The insecurity of home digital voice assistants--amazon alexa as a case study X Lei, GH Tu, AX Liu, K Ali, CY Li, T Xie arXiv preprint arXiv:1712.03327, 2017 | 104 | 2017 |
Insecurity of voice solution VoLTE in LTE mobile networks CY Li, GH Tu, C Peng, Z Yuan, Y Li, S Lu, X Wang Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 94 | 2015 |
Energy-based rate adaptation for 802.11 n CY Li, C Peng, S Lu, X Wang Proceedings of the 18th annual international conference on Mobile computing …, 2012 | 85 | 2012 |
The insecurity of home digital voice assistants-vulnerabilities, attacks and countermeasures X Lei, GH Tu, AX Liu, CY Li, T Xie 2018 IEEE conference on communications and network security (CNS), 1-9, 2018 | 77 | 2018 |
Control-plane protocol interactions in cellular networks GH Tu, Y Li, C Peng, CY Li, H Wang, S Lu ACM SIGCOMM Computer Communication Review 44 (4), 223-234, 2014 | 57 | 2014 |
Mobile data charging: new attacks and countermeasures C Peng, C Li, GH Tu, S Lu, L Zhang Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 48 | 2012 |
New security threats caused by IMS-based SMS service in 4G LTE networks GH Tu, CY Li, C Peng, Y Li, S Lu Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 47 | 2016 |
Can we pay for what we get in 3G data access? C Peng, GH Tu, CY Li, S Lu Proceedings of the 18th annual international conference on Mobile computing …, 2012 | 41 | 2012 |
Mobile Edge Computing Platform Deployment in 4G LTE Networks: A Middlebox Approach. CY Li, HY Liu, PH Huang, HT Chien, GH Tu, PY Hong, YD Lin HotEdge, 2018 | 40 | 2018 |
How voice call technology poses security threats in 4g lte networks GH Tu, CY Li, C Peng, S Lu 2015 IEEE Conference on Communications and Network Security (CNS), 442-450, 2015 | 34 | 2015 |
What is wrong/right with IEEE 802.11 n spatial multiplexing power save feature? I Pefkianakis, CY Li, S Lu 2011 19th IEEE International Conference on Network Protocols, 186-195, 2011 | 34 | 2011 |
Real threats to your data bills: Security loopholes and defenses in mobile data charging C Peng, CY Li, H Wang, GH Tu, S Lu Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 33 | 2014 |
How voice calls affect data in operational LTE networks GH Tu, C Peng, H Wang, CY Li, S Lu Proceedings of the 19th annual international conference on Mobile computing …, 2013 | 32 | 2013 |
Accounting for roaming users on mobile data access: Issues and root causes GH Tu, C Peng, CY Li, X Ma, H Wang, T Wang, S Lu Proceeding of the 11th annual international conference on Mobile systems …, 2013 | 28 | 2013 |
Implementing instant messaging using named data J Wang, C Peng, C Li, E Osterweil, R Wakikawa, P Cheng, L Zhang Proceedings of the 6th Asian Internet Engineering Conference, 40-47, 2010 | 26 | 2010 |
A MAC protocol for multi-channel multi-interface wireless mesh network using hybrid channel assignment scheme CY Li, AK Jeng, RH Jan Journal of Information Science and Engineering 23 (4), 1041-1055, 2007 | 24 | 2007 |
Transparent AAA security design for low-latency MEC-integrated cellular networks CY Li, YD Lin, YC Lai, HT Chien, YS Huang, PH Huang, HY Liu IEEE Transactions on Vehicular Technology 69 (3), 3231-3243, 2020 | 22 | 2020 |
Release-time-based multi-channel MAC protocol for wireless mesh networks AAK Jeng, RH Jan, CY Li, C Chen Computer Networks 55 (9), 2176-2195, 2011 | 22 | 2011 |
V2PSense: Enabling cellular-based V2P collision warning service through mobile sensing CY Li, G Salinas, PH Huang, GH Tu, GH Hsu, TY Hsieh 2018 IEEE International Conference on Communications (ICC), 1-6, 2018 | 19 | 2018 |
Latency-aware rate adaptation in 802.11 n home networks CY Li, C Peng, S Lu, X Wang, R Chandra 2015 IEEE Conference on Computer Communications (INFOCOM), 1293-1301, 2015 | 19 | 2015 |