default search action
Guan-Hua Tu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Sihan Wang, Tian Xie, Min-Yue Chen, Guan-Hua Tu, Chi-Yu Li, Xinyu Lei, Po-Yi Chou, Fu-Cheng Hsieh, Yiwen Hu, Li Xiao, Chunyi Peng:
Dissecting Operational Cellular IoT Service Security: Attacks and Defenses. IEEE/ACM Trans. Netw. 32(2): 1229-1244 (2024) - [j12]Min-Yue Chen, Yiwen Hu, Guan-Hua Tu, Chi-Yu Li, Sihan Wang, Jingwen Shi, Tian Xie, Ren-Chieh Hsu, Li Xiao, Chunyi Peng, Zhaowei Tan, Songwu Lu:
Taming the Insecurity of Cellular Emergency Services (9-1-1): From Vulnerabilities to Secure Designs. IEEE/ACM Trans. Netw. 32(4): 3076-3091 (2024) - [c31]Jingwen Shi, Sihan Wang, Min-Yue Chen, Guan-Hua Tu, Tian Xie, Man-Hsin Chen, Yiwen Hu, Chi-Yu Li, Chunyi Peng:
IMS is Not That Secure on Your 5G/4G Phones. MobiCom 2024: 513-527 - [c30]Shao-Jung Lu, Wei-Xun Chen, Yu-Shao Su, Yu-Shou Chang, Yao-Wen Liu, Chi-Yu Li, Guan-Hua Tu:
Practical Latency-Aware Scheduling for Low-Latency Elephant VR Flows in Wi-Fi Networks. PerCom 2024: 57-68 - 2023
- [j11]Xiao Zhang, Griffin Klevering, Xinyu Lei, Yiwen Hu, Li Xiao, Guan-Hua Tu:
The Security in Optical Wireless Communication: A Survey. ACM Comput. Surv. 55(14s): 329:1-329:36 (2023) - [j10]Yiwen Hu, Min-Yue Chen, Guan-Hua Tu, Chi-Yu Li, Sihan Wang, Jingwen Shi, Tian Xie, Li Xiao, Chunyi Peng, Zhaowei Tan, Songwu Lu:
Unveiling the Insecurity of Operational Cellular Emergency Services (911): Vulnerabilities, Attacks, and Countermeasures. GetMobile Mob. Comput. Commun. 27(1): 39-43 (2023) - [j9]Tian Xie, Sihan Wang, Xinyu Lei, Jingwen Shi, Guan-Hua Tu, Chi-Yu Li:
MPKIX: Towards More Accountable and Secure Internet Application Services via Mobile Networked Systems. IEEE Trans. Mob. Comput. 22(6): 3489-3507 (2023) - [j8]Yu-Han Lu, Sandy Hsin-Yu Hsiao, Chi-Yu Li, Yi-Chen Hsieh, Po-Yi Chou, Yao-Yu Li, Tian Xie, Guan-Hua Tu:
Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures. IEEE/ACM Trans. Netw. 31(2): 800-815 (2023) - [c29]Jingwen Shi, Tian Xie, Guan-Hua Tu, Chunyi Peng, Chi-Yu Li, Andrew Z. Hou, Sihan Wang, Yiwen Hu, Xinyu Lei, Min-Yue Chen, Li Xiao, Xiaoming Liu:
When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities. CNS 2023: 1-9 - [c28]Man-Hsin Chen, Chiung-I Wu, Yin-Chi Li, Chi-Yu Li, Guan-Hua Tu:
Remote Detection of 4G/5G UEs Vulnerable to Stealthy Call DoS. INFOCOM Workshops 2023: 1-2 - [c27]Yin-Chi Li, Ping-Tsan Liu, Yi-An Tai, Che-Hung Liu, Man-Hsin Chen, Chi-Yu Li, Guan-Hua Tu:
A Runtime Anomaly Detector via Service Communication Proxy for 5G Mobile Networks. INFOCOM Workshops 2023: 1-2 - 2022
- [j7]Chi-Lun Lin, Wen-Jia Chang, Guan-Hua Tu:
Wi-Fi-Based Tracking of Human Walking for Home Health Monitoring. IEEE Internet Things J. 9(11): 8935-8942 (2022) - [c26]Yiwen Hu, Min-Yue Chen, Guan-Hua Tu, Chi-Yu Li, Sihan Wang, Jingwen Shi, Tian Xie, Li Xiao, Chunyi Peng, Zhaowei Tan, Songwu Lu:
Uncovering insecure designs of cellular emergency services (911). MobiCom 2022: 703-715 - 2021
- [j6]Tian Xie, Guan-Hua Tu, Chi-Yu Li, Chunyi Peng:
