Chi-Yu Li
Chi-Yu Li
Verified email at cs.nctu.edu.tw
TitleCited byYear
Energy-based rate adaptation for 802.11 n
CY Li, C Peng, S Lu, X Wang
Proceedings of the 18th annual international conference on Mobile computing …, 2012
672012
Insecurity of voice solution VoLTE in LTE mobile networks
CY Li, GH Tu, C Peng, Z Yuan, Y Li, S Lu, X Wang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
432015
Mobile data charging: new attacks and countermeasures
C Peng, C Li, GH Tu, S Lu, L Zhang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
392012
Can we pay for what we get in 3G data access?
C Peng, G Tu, C Li, S Lu
Proceedings of the 18th annual international conference on Mobile computing …, 2012
342012
Control-plane protocol interactions in cellular networks
GH Tu, Y Li, C Peng, CY Li, H Wang, S Lu
ACM SIGCOMM Computer Communication Review 44 (4), 223-234, 2014
292014
How voice calls affect data in operational LTE networks
GH Tu, C Peng, H Wang, CY Li, S Lu
Proceedings of the 19th annual international conference on Mobile computing …, 2013
282013
What is wrong/right with IEEE 802.11 n spatial multiplexing power save feature?
I Pefkianakis, CY Li, S Lu
2011 19th IEEE International Conference on Network Protocols, 186-195, 2011
272011
Accounting for roaming users on mobile data access: Issues and root causes
GH Tu, C Peng, CY Li, X Ma, H Wang, T Wang, S Lu
Proceeding of the 11th annual international conference on Mobile systems …, 2013
252013
A MAC protocol for multi-channel multi-interface wireless mesh network using hybrid channel assignment scheme
CY Li, AK Jeng, RH Jan
Journal of Information Science and Engineering 23 (4), 1041-1055, 2007
222007
The insecurity of home digital voice assistants-amazon alexa as a case study
X Lei, GH Tu, AX Liu, CY Li, T Xie
arXiv preprint arXiv:1712.03327, 2017
202017
Implementing instant messaging using named data
J Wang, C Peng, C Li, E Osterweil, R Wakikawa, P Cheng, L Zhang
Proceedings of the Sixth Asian Internet Engineering Conference, 40-47, 2010
192010
Real threats to your data bills: Security loopholes and defenses in mobile data charging
C Peng, CY Li, H Wang, GH Tu, S Lu
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
182014
How voice call technology poses security threats in 4G LTE networks
GH Tu, CY Li, C Peng, S Lu
2015 IEEE Conference on Communications and Network Security (CNS), 442-450, 2015
172015
Release-time-based multi-channel MAC protocol for wireless mesh networks
AAK Jeng, RH Jan, CY Li, C Chen
Computer Networks 55 (9), 2176-2195, 2011
162011
New security threats caused by IMS-based SMS service in 4G LTE networks
GH Tu, CY Li, C Peng, Y Li, S Lu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
142016
Latency-aware rate adaptation in 802.11 n home networks
CY Li, C Peng, S Lu, X Wang, R Chandra
2015 IEEE Conference on Computer Communications (INFOCOM), 1293-1301, 2015
112015
An energy efficiency perspective on rate adaptation for 802.11 n NIC
CY Li, C Peng, P Cheng, S Lu, X Wang, F Ren, T Wang
IEEE Transactions on Mobile Computing 15 (6), 1333-1347, 2015
92015
Mobile Edge Computing Platform Deployment in 4G {LTE} Networks: A Middlebox Approach
CY Li, HY Liu, PH Huang, HT Chien, GH Tu, PY Hong, YD Lin
{USENIX} Workshop on Hot Topics in Edge Computing (HotEdge 18), 2018
82018
Method and apparatus for service migration between user devices
LI Bojie, W Zhang, P Chenghui, S Lu, C Li
US Patent App. 14/285,012, 2014
72014
Volte*: A lightweight voice solution to 4g lte networks
GH Tu, CY Li, C Peng, Z Yuan, Y Li, X Zhao, S Lu
Proceedings of the 17th International Workshop on Mobile Computing Systems …, 2016
62016
The system can't perform the operation now. Try again later.
Articles 1–20