Follow
Chi-Yu Li
Chi-Yu Li
Verified email at cs.nctu.edu.tw
Title
Cited by
Cited by
Year
The insecurity of home digital voice assistants--amazon alexa as a case study
X Lei, GH Tu, AX Liu, K Ali, CY Li, T Xie
arXiv preprint arXiv:1712.03327, 2017
1002017
Insecurity of voice solution VoLTE in LTE mobile networks
CY Li, GH Tu, C Peng, Z Yuan, Y Li, S Lu, X Wang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
902015
Energy-based rate adaptation for 802.11 n
CY Li, C Peng, S Lu, X Wang
Proceedings of the 18th annual international conference on Mobile computing …, 2012
852012
The insecurity of home digital voice assistants-vulnerabilities, attacks and countermeasures
X Lei, GH Tu, AX Liu, CY Li, T Xie
2018 IEEE conference on communications and network security (CNS), 1-9, 2018
662018
Control-plane protocol interactions in cellular networks
GH Tu, Y Li, C Peng, CY Li, H Wang, S Lu
ACM SIGCOMM Computer Communication Review 44 (4), 223-234, 2014
562014
Mobile data charging: new attacks and countermeasures
C Peng, C Li, GH Tu, S Lu, L Zhang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
472012
New security threats caused by IMS-based SMS service in 4G LTE networks
GH Tu, CY Li, C Peng, Y Li, S Lu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
422016
Can we pay for what we get in 3G data access?
C Peng, GH Tu, CY Li, S Lu
Proceedings of the 18th annual international conference on Mobile computing …, 2012
412012
Mobile Edge Computing Platform Deployment in 4G LTE Networks: A Middlebox Approach.
CY Li, HY Liu, PH Huang, HT Chien, GH Tu, PY Hong, YD Lin
HotEdge, 2018
392018
What is wrong/right with IEEE 802.11 n spatial multiplexing power save feature?
I Pefkianakis, CY Li, S Lu
2011 19th IEEE International Conference on Network Protocols, 186-195, 2011
342011
How voice call technology poses security threats in 4g lte networks
GH Tu, CY Li, C Peng, S Lu
2015 IEEE Conference on Communications and Network Security (CNS), 442-450, 2015
332015
Real threats to your data bills: Security loopholes and defenses in mobile data charging
C Peng, CY Li, H Wang, GH Tu, S Lu
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
332014
How voice calls affect data in operational LTE networks
GH Tu, C Peng, H Wang, CY Li, S Lu
Proceedings of the 19th annual international conference on Mobile computing …, 2013
322013
Accounting for roaming users on mobile data access: Issues and root causes
GH Tu, C Peng, CY Li, X Ma, H Wang, T Wang, S Lu
Proceeding of the 11th annual international conference on Mobile systems …, 2013
282013
Implementing instant messaging using named data
J Wang, C Peng, C Li, E Osterweil, R Wakikawa, P Cheng, L Zhang
Proceedings of the 6th Asian Internet Engineering Conference, 40-47, 2010
262010
A MAC protocol for multi-channel multi-interface wireless mesh network using hybrid channel assignment scheme
CY Li, AK Jeng, RH Jan
Journal of Information Science and Engineering 23 (4), 1041-1055, 2007
242007
Release-time-based multi-channel MAC protocol for wireless mesh networks
AAK Jeng, RH Jan, CY Li, C Chen
Computer Networks 55 (9), 2176-2195, 2011
222011
Transparent AAA security design for low-latency MEC-integrated cellular networks
CY Li, YD Lin, YC Lai, HT Chien, YS Huang, PH Huang, HY Liu
IEEE Transactions on Vehicular Technology 69 (3), 3231-3243, 2020
192020
Latency-aware rate adaptation in 802.11 n home networks
CY Li, C Peng, S Lu, X Wang, R Chandra
2015 IEEE Conference on Computer Communications (INFOCOM), 1293-1301, 2015
192015
V2PSense: Enabling cellular-based V2P collision warning service through mobile sensing
CY Li, G Salinas, PH Huang, GH Tu, GH Hsu, TY Hsieh
2018 IEEE International Conference on Communications (ICC), 1-6, 2018
172018
The system can't perform the operation now. Try again later.
Articles 1–20