How Can IoT Services Pose New Security Threats In Operational Cellular Networks? IEEE Trans. Mob. Comput. 20(8): 2592-2606 (2021) - [j5]Tian Xie, Guan-Hua Tu, Bangjie Yin, Chi-Yu Li, Chunyi Peng, Mi Zhang, Hui Liu, Xiaoming Liu:
The Untold Secrets of WiFi-Calling Services: Vulnerabilities, Attacks, and Countermeasures. IEEE Trans. Mob. Comput. 20(11): 3131-3147 (2021) - [c25]Xinyu Lei, Guan-Hua Tu, Tian Xie, Sihan Wang:
BFastPay: A Routing-free Protocol for Fast Payment in Bitcoin Network. CODASPY 2021: 77-87 - [c24]Yiwen Hu, Sihan Wang, Guan-Hua Tu, Li Xiao, Tian Xie, Xinyu Lei, Chi-Yu Li:
Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures. CODASPY 2021: 89-100 - [c23]Sihan Wang, Guan-Hua Tu, Xinyu Lei, Tian Xie, Chi-Yu Li, Po-Yi Chou, Fu-Cheng Hsieh, Yiwen Hu, Li Xiao, Chunyi Peng:
Insecurity of operational cellular IoT service: new vulnerabilities, attacks, and countermeasures. MobiCom 2021: 437-450 - 2020
- [c22]Xinyu Lei, Guan-Hua Tu, Alex X. Liu, Tian Xie:
Fast and Secure kNN Query Processing in Cloud Computing. CNS 2020: 1-9 - [c21]Xinyu Lei, Tian Xie, Guan-Hua Tu, Alex X. Liu:
An Inter-blockchain Escrow Approach for Fast Bitcoin Payment. ICDCS 2020: 1201-1202 - [c20]Yu-Han Lu, Chi-Yu Li, Yao-Yu Li, Sandy Hsin-Yu Hsiao, Tian Xie, Guan-Hua Tu, Wei-Xun Chen:
Ghost calls from operational 4G call systems: IMS vulnerability, call DoS attack, and countermeasure. MobiCom 2020: 8:1-8:14 - [c19]Xinyu Lei, Guan-Hua Tu, Chi-Yu Li, Tian Xie, Mi Zhang:
SecWIR: securing smart home IoT communications via wi-fi routers with embedded intelligence. MobiSys 2020: 260-272
2010 – 2019
- 2019
- [c18]Xinyu Lei, Alex X. Liu, Rui Li, Guan-Hua Tu:
SecEQP: A Secure and Efficient Scheme for SkNN Query Problem Over Encrypted Geodata on Cloud. ICDE 2019: 662-673 - [c17]Tian Xie, Sihan Wang, Guan-Hua Tu, Chi-Yu Li, Xinyu Lei:
Exploring the Insecurity of Google Account Registration Protocol via Model Checking. SSCI 2019: 3087-3096 - 2018
- [j4]Yuanjie Li, Chunyi Peng, Haotian Deng, Zengwen Yuan, Guan-Hua Tu, Jiayao Li, Songwu Lu, Xi Li:
Device-Customized Multi-Carrier Network Access on Commodity Smartphones. IEEE/ACM Trans. Netw. 26(6): 2542-2555 (2018) - [c16]Xinyu Lei, Guan-Hua Tu, Alex X. Liu, Chi-Yu Li, Tian Xie:
The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and Countermeasures. CNS 2018: 1-9 - [c15]Tian Xie, Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Jiawei Li, Mi Zhang:
The Dark Side of Operational Wi-Fi Calling Services. CNS 2018: 1 - [c14]Chi-Yu Li, Hsueh-Yang Liu, Po-Hao Huang, Hsu-Tung Chien, Guan-Hua Tu, Pei-Yuan Hong, Ying-Dar Lin:
Mobile Edge Computing Platform Deployment in 4G LTE Networks: A Middlebox Approach. HotEdge 2018 - [c13]Chi-Yu Li, Giovanni Salinas, Po-Hao Huang, Guan-Hua Tu, Guo-Huang Hsu, Tien-Yuan Hsieh:
V2PSense: Enabling Cellular-Based V2P Collision Warning Service through Mobile Sensing. ICC 2018: 1-6 - [c12]Tian Xie, Chi-Yu Li, Jiliang Tang, Guan-Hua Tu:
How Voice Service Threatens Cellular-Connected IoT Devices in the Operational 4G LTE Networks. ICC 2018: 1-6 - [i4]Tian Xie, Guan-Hua Tu, Bangjie Yin, Chi-Yu Li, Chunyi Peng, Mi Zhang, Hui Liu, Xiaoming Liu:
The Untold Secrets of Operational Wi-Fi Calling Services: Vulnerabilities, Attacks, and Countermeasures. CoRR abs/1811.11274 (2018) - 2017
