The insecurity of home digital voice assistants-vulnerabilities, attacks and countermeasures X Lei, GH Tu, AX Liu, CY Li, T Xie 2018 IEEE conference on communications and network security (CNS), 1-9, 2018 | 207* | 2018 |
A flexible, micro-lens-coupled LED stimulator for optical neuromodulation X Bi, T Xie, B Fan, W Khan, Y Guo, W Li IEEE transactions on biomedical circuits and systems 10 (5), 972-978, 2016 | 28 | 2016 |
SecWIR: Securing smart home IoT communications via wi-fi routers with embedded intelligence X Lei, GH Tu, CY Li, T Xie, M Zhang Proceedings of the 18th International Conference on Mobile Systems …, 2020 | 22 | 2020 |
Security threats from bitcoin wallet smartphone applications: Vulnerabilities, attacks, and countermeasures Y Hu, S Wang, GH Tu, L Xiao, T Xie, X Lei, CY Li Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021 | 17 | 2021 |
How can IoT services pose new security threats in operational cellular networks? T Xie, GH Tu, CY Li, C Peng IEEE Transactions on Mobile Computing 20 (8), 2592-2606, 2020 | 17 | 2020 |
The dark side of operational Wi-Fi calling services T Xie, GH Tu, CY Li, C Peng, J Li, M Zhang 2018 IEEE Conference on Communications and Network Security (CNS), 1-1, 2018 | 13 | 2018 |
Fast and secure knn query processing in cloud computing X Lei, GH Tu, AX Liu, T Xie 2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020 | 12 | 2020 |
Ghost calls from operational 4G call systems: IMS vulnerability, call DoS attack, and countermeasure YH Lu, CY Li, YY Li, SHY Hsiao, T Xie, GH Tu, WX Chen Proceedings of the 26th Annual International Conference on Mobile Computing …, 2020 | 12 | 2020 |
The untold secrets of wifi-calling services: Vulnerabilities, attacks, and countermeasures T Xie, GH Tu, B Yin, CY Li, C Peng, M Zhang, H Liu, X Liu IEEE Transactions on Mobile Computing 20 (11), 3131-3147, 2020 | 10* | 2020 |
How voice service threatens cellular-connected IoT devices in the operational 4G LTE networks T Xie, CY Li, J Tang, GH Tu 2018 Ieee International Conference on Communications (icc), 1-6, 2018 | 10 | 2018 |
Insecurity of operational cellular IoT service: new vulnerabilities, attacks, and countermeasures S Wang, GH Tu, X Lei, T Xie, CY Li, PY Chou, F Hsieh, Y Hu, L Xiao, ... Proceedings of the 27th Annual International Conference on Mobile Computing …, 2021 | 9 | 2021 |
BFastPay: A routing-free protocol for fast payment in bitcoin network X Lei, GH Tu, T Xie, S Wang Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021 | 4 | 2021 |
Uncovering insecure designs of cellular emergency services (911) Y Hu, MY Chen, GH Tu, CY Li, S Wang, J Shi, T Xie, L Xiao, C Peng, ... Proceedings of the 28th Annual International Conference on Mobile Computing …, 2022 | 3 | 2022 |
Optical propagation of blue LED light in brain tissue and Parylene-C T Xie, X Bi, R Luo, F Bin, Z Wang, W Li 2017 IEEE 12th International Conference on Nano/Micro Engineered and …, 2017 | 3 | 2017 |
Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures YH Lu, SHY Hsiao, CY Li, YC Hsieh, PY Chou, YY Li, T Xie, GH Tu IEEE/ACM Transactions on Networking 31 (2), 800-815, 2022 | 2 | 2022 |
Mpkix: Towards more accountable and secure internet application services via mobile networked systems T Xie, S Wang, X Lei, J Shi, GH Tu, CY Li IEEE Transactions on Mobile Computing, 2022 | 1 | 2022 |
Exploring the insecurity of google account registration protocol via model checking T Xie, S Wang, GH Tu, CY Li, X Lei 2019 IEEE Symposium Series on Computational Intelligence (SSCI), 3087-3096, 2019 | 1 | 2019 |
Taming the Insecurity of Cellular Emergency Services (9-1-1): From Vulnerabilities to Secure Designs MY Chen, Y Hu, GH Tu, CY Li, S Wang, J Shi, T Xie, RC Hsu, L Xiao, ... IEEE/ACM Transactions on Networking, 2024 | | 2024 |
When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities J Shi, T Xie, GH Tu, C Peng, CY Li, A Hou, S Wang, Y Hu, X Lei, MY Chen, ... 2023 IEEE Conference on Communications and Network Security (CNS), 1-9, 2023 | | 2023 |
Dissecting Operational Cellular IoT Service Security: Attacks and Defenses S Wang, T Xie, MY Chen, GH Tu, CY Li, X Lei, PY Chou, F Hsieh, Y Hu, ... IEEE/ACM Transactions on Networking, 2023 | | 2023 |