Chi-Yu Li

Orcid: 0000-0002-1077-6801

Affiliations:
  • National Chiao Tung University, Hsinchu, Taiwan
  • University of California, Los Angeles, CA, USA (PhD 2015)


According to our database1, Chi-Yu Li authored at least 73 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Taming the Insecurity of Cellular Emergency Services (9-1-1): From Vulnerabilities to Secure Designs.
IEEE/ACM Trans. Netw., August, 2024

Dissecting Operational Cellular IoT Service Security: Attacks and Defenses.
IEEE/ACM Trans. Netw., April, 2024

Reliability Engineering in a Time of Rapidly Converging Technologies.
IEEE Trans. Reliab., March, 2024

Transparent Third-Party Authentication With Application Mobility for 5G Mobile-Edge Computing.
IEEE Trans. Netw. Serv. Manag., February, 2024

Practical Latency-Aware Scheduling for Low-Latency Elephant VR Flows in Wi-Fi Networks.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2024

IMS is Not That Secure on Your 5G/4G Phones.
Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, 2024

2023
Dual-uCPE for High-Availability Retailer Services with Fault Toleranceand Load Balancing.
IEEE Internet Things Mag., December, 2023

MPKIX: Towards More Accountable and Secure Internet Application Services via Mobile Networked Systems.
IEEE Trans. Mob. Comput., June, 2023

Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures.
IEEE/ACM Trans. Netw., April, 2023

Unveiling the Insecurity of Operational Cellular Emergency Services (911): Vulnerabilities, Attacks, and Countermeasures.
GetMobile Mob. Comput. Commun., March, 2023

A Runtime Anomaly Detector via Service Communication Proxy for 5G Mobile Networks.
Proceedings of the IEEE INFOCOM 2023, 2023

Remote Detection of 4G/5G UEs Vulnerable to Stealthy Call DoS.
Proceedings of the IEEE INFOCOM 2023, 2023

Congestion-Avoidance Adaptation for Edge-based UAV Video Frame Delivery.
Proceedings of