023
conf/sp
MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.
Tiantian Liu
Feng Lin
Zhangsen Wang
Chao Wang
Zhongjie Ba
Li Lu
Wenyao Xu
Kui Ren
2023
conf/ndss
InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise.
Peng Huang
Yao Wei
Peng Cheng
Zhongjie Ba
Li Lu
Feng Lin
Fan Zhang
Kui Ren
Coauthors
Bin Gong
(1)
Chao Wang
(1)
Chun Chen
(1)
Fan Zhang
(1)
Feng Lin
(13)
Hao Kong
(1)
Hao Yan
(1)
Jiadi Yu
(1)
Jianpeng Wang
(1)
Jiaqi Sun
(1)
Jin Li
(1)
Jingwen Feng
(1)
Junhao Wang
(1)
Kui Ren
(14)
Kun Wang
(2)
Li Lu
(14)
Liu Liu
(1)
Meng Chen
(3)
Meng Zhang
(1)
Peng Cheng
(3)
Peng Huang
(2)
Qianniu Chen
(1)
Qingyu Liu
(1)
Tianhang Zheng
(1)
Tiantian Liu
(2)
Wenyao Xu
(1)
Xiangyu Xu
(2)
Xiaodong Chen
(1)
Xiaodong Lin
(1)
Xinwen Fu
(1)
Xinyu Zhang
(1)
Yao Wei
(1)
Yuan Hong
(1)
Yuhan Wu
(1)
Yuwei Wang
(2)
Yuxuan Liu
(1)
Zhan Qin
(1)
Zhangsen Wang
(1)
Zheng Yan
(1)
Zhongjie Ba
(13)
Ziwei Liu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to