Follow
Chi-Yu Li
Chi-Yu Li
Verified email at cs.nctu.edu.tw
Title
Cited by
Cited by
Year
The insecurity of home digital voice assistants--amazon alexa as a case study
X Lei, GH Tu, AX Liu, K Ali, CY Li, T Xie
arXiv preprint arXiv:1712.03327, 2017
1162017
Insecurity of voice solution VoLTE in LTE mobile networks
CY Li, GH Tu, C Peng, Z Yuan, Y Li, S Lu, X Wang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1032015
The insecurity of home digital voice assistants-vulnerabilities, attacks and countermeasures
X Lei, GH Tu, AX Liu, CY Li, T Xie
2018 IEEE conference on communications and network security (CNS), 1-9, 2018
962018
Energy-based rate adaptation for 802.11 n
CY Li, C Peng, S Lu, X Wang
Proceedings of the 18th annual international conference on Mobile computing …, 2012
872012
New security threats caused by IMS-based SMS service in 4G LTE networks
GH Tu, CY Li, C Peng, Y Li, S Lu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
582016
Control-plane protocol interactions in cellular networks
GH Tu, Y Li, C Peng, CY Li, H Wang, S Lu
ACM SIGCOMM Computer Communication Review 44 (4), 223-234, 2014
572014
Mobile data charging: new attacks and countermeasures
C Peng, C Li, GH Tu, S Lu, L Zhang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
482012
Mobile edge computing platform deployment in 4G {LTE} networks: A middlebox approach
CY Li, HY Liu, PH Huang, HT Chien, GH Tu, PY Hong, YD Lin
USENIX Workshop on Hot Topics in Edge Computing (HotEdge 18), 2018
432018
Can we pay for what we get in 3G data access?
C Peng, GH Tu, CY Li, S Lu
Proceedings of the 18th annual international conference on Mobile computing …, 2012
432012
Real threats to your data bills: Security loopholes and defenses in mobile data charging
C Peng, CY Li, H Wang, GH Tu, S Lu
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
332014
What is wrong/right with IEEE 802.11 n spatial multiplexing power save feature?
I Pefkianakis, CY Li, S Lu
2011 19th IEEE International Conference on Network Protocols, 186-195, 2011
332011
How voice call technology poses security threats in 4G LTE networks
GH Tu, CY Li, C Peng, S Lu
2015 IEEE conference on communications and network security (CNS), 442-450, 2015
312015
How voice calls affect data in operational LTE networks
GH Tu, C Peng, H Wang, CY Li, S Lu
Proceedings of the 19th annual international conference on Mobile computing …, 2013
312013
Transparent AAA security design for low-latency MEC-integrated cellular networks
CY Li, YD Lin, YC Lai, HT Chien, YS Huang, PH Huang, HY Liu
IEEE Transactions on Vehicular Technology 69 (3), 3231-3243, 2020
292020
Accounting for roaming users on mobile data access: Issues and root causes
GH Tu, C Peng, CY Li, X Ma, H Wang, T Wang, S Lu
Proceeding of the 11th annual international conference on Mobile systems …, 2013
272013
V2PSense: Enabling cellular-based V2P collision warning service through mobile sensing
CY Li, G Salinas, PH Huang, GH Tu, GH Hsu, TY Hsieh
2018 IEEE International Conference on Communications (ICC), 1-6, 2018
262018
Implementing instant messaging using named data
J Wang, C Peng, C Li, E Osterweil, R Wakikawa, P Cheng, L Zhang
Proceedings of the 6th Asian Internet Engineering Conference, 40-47, 2010
252010
A MAC protocol for multi-channel multi-interface wireless mesh network using hybrid channel assignment scheme
CY Li, AK Jeng, RH Jan
Journal of Information Science and Engineering 23 (4), 1041-1055, 2007
252007
SecWIR: Securing smart home IoT communications via wi-fi routers with embedded intelligence
X Lei, GH Tu, CY Li, T Xie, M Zhang
Proceedings of the 18th International Conference on Mobile Systems …, 2020
222020
Latency-aware rate adaptation in 802.11 n home networks
CY Li, C Peng, S Lu, X Wang, R Chandra
2015 IEEE Conference on Computer Communications (INFOCOM), 1293-1301, 2015
222015
The system can't perform the operation now. Try again later.
Articles 1–20