The insecurity of home digital voice assistants-vulnerabilities, attacks and countermeasures X Lei, GH Tu, AX Liu, CY Li, T Xie 2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018 | 215* | 2018 |
Insecurity of voice solution VoLTE in LTE mobile networks CY Li, GH Tu, C Peng, Z Yuan, Y Li, S Lu, X Wang Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 109 | 2015 |
Mobile micro-cloud: Application classification, mapping, and deployment S Wang, GH Tu, R Ganti, T He, K Leung, H Tripp, K Warr, M Zafer Proc. Annual Fall Meeting of ITA (AMITA), 2013 | 75 | 2013 |
Address resolution protocol (ARP) cache management methods and devices JH Sun, GH Tu US Patent App. 11/552,678, 2008 | 71 | 2008 |
Control-plane protocol interactions in cellular networks GH Tu, Y Li, C Peng, CY Li, H Wang, S Lu ACM SIGCOMM Computer Communication Review 44 (4), 223-234, 2014 | 66* | 2014 |
New security threats caused by IMS-based SMS service in 4G LTE networks GH Tu, CY Li, C Peng, Y Li, S Lu Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 65 | 2016 |
Mobile data charging: new attacks and countermeasures C Peng, C Li, GH Tu, S Lu, L Zhang Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 52 | 2012 |
Method and system for serverless VoIP service in personal communication network GH Tu US Patent 7,519,075, 2009 | 46 | 2009 |
SecEQP: A secure and efficient scheme for SkNN query problem over encrypted geodata on cloud X Lei, AX Liu, R Li, GH Tu 2019 IEEE 35th International Conference on Data Engineering (ICDE), 662-673, 2019 | 45 | 2019 |
System and method for processing multimedia messages CW Li, GH Tu US Patent App. 11/358,542, 2007 | 45 | 2007 |
Mobile edge computing platform deployment in 4G {LTE} networks: A middlebox approach CY Li, HY Liu, PH Huang, HT Chien, GH Tu, PY Hong, YD Lin USENIX Workshop on Hot Topics in Edge Computing (HotEdge 18), 2018 | 44 | 2018 |
Can we pay for what we get in 3G data access? C Peng, GH Tu, CY Li, S Lu Proceedings of the 18th annual international conference on Mobile computing …, 2012 | 43 | 2012 |
Mobile communication apparatus having anti-theft and auto-notification functions GH Tu US Patent 7,574,235, 2009 | 38 | 2009 |
Real threats to your data bills: Security loopholes and defenses in mobile data charging C Peng, CY Li, H Wang, GH Tu, S Lu Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 36 | 2014 |
How voice call technology poses security threats in 4G LTE networks GH Tu, CY Li, C Peng, S Lu 2015 IEEE conference on communications and network security (CNS), 442-450, 2015 | 35 | 2015 |
{iCellular}:{Device-Customized} Cellular Network Access on Commodity Smartphones Y Li, H Deng, C Peng, Z Yuan, GH Tu, J Li, S Lu 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2016 | 33 | 2016 |
V2PSense: Enabling cellular-based V2P collision warning service through mobile sensing CY Li, G Salinas, PH Huang, GH Tu, GH Hsu, TY Hsieh 2018 IEEE International Conference on Communications (ICC), 1-6, 2018 | 31 | 2018 |
How voice calls affect data in operational LTE networks GH Tu, C Peng, H Wang, CY Li, S Lu Proceedings of the 19th annual international conference on Mobile computing …, 2013 | 31 | 2013 |
Mobile communication apparatus having anti-theft and auto-notification functions A Jain, A Kumar, GH Tu US Patent 9,160,830, 2015 | 30 | 2015 |
The security in optical wireless communication: A survey X Zhang, G Klevering, X Lei, Y Hu, L Xiao, GH Tu ACM Computing Surveys 55 (14s), 1-36, 2023 | 29 | 2023 |