Guan-Hua Tu
Title
Cited by
Cited by
Year
Insecurity of voice solution volte in lte mobile networks
CY Li, GH Tu, C Peng, Z Yuan, Y Li, S Lu, X Wang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
652015
The Insecurity of Home Digital Voice Assistants--Amazon Alexa as a Case Study
X Lei, GH Tu, AX Liu, K Ali, CY Li, T Xie
arXiv preprint arXiv:1712.03327, 2017
632017
Address resolution protocol (arp) cache management methods and devices
JH Sun, G Tu
US Patent App. 11/552,678, 2008
552008
Control-plane protocol interactions in cellular networks
GH Tu, Y Li, C Peng, CY Li, H Wang, S Lu
ACM SIGCOMM Computer Communication Review 44 (4), 223-234, 2014
462014
System and method for processing multimedia messages
CW Li, G Tu
US Patent App. 11/358,542, 2007
432007
Method and system for serverless VoIP service in personal communication network
G Tu
US Patent 7,519,075, 2009
422009
Mobile data charging: new attacks and countermeasures
C Peng, C Li, G Tu, S Lu, L Zhang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
412012
Can we pay for what we get in 3G data access?
C Peng, GH Tu, CY Li, S Lu
Proceedings of the 18th annual international conference on Mobile computing …, 2012
392012
Mobile communication apparatus having anti-theft and auto-notification functions
G Tu
US Patent 7,574,235, 2009
372009
How voice calls affect data in operational LTE networks
GH Tu, C Peng, H Wang, CY Li, S Lu
Proceedings of the 19th annual international conference on Mobile computing …, 2013
302013
New security threats caused by IMS-based SMS service in 4G LTE networks
GH Tu, CY Li, C Peng, Y Li, S Lu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
282016
Mobile communication apparatus having anti-theft and auto-notification functions
A Jain, A Kumar, G Tu
US Patent 9,160,830, 2015
282015
Accounting for roaming users on mobile data access: Issues and root causes
GH Tu, C Peng, CY Li, X Ma, H Wang, T Wang, S Lu
Proceeding of the 11th annual international conference on Mobile systems …, 2013
282013
How voice call technology poses security threats in 4G LTE networks
GH Tu, CY Li, C Peng, S Lu
2015 IEEE Conference on Communications and Network Security (CNS), 442-450, 2015
252015
Real threats to your data bills: Security loopholes and defenses in mobile data charging
C Peng, CY Li, H Wang, GH Tu, S Lu
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
252014
Mobile edge computing platform deployment in 4G {LTE} networks: A middlebox approach
CY Li, HY Liu, PH Huang, HT Chien, GH Tu, PY Hong, YD Lin
{USENIX} Workshop on Hot Topics in Edge Computing (HotEdge 18), 2018
232018
Communication device for wireless virtual storage and method thereof
G Tu, W Lien
US Patent App. 11/942,812, 2009
232009
icellular: Device-customized cellular network access on commodity smartphones
Y Li, H Deng, C Peng, Z Yuan, GH Tu, J Li, S Lu
13th {USENIX} Symposium on Networked Systems Design and Implementation …, 2016
202016
The insecurity of home digital voice assistants-vulnerabilities, attacks and countermeasures
X Lei, GH Tu, AX Liu, CY Li, T Xie
2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018
192018
An improved GGSN failure restoration mechanism for UMTS
P Lin, GH Tu
Wireless Networks 12 (1), 91-103, 2006
122006
The system can't perform the operation now. Try again later.
Articles 1–20