The insecurity of home digital voice assistants-vulnerabilities, attacks and countermeasures X Lei, GH Tu, AX Liu, CY Li, T Xie 2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018 | 174* | 2018 |
Insecurity of voice solution VoLTE in LTE mobile networks CY Li, GH Tu, C Peng, Z Yuan, Y Li, S Lu, X Wang Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 94 | 2015 |
Mobile micro-cloud: Application classification, mapping, and deployment S Wang, GH Tu, R Ganti, T He, K Leung, H Tripp, K Warr, M Zafer Proc. Annual Fall Meeting of ITA (AMITA), 2013 | 71 | 2013 |
Address resolution protocol (ARP) cache management methods and devices JH Sun, GH Tu US Patent App. 11/552,678, 2008 | 69 | 2008 |
Control-plane protocol interactions in cellular networks GH Tu, Y Li, C Peng, CY Li, H Wang, S Lu ACM SIGCOMM Computer Communication Review 44 (4), 223-234, 2014 | 63* | 2014 |
Mobile data charging: new attacks and countermeasures C Peng, C Li, GH Tu, S Lu, L Zhang Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 48 | 2012 |
New security threats caused by IMS-based SMS service in 4G LTE networks GH Tu, CY Li, C Peng, Y Li, S Lu Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 47 | 2016 |
Method and system for serverless VoIP service in personal communication network GH Tu US Patent 7,519,075, 2009 | 45 | 2009 |
System and method for processing multimedia messages CW Li, GH Tu US Patent App. 11/358,542, 2007 | 44 | 2007 |
Can we pay for what we get in 3G data access? C Peng, GH Tu, CY Li, S Lu Proceedings of the 18th annual international conference on Mobile computing …, 2012 | 41 | 2012 |
Mobile Edge Computing Platform Deployment in 4G LTE Networks: A Middlebox Approach. CY Li, HY Liu, PH Huang, HT Chien, GH Tu, PY Hong, YD Lin HotEdge, 2018 | 40 | 2018 |
Mobile communication apparatus having anti-theft and auto-notification functions GH Tu US Patent 7,574,235, 2009 | 38 | 2009 |
How voice call technology poses security threats in 4g lte networks GH Tu, CY Li, C Peng, S Lu 2015 IEEE Conference on Communications and Network Security (CNS), 442-450, 2015 | 34 | 2015 |
Real threats to your data bills: Security loopholes and defenses in mobile data charging C Peng, CY Li, H Wang, GH Tu, S Lu Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 33 | 2014 |
How voice calls affect data in operational LTE networks GH Tu, C Peng, H Wang, CY Li, S Lu Proceedings of the 19th annual international conference on Mobile computing …, 2013 | 32 | 2013 |
Seceqp: A secure and efficient scheme for sknn query problem over encrypted geodata on cloud X Lei, AX Liu, R Li, GH Tu 2019 IEEE 35th International Conference on Data Engineering (ICDE), 662-673, 2019 | 31 | 2019 |
icellular: Device-customized cellular network access on commodity smartphones Y Li, H Deng, C Peng, Z Yuan, GH Tu, J Li, S Lu 13th {USENIX} Symposium on Networked Systems Design and Implementation …, 2016 | 29 | 2016 |
Mobile communication apparatus having anti-theft and auto-notification functions A Jain, A Kumar, GH Tu US Patent 9,160,830, 2015 | 29 | 2015 |
Accounting for roaming users on mobile data access: Issues and root causes GH Tu, C Peng, CY Li, X Ma, H Wang, T Wang, S Lu Proceeding of the 11th annual international conference on Mobile systems …, 2013 | 28 | 2013 |
Communication device for wireless virtual storage and method thereof GH Tu, WH Lien US Patent App. 11/942,812, 2009 | 24 | 2009 |