The insecurity of home digital voice assistants-vulnerabilities, attacks and countermeasures X Lei, GH Tu, AX Liu, CY Li, T Xie 2018 IEEE conference on communications and network security (CNS), 1-9, 2018 | 219* | 2018 |
A flexible, micro-lens-coupled LED stimulator for optical neuromodulation X Bi, T Xie, B Fan, W Khan, Y Guo, W Li IEEE transactions on biomedical circuits and systems 10 (5), 972-978, 2016 | 31 | 2016 |
Security threats from bitcoin wallet smartphone applications: Vulnerabilities, attacks, and countermeasures Y Hu, S Wang, GH Tu, L Xiao, T Xie, X Lei, CY Li Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021 | 24 | 2021 |
SecWIR: Securing smart home IoT communications via wi-fi routers with embedded intelligence X Lei, GH Tu, CY Li, T Xie, M Zhang Proceedings of the 18th International Conference on Mobile Systems …, 2020 | 22 | 2020 |
How can IoT services pose new security threats in operational cellular networks? T Xie, GH Tu, CY Li, C Peng IEEE Transactions on Mobile Computing 20 (8), 2592-2606, 2020 | 19 | 2020 |
The untold secrets of wifi-calling services: Vulnerabilities, attacks, and countermeasures T Xie, GH Tu, B Yin, CY Li, C Peng, M Zhang, H Liu, X Liu IEEE Transactions on Mobile Computing 20 (11), 3131-3147, 2020 | 16* | 2020 |
Ghost calls from operational 4G call systems: IMS vulnerability, call DoS attack, and countermeasure YH Lu, CY Li, YY Li, SHY Hsiao, T Xie, GH Tu, WX Chen Proceedings of the 26th Annual International Conference on Mobile Computing …, 2020 | 16 | 2020 |
Fast and secure knn query processing in cloud computing X Lei, GH Tu, AX Liu, T Xie 2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020 | 15 | 2020 |
The dark side of operational Wi-Fi calling services T Xie, GH Tu, CY Li, C Peng, J Li, M Zhang 2018 IEEE Conference on Communications and Network Security (CNS), 1-1, 2018 | 13 | 2018 |
Insecurity of operational cellular IoT service: New vulnerabilities, attacks, and countermeasures S Wang, GH Tu, X Lei, T Xie, CY Li, PY Chou, F Hsieh, Y Hu, L Xiao, ... Proceedings of the 27th Annual International Conference on Mobile Computing …, 2021 | 10 | 2021 |
How voice service threatens cellular-connected IoT devices in the operational 4G LTE networks T Xie, CY Li, J Tang, GH Tu 2018 Ieee International Conference on Communications (icc), 1-6, 2018 | 10 | 2018 |
Uncovering insecure designs of cellular emergency services (911) Y Hu, MY Chen, GH Tu, CY Li, S Wang, J Shi, T Xie, L Xiao, C Peng, ... Proceedings of the 28th Annual International Conference on Mobile Computing …, 2022 | 9 | 2022 |
Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures YH Lu, SHY Hsiao, CY Li, YC Hsieh, PY Chou, YY Li, T Xie, GH Tu IEEE/ACM Transactions on Networking 31 (2), 800-815, 2022 | 5 | 2022 |
BFastPay: A routing-free protocol for fast payment in bitcoin network X Lei, GH Tu, T Xie, S Wang Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021 | 4 | 2021 |
Optical propagation of blue LED light in brain tissue and Parylene-C T Xie, X Bi, R Luo, F Bin, Z Wang, W Li 2017 IEEE 12th International Conference on Nano/Micro Engineered and …, 2017 | 3 | 2017 |
Dissecting operational cellular iot service security: Attacks and defenses S Wang, T Xie, MY Chen, GH Tu, CY Li, X Lei, PY Chou, F Hsieh, Y Hu, ... IEEE/ACM Transactions on Networking 32 (2), 1229-1244, 2023 | 2 | 2023 |
Mpkix: Towards more accountable and secure internet application services via mobile networked systems T Xie, S Wang, X Lei, J Shi, GH Tu, CY Li IEEE Transactions on Mobile Computing 22 (6), 3489-3507, 2022 | 2 | 2022 |
Unveiling the Insecurity of Operational Cellular Emergency Services (911): Vulnerabilities, Attacks, and Countermeasures Y Hu, MY Chen, GH Tu, CY Li, S Wang, J Shi, T Xie, L Xiao, C Peng, ... GetMobile: Mobile Computing and Communications 27 (1), 39-43, 2023 | 1 | 2023 |
Exploring the insecurity of google account registration protocol via model checking T Xie, S Wang, GH Tu, CY Li, X Lei 2019 IEEE Symposium Series on Computational Intelligence (SSCI), 3087-3096, 2019 | 1 | 2019 |
Uncovering Problematic Designs Hindering Ubiquitous Cellular Emergency Services Access Y Hu, MY Chen, H Yan, CY Cheng, GH Tu, CY Li, T Xie, C Peng, L Xiao, ... Proceedings of the 30th Annual International Conference on Mobile Computing …, 2024 | | 2024 |