The insecurity of home digital voice assistants--amazon alexa as a case study X Lei, GH Tu, AX Liu, K Ali, CY Li, T Xie arXiv preprint arXiv:1712.03327, 2017 | 120 | 2017 |
Insecurity of voice solution VoLTE in LTE mobile networks CY Li, GH Tu, C Peng, Z Yuan, Y Li, S Lu, X Wang Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 107 | 2015 |
The insecurity of home digital voice assistants-vulnerabilities, attacks and countermeasures X Lei, GH Tu, AX Liu, CY Li, T Xie 2018 IEEE conference on communications and network security (CNS), 1-9, 2018 | 102 | 2018 |
Energy-based rate adaptation for 802.11 n CY Li, C Peng, S Lu, X Wang Proceedings of the 18th annual international conference on Mobile computing …, 2012 | 82 | 2012 |
New security threats caused by IMS-based SMS service in 4G LTE networks GH Tu, CY Li, C Peng, Y Li, S Lu Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 64 | 2016 |
Control-plane protocol interactions in cellular networks GH Tu, Y Li, C Peng, CY Li, H Wang, S Lu ACM SIGCOMM Computer Communication Review 44 (4), 223-234, 2014 | 57 | 2014 |
Mobile data charging: new attacks and countermeasures C Peng, C Li, GH Tu, S Lu, L Zhang Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 50 | 2012 |
Mobile edge computing platform deployment in 4G {LTE} networks: A middlebox approach CY Li, HY Liu, PH Huang, HT Chien, GH Tu, PY Hong, YD Lin USENIX Workshop on Hot Topics in Edge Computing (HotEdge 18), 2018 | 43 | 2018 |
Can we pay for what we get in 3G data access? C Peng, GH Tu, CY Li, S Lu Proceedings of the 18th annual international conference on Mobile computing …, 2012 | 43 | 2012 |
How voice call technology poses security threats in 4G LTE networks GH Tu, CY Li, C Peng, S Lu 2015 IEEE conference on communications and network security (CNS), 442-450, 2015 | 35 | 2015 |
Real threats to your data bills: Security loopholes and defenses in mobile data charging C Peng, CY Li, H Wang, GH Tu, S Lu Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 35 | 2014 |
What is wrong/right with IEEE 802.11 n spatial multiplexing power save feature? I Pefkianakis, CY Li, S Lu 2011 19th IEEE International Conference on Network Protocols, 186-195, 2011 | 34 | 2011 |
V2PSense: Enabling cellular-based V2P collision warning service through mobile sensing CY Li, G Salinas, PH Huang, GH Tu, GH Hsu, TY Hsieh 2018 IEEE International Conference on Communications (ICC), 1-6, 2018 | 31 | 2018 |
How voice calls affect data in operational LTE networks GH Tu, C Peng, H Wang, CY Li, S Lu Proceedings of the 19th annual international conference on Mobile computing …, 2013 | 31 | 2013 |
An experience driven design for IEEE 802.11 ac rate adaptation based on reinforcement learning SC Chen, CY Li, CH Chiu IEEE INFOCOm 2021-IEEE conference on computer communications, 1-10, 2021 | 30 | 2021 |
Transparent AAA security design for low-latency MEC-integrated cellular networks CY Li, YD Lin, YC Lai, HT Chien, YS Huang, PH Huang, HY Liu IEEE Transactions on Vehicular Technology 69 (3), 3231-3243, 2020 | 30 | 2020 |
Accounting for roaming users on mobile data access: Issues and root causes GH Tu, C Peng, CY Li, X Ma, H Wang, T Wang, S Lu Proceeding of the 11th annual international conference on Mobile systems …, 2013 | 27 | 2013 |
Practical machine learning-based rate adaptation solution for Wi-Fi NICs: IEEE 802.11 ac as a case study CY Li, SC Chen, CT Kuo, CH Chiu IEEE Transactions on Vehicular Technology 69 (9), 10264-10277, 2020 | 25 | 2020 |
Implementing instant messaging using named data J Wang, C Peng, C Li, E Osterweil, R Wakikawa, P Cheng, L Zhang Proceedings of the 6th Asian Internet Engineering Conference, 40-47, 2010 | 25 | 2010 |
A MAC protocol for multi-channel multi-interface wireless mesh network using hybrid channel assignment scheme CY Li, AK Jeng, RH Jan Journal of Information Science and Engineering 23 (4), 1041-1055, 2007 | 24 | 2007 |