- [i3]Xinyu Lei, Guan-Hua Tu, Alex X. Liu, Chi-Yu Li, Tian Xie:
The Insecurity of Home Digital Voice Assistants - Amazon Alexa as a Case Study. CoRR abs/1712.03327 (2017) - 2016
- [j3]Guan-Hua Tu, Yuanjie Li, Chunyi Peng, Chi-Yu Li, Songwu Lu:
Detecting Problematic Control-Plane Protocol Interactions in Mobile Networks. IEEE/ACM Trans. Netw. 24(2): 1209-1222 (2016) - [c11]Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Yuanjie Li, Songwu Lu:
New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks. CCS 2016: 1118-1130 - [c10]Yuanjie Li, Haotian Deng, Chunyi Peng, Zengwen Yuan, Guan-Hua Tu, Jiayao Li, Songwu Lu:
iCellular: Device-Customized Cellular Network Access on Commodity Smartphones. NSDI 2016: 643-656 - [c9]Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Zengwen Yuan, Yuanjie Li, Xiaohu Zhao, Songwu Lu:
VoLTE*: A Lightweight Voice Solution to 4G LTE Networks. HotMobile 2016: 3-8 - 2015
- [b1]Guan-Hua Tu:
Control-Plane Protocol Interactions in Mobile Networks. University of California, Los Angeles, USA, 2015 - [c8]Chi-Yu Li, Guan-Hua Tu, Chunyi Peng, Zengwen Yuan, Yuanjie Li, Songwu Lu, Xinbing Wang:
Insecurity of Voice Solution VoLTE in LTE Mobile Networks. CCS 2015: 316-327 - [c7]Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Songwu Lu:
How voice call technology poses security threats in 4G LTE networks. CNS 2015: 442-450 - [i2]Yuanjie Li, Haotian Deng, Chunyi Peng, Guan-Hua Tu, Jiayao Li, Zengwen Yuan, Songwu Lu:
iCellular: Define Your Own Cellular Network Access on Commodity Smartphones. CoRR abs/1510.08027 (2015) - [i1]Guan-Hua Tu, Yuanjie Li, Chunyi Peng, Chi-Yu Li, Muhammad Taqi Raza, Hsiao-Yun Tseng, Songwu Lu:
New Threats to SMS-Assisted Mobile Internet Services from 4G LTE Networks. CoRR abs/1510.08531 (2015) - 2014
- [c6]Chunyi Peng, Chi-Yu Li, Hongyi Wang, Guan-Hua Tu, Songwu Lu:
Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data Charging. CCS 2014: 727-738 - [c5]Guan-Hua Tu, Yuanjie Li, Chunyi Peng, Chi-Yu Li, Hongyi Wang, Songwu Lu:
Control-plane protocol interactions in cellular networks. SIGCOMM 2014: 223-234 - 2013
- [c4]Guan-Hua Tu, Chunyi Peng, Hongqi Wang, Chi-Yu Li, Songwu Lu:
How voice calls affect data in operational LTE networks. MobiCom 2013: 87-98 - [c3]Guan-Hua Tu, Chunyi Peng, Chi-Yu Li, Xingyu Ma, Hongqi Wang, Tao Wang, Songwu Lu:
Accounting for roaming users on mobile data access: issues and root causes. MobiSys 2013: 305-318 - 2012
- [c2]Chunyi Peng, Chi-Yu Li, Guan-Hua Tu, Songwu Lu, Lixia Zhang:
Mobile data charging: new attacks and countermeasures. CCS 2012: 195-204 - [c1]Chunyi Peng, Guan-Hua Tu, Chi-Yu Li, Songwu Lu:
Can we pay for what we get in 3G data access? MobiCom 2012: 113-124
2000 – 2009
- 2006
- [j2]Phone Lin, Guan-Hua Tu:
An Improved GGSN Failure Restoration Mechanism for UMTS. Wirel. Networks 12(1): 91-103 (2006) - 2005
- [j1]Shin-Ming Cheng, Phone Lin, Guan-Hua Tu, Li-Chen Fu, Ching-Feng Liang:
An intelligent GGSN dispatching mechanism for UMTS. Comput. Commun. 28(8): 947-955 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint