Sledovať
Guan-Hua Tu
Názov
Citované v
Citované v
Rok
The insecurity of home digital voice assistants-vulnerabilities, attacks and countermeasures
X Lei, GH Tu, AX Liu, CY Li, T Xie
2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018
219*2018
Insecurity of voice solution VoLTE in LTE mobile networks
CY Li, GH Tu, C Peng, Z Yuan, Y Li, S Lu, X Wang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1112015
Mobile micro-cloud: Application classification, mapping, and deployment
S Wang, GH Tu, R Ganti, T He, K Leung, H Tripp, K Warr, M Zafer
Proc. Annual Fall Meeting of ITA (AMITA), 2013
762013
Address resolution protocol (ARP) cache management methods and devices
JH Sun, GH Tu
US Patent App. 11/552,678, 2008
742008
New security threats caused by IMS-based SMS service in 4G LTE networks
GH Tu, CY Li, C Peng, Y Li, S Lu
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
732016
Control-plane protocol interactions in cellular networks
GH Tu, Y Li, C Peng, CY Li, H Wang, S Lu
ACM SIGCOMM Computer Communication Review 44 (4), 223-234, 2014
69*2014
Mobile data charging: new attacks and countermeasures
C Peng, C Li, GH Tu, S Lu, L Zhang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
512012
SecEQP: A secure and efficient scheme for SkNN query problem over encrypted geodata on cloud
X Lei, AX Liu, R Li, GH Tu
2019 IEEE 35th International Conference on Data Engineering (ICDE), 662-673, 2019
492019
Method and system for serverless VoIP service in personal communication network
GH Tu
US Patent 7,519,075, 2009
472009
Mobile edge computing platform deployment in 4G {LTE} networks: A middlebox approach
CY Li, HY Liu, PH Huang, HT Chien, GH Tu, PY Hong, YD Lin
USENIX Workshop on Hot Topics in Edge Computing (HotEdge 18), 2018
452018
System and method for processing multimedia messages
CW Li, GH Tu
US Patent App. 11/358,542, 2007
452007
Can we pay for what we get in 3G data access?
C Peng, GH Tu, CY Li, S Lu
Proceedings of the 18th annual international conference on Mobile computing …, 2012
422012
Mobile communication apparatus having anti-theft and auto-notification functions
GH Tu
US Patent 7,574,235, 2009
372009
Real threats to your data bills: Security loopholes and defenses in mobile data charging
C Peng, CY Li, H Wang, GH Tu, S Lu
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
362014
How voice call technology poses security threats in 4G LTE networks
GH Tu, CY Li, C Peng, S Lu
2015 IEEE conference on communications and network security (CNS), 442-450, 2015
342015
The security in optical wireless communication: A survey
X Zhang, G Klevering, X Lei, Y Hu, L Xiao, GH Tu
ACM Computing Surveys 55 (14s), 1-36, 2023
322023
V2PSense: Enabling cellular-based V2P collision warning service through mobile sensing
CY Li, G Salinas, PH Huang, GH Tu, GH Hsu, TY Hsieh
2018 IEEE International Conference on Communications (ICC), 1-6, 2018
322018
{iCellular}:{Device-Customized} Cellular Network Access on Commodity Smartphones
Y Li, H Deng, C Peng, Z Yuan, GH Tu, J Li, S Lu
13th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2016
322016
Mobile communication apparatus having anti-theft and auto-notification functions
A Jain, A Kumar, GH Tu
US Patent 9,160,830, 2015
322015
How voice calls affect data in operational LTE networks
GH Tu, C Peng, H Wang, CY Li, S Lu
Proceedings of the 19th annual international conference on Mobile computing …, 2013
312013
Systém momentálne nemôže vykonať operáciu. Skúste to neskôr.
Články 1–20