NOTES

Photo Gallery

VIDEOS

You are now here Home > Academics > Professors >

CS:Li Lu

published: 2015-12-09 21:07:17       hits: 

name : Li Lu Gender: Male phone: (86) 153 904 46500
email: luli2009@uestc.edu.cn office-address: Room No. 203, Section B1, Main Building, Qingshuihe Campus
PH.D  Supervisor: Yes Master Supervisor: Yes
major: Computer Science and Technology
research interst: I am interested in Wireless application and system security, including Radio Frequency Identification Techonolgy, Wireless network, Mobile computing and Network Security. 
Biography: I received my master and bachelar degrees in 2000 and 2003 respectively at Zhejiang University, both in EE. I was a joint Ph.D student of Chinese Academy of Science and Hong Kong University of Science and Technology and got the Ph.D in 2007 in CS. From Sept 2007 to Sept 2009, I was a reserach fellow at Hong Kong University of Science and Technology. Now I am with UESTC as an associate professor and Ph.D supervisor as well from Sept 2009.  
Education experience: Study Abroad: Dept. Computer Science and Engineering, Univ. Hong Kong University of Science and Techonology
Research Topic: Security in Wireless systems
Date: Sept. 2007 – Sept. 2009
Ph.D: Joint student of Chinces Academy of Science and Hong Kong University of Science and Technology
Research Topic: Applied Cryptography and Network Systems.
Date: Sept. 2003 - July 2007
Mphil: School of Electrical Engineering, Zhejiang University
Date: Sept. 2000 - April 2003
B.Sc.: School of Electrical Engineering, Zhejiang University
Date: Sept. 1996 -  July 2000
Selected Publications:
Refereed Journal Publications:
[1] Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Huai,  Lionel M Ni, and Jian Ma, "Pseudo Trust: Zero-Knowledge Authentication in Anonymous Peer-to-Peer Protocols", , IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol 19, No. 10, October 2008, Pages 1325-1337.
[2] Li Lu, Jinsong Han, Lei Hu, and Lionel M. Ni, “Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems”, International Journal of Distributed Sensor Networks, Volume 2012 (2012), Article ID 153912.
[3]Hui Zhao, Li Lu, Chao Song, Yue Wu. “Location-aware Based Intelligent Parking Guidance over Infrastructureless VANETs”, International Journal of Distributed Sensor Networks, to be accepted and appear in 2013.
[4]Deke Guo, Hai Jin, Tao Chen, Jie Wu, Li Lu, Dongsheng Li, Xiaolei Zhou, “Partial Probing for Scaling Overlay Routing”, IEEE Transactions on Parallel and Distributed Systems (TPDS), to be accepted and appear in 2013.
[5]Li Lu, Jinsong Han, Yunhao Liu, “ACTION: breaking the privacy barrier for RFID systems”, accepted to appear in Journal of Ad Hoc & Sensor Wireless Networks.
[6]Saiyu Qi, Li Lu, Mo Li, “BEST: a bidirectional efficiency-privacy transferable authentication protocol for RFID-enabled supply chain”, accepted to appear in International Journal on Ad Hoc and Ubiquitous Computing, 2014.
Refereed Conference Publications:
[1]Jun Qin, Hongzi Zhu, Yanmin Zhu, Li Lu, Guangtao Xue, Minglu Li, “POST: Exploiting Dynamic Sociality for Mobile Advertising in Vehicular Networks”, accepted to appear in IEEE Infocom 2014.
[2]Saiyu Qi, Yuanqing Zheng, Mo Li, Li Lu, Yunhao Liu, “COLLECTOR: A Secure RFID-Enabled Batch Recall Protocol”, Accepted to appear in IEEE Infocom 2014.
[3]Shan Chang, Hui Song, Li Lu, Qingsong Yao, Yong Qi, Random Graph Based Benchmarking Methodology for RFID Security Protocols, IEEE International Conference on e-Business Engineering (ICEBE 2013).
[4] Li Lu, Yunhao Liu, Xiangyang Li, “Refresh: Weak Privacy Model for RFID Systems”, The IEEE 29th Conference on Computer & Communications (InfoCom), San Diego, USA, March, 2010.
[5] Li Lu, Jinsong Han, Renyi Xiao, Yunhao Liu, “Action: Breaking the Privacy Barrier for RFID Systems”, The IEEE 28th Conference on Computer & Communications (InfoCom), Rio de Janeiro, Brazil, April, 2009.
[6] Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jianyu Li, Lionel M. Ni, “Pseudo Trust: Zero-knowledge Authentication in Anonymous Peer-to-Peer Protocols”, the 21st IEEE International Parallel & Distributed Processing Symposium (IPDPS’07), Long Beach, USA, March, 2007.
[7] Li Lu, Yunhao Liu, Lei Hu, Jinsong Han, Lionel. M. Ni, “Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems”, the fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom’07), New York, USA, March, 2007.
[8] Li Lu, Lei Hu, “Pairing-Based Multi-Recipient Public Key Encryption”, The 2006 International Conference on Security & Management (SAM’06), Las Vegas, Nevada, USA, June, 2006.
[9] Jinsong Han, Yunhao Liu, Li Lu, Lei Hu, and Abhishsek Patil, '' A Random Walk Based Anonymous Peer-to-Peer Protocol Design'', International Conference on Computer Networks and Mobile Computing (ICCNMC’05), Zhangjiajie, China, August, 2005.
[10] Nigang Sun, Lei Hu, Li Lu, Xuyun Nie. A New Prime-Phase Sequence Family with Low Correlation and Large Size. Proceedings of International Workshop on Signal Design and Its Applications in Communications, 2007, Chengdu: IEEE Press, pp. 79--83.
[11] Fen Liu, Lei Hu, Li Lu, Weijia Wang, "Privacy-preserving Authentication with Low Computational Overhead for RFID Systems", In proceedings of  International Workshop on Secure and Multimodal Pervasive Environments, SMPE workshop of Conference on Security and Privacy in Communication Networks (SecureComm) 2007.
US Patent: Li Lu, Yunhao Liu, Jinsong Han, “RFID Privacy-Preserving Authentication System and Method”, US provisional Patent, Allowance No. 12/544, 214