Chi-Yu Li
2635  Ergebnisse:
Personensuche X
?
1

IMS is Not That Secure on Your 5G/4G Phones:

, In: Proceedings of the 30th Annual International Conference on Mobile Computing and Networking,
Shi, Jingwen ; Wang, Sihan ; Chen, Min-Yue... - p. 513-527 , 2024
 
?
2

Practical Latency-Aware Scheduling for Low-Latency Elephant..:

, In: 2024 IEEE International Conference on Pervasive Computing and Communications (PerCom),
Lu, Shao-Jung ; Chen, Wei-Xun ; Su, Yu-Shao... - p. 57-68 , 2024
 
?
3

Remote Detection of 4G/5G UEs Vulnerable to Stealthy Call D..:

, In: IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),
Chen, Man-Hsin ; Wu, Chiung-I ; Li, Yin-Chi.. - p. 1-2 , 2023
 
?
4

A Runtime Anomaly Detector via Service Communication Proxy ..:

, In: IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),
Li, Yin-Chi ; Liu, Ping-Tsan ; Tai, Yi-An... - p. 1-2 , 2023
 
?
5

When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak ..:

, In: 2023 IEEE Conference on Communications and Network Security (CNS),
Shi, Jingwen ; Xie, Tian ; Tu, Guan-Hua... - p. 1-9 , 2023
 
?
6

Congestion-Avoidance Adaptation for Edge-based UAV Video Fr..:

, In: GLOBECOM 2023 - 2023 IEEE Global Communications Conference,
Wu, Meng-Shou ; Phan, Tan Tai ; Kao, Ping-Kuan. - p. 4546-4551 , 2023
 
?
7

Uncovering insecure designs of cellular emergency services ..:

, In: Proceedings of the 28th Annual International Conference on Mobile Computing And Networking,
Hu, Yiwen ; Chen, Min-Yue ; Tu, Guan-Hua... - p. 703-715 , 2022
 
?
8

Insecurity of operational cellular IoT service : new vul..:

, In: Proceedings of the 27th Annual International Conference on Mobile Computing and Networking,
Wang, Sihan ; Tu, Guan-Hua ; Lei, Xinyu... - p. 437-450 , 2021
 
?
9

Security Threats from Bitcoin Wallet Smartphone Application..:

, In: Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy,
Hu, Yiwen ; Wang, Sihan ; Tu, Guan-Hua... - p. 89-100 , 2021
 
?
10

An Experience Driven Design for IEEE 802.11ac Rate Adaptati..:

, In: IEEE INFOCOM 2021 - IEEE Conference on Computer Communications,
 
?
11

SecWIR : securing smart home IoT communications via wi-f..:

, In: Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services,
Lei, Xinyu ; Tu, Guan-Hua ; Li, Chi-Yu.. - p. 260-272 , 2020
 
?
12

Transparent 3rd-Party Authentication with Application Mobil..:

, In: 2020 European Conference on Networks and Communications (EuCNC),
Ali, Asad ; Lin, Ying-Dar ; Li, Chi-Yu. - p. 219-224 , 2020
 
?
13

WBF-PS: WiGig Beam Fingerprinting for UAV Positioning Syste..:

, In: IEEE INFOCOM 2020 - IEEE Conference on Computer Communications,
Hong, Pei-Yuan ; Li, Chi-Yu ; Chang, Hong-Rong.. - p. 1778-1787 , 2020
 
?
14

Ghost calls from operational 4G call systems : IMS vulne..:

, In: Proceedings of the 26th Annual International Conference on Mobile Computing and Networking,
Lu, Yu-Han ; Li, Chi-Yu ; Li, Yao-Yu... - p. 1-14 , 2020
 
?
15

Exploring the Insecurity of Google Account Registration Pro..:

, In: 2019 IEEE Symposium Series on Computational Intelligence (SSCI),
Xie, Tian ; Wang, Sihan ; Tu, Guan-Hua.. - p. 3087-3096 , 2019
 
1-15