Chi-Yu Li
Chi-Yu Li
Verified email at cs.nctu.edu.tw
Title
Cited by
Cited by
Year
Energy-based rate adaptation for 802.11 n
CY Li, C Peng, S Lu, X Wang
Proceedings of the 18th annual international conference on Mobile computing …, 2012
852012
Insecurity of voice solution volte in lte mobile networks
CY Li, GH Tu, C Peng, Z Yuan, Y Li, S Lu, X Wang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
702015
The Insecurity of Home Digital Voice Assistants--Amazon Alexa as a Case Study
X Lei, GH Tu, AX Liu, K Ali, CY Li, T Xie
arXiv preprint arXiv:1712.03327, 2017
672017
Control-plane protocol interactions in cellular networks
GH Tu, Y Li, C Peng, CY Li, H Wang, S Lu
ACM SIGCOMM Computer Communication Review 44 (4), 223-234, 2014
502014
Mobile data charging: new attacks and countermeasures
C Peng, C Li, GH Tu, S Lu, L Zhang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
432012
Can we pay for what we get in 3G data access?
C Peng, GH Tu, CY Li, S Lu
Proceedings of the 18th annual international conference on Mobile computing …, 2012
402012
What is wrong/right with IEEE 802.11 n spatial multiplexing power save feature?
I Pefkianakis, CY Li, S Lu
2011 19th IEEE International Conference on Network Protocols, 186-195, 2011
322011
How voice calls affect data in operational LTE networks
GH Tu, C Peng, H Wang, CY Li, S Lu
Proceedings of the 19th annual international conference on Mobile computing …, 2013
302013
New security threats caused by IMS-based SMS service in 4G LTE networks
GH Tu, CY Li, C Peng, Y Li, S Lu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
292016
Accounting for roaming users on mobile data access: Issues and root causes
GH Tu, C Peng, CY Li, X Ma, H Wang, T Wang, S Lu
Proceeding of the 11th annual international conference on Mobile systems …, 2013
282013
Real threats to your data bills: Security loopholes and defenses in mobile data charging
C Peng, CY Li, H Wang, GH Tu, S Lu
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
272014
Mobile edge computing platform deployment in 4G {LTE} networks: A middlebox approach
CY Li, HY Liu, PH Huang, HT Chien, GH Tu, PY Hong, YD Lin
{USENIX} Workshop on Hot Topics in Edge Computing (HotEdge 18), 2018
252018
How voice call technology poses security threats in 4g lte networks
GH Tu, CY Li, C Peng, S Lu
2015 IEEE Conference on Communications and Network Security (CNS), 442-450, 2015
252015
Implementing instant messaging using named data
J Wang, C Peng, C Li, E Osterweil, R Wakikawa, P Cheng, L Zhang
Proceedings of the Sixth Asian Internet Engineering Conference, 40-47, 2010
252010
The insecurity of home digital voice assistants-vulnerabilities, attacks and countermeasures
X Lei, GH Tu, AX Liu, CY Li, T Xie
2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018
232018
A MAC protocol for multi-channel multi-interface wireless mesh network using hybrid channel assignment scheme
CY Li, AK Jeng, RH Jan
Journal of Information Science and Engineering 23 (4), 1041-1055, 2007
222007
Release-time-based multi-channel MAC protocol for wireless mesh networks
AAK Jeng, RH Jan, CY Li, C Chen
Computer Networks 55 (9), 2176-2195, 2011
212011
An energy efficiency perspective on rate adaptation for 802.11 n NIC
CY Li, C Peng, P Cheng, S Lu, X Wang, F Ren, T Wang
IEEE Transactions on Mobile Computing 15 (6), 1333-1347, 2015
162015
Latency-aware rate adaptation in 802.11 n home networks
CY Li, C Peng, S Lu, X Wang, R Chandra
2015 IEEE Conference on Computer Communications (INFOCOM), 1293-1301, 2015
162015
An integrated, virtualized joint edge and fog computing system with multi-rat convergence
D Rapone, R Quasso, SB Chundrigar, ST Talat, L Cominardi, ...
2018 IEEE International Symposium on Broadband Multimedia Systems and …, 2018
102018
The system can't perform the operation now. Try again later.
Articles 1–20