Chi-Yu Li
Chi-Yu Li
Verified email at cs.nctu.edu.tw
TitleCited byYear
Energy-based rate adaptation for 802.11 n
CY Li, C Peng, S Lu, X Wang
Proceedings of the 18th annual international conference on Mobile computing …, 2012
662012
Insecurity of voice solution volte in lte mobile networks
CY Li, GH Tu, C Peng, Z Yuan, Y Li, S Lu, X Wang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
412015
Mobile data charging: new attacks and countermeasures
C Peng, C Li, GH Tu, S Lu, L Zhang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
392012
Can we pay for what we get in 3G data access?
C Peng, G Tu, C Li, S Lu
Proceedings of the 18th annual international conference on Mobile computing …, 2012
332012
Control-plane protocol interactions in cellular networks
GH Tu, Y Li, C Peng, CY Li, H Wang, S Lu
ACM SIGCOMM Computer Communication Review 44 (4), 223-234, 2015
272015
How voice calls affect data in operational LTE networks
GH Tu, C Peng, H Wang, CY Li, S Lu
Proceedings of the 19th annual international conference on Mobile computing …, 2013
272013
What is wrong/right with IEEE 802.11 n spatial multiplexing power save feature?
I Pefkianakis, CY Li, S Lu
2011 19th IEEE International Conference on Network Protocols, 186-195, 2011
272011
Accounting for roaming users on mobile data access: Issues and root causes
GH Tu, C Peng, CY Li, X Ma, H Wang, T Wang, S Lu
Proceeding of the 11th annual international conference on Mobile systems …, 2013
252013
A MAC protocol for multi-channel multi-interface wireless mesh network using hybrid channel assignment scheme
CY Li, AK Jeng, RH Jan
Journal of Information Science and Engineering 23 (4), 1041-1055, 2007
212007
Real threats to your data bills: Security loopholes and defenses in mobile data charging
C Peng, CY Li, H Wang, GH Tu, S Lu
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
172014
Implementing instant messaging using named data
J Wang, C Peng, C Li, E Osterweil, R Wakikawa, P Cheng, L Zhang
Proceedings of the Sixth Asian Internet Engineering Conference, 40-47, 2010
172010
How voice call technology poses security threats in 4G LTE networks
GH Tu, CY Li, C Peng, S Lu
2015 IEEE Conference on Communications and Network Security (CNS), 442-450, 2015
162015
Release-time-based multi-channel MAC protocol for wireless mesh networks
AAK Jeng, RH Jan, CY Li, C Chen
Computer Networks 55 (9), 2176-2195, 2011
152011
The insecurity of home digital voice assistants-amazon alexa as a case study
X Lei, GH Tu, AX Liu, CY Li, T Xie
arXiv preprint arXiv:1712.03327, 2017
142017
New security threats caused by IMS-based SMS service in 4G LTE networks
GH Tu, CY Li, C Peng, Y Li, S Lu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
132016
Latency-aware rate adaptation in 802.11 n home networks
CY Li, C Peng, S Lu, X Wang, R Chandra
2015 IEEE Conference on Computer Communications (INFOCOM), 1293-1301, 2015
102015
An energy efficiency perspective on rate adaptation for 802.11 n NIC
CY Li, C Peng, P Cheng, S Lu, X Wang, F Ren, T Wang
IEEE Transactions on Mobile Computing 15 (6), 1333-1347, 2015
72015
Mobile Edge Computing Platform Deployment in 4G {LTE} Networks: A Middlebox Approach
CY Li, HY Liu, PH Huang, HT Chien, GH Tu, PY Hong, YD Lin
{USENIX} Workshop on Hot Topics in Edge Computing (HotEdge 18), 2018
62018
Volte*: A lightweight voice solution to 4g lte networks
GH Tu, CY Li, C Peng, Z Yuan, Y Li, X Zhao, S Lu
Proceedings of the 17th International Workshop on Mobile Computing Systems …, 2016
52016
Detecting problematic control-plane protocol interactions in mobile networks
GH Tu, Y Li, C Peng, CY Li, S Lu
IEEE/ACM Transactions on Networking 24 (2), 1209-1222, 2015
52015
The system can't perform the operation now. Try again later.
Articles 1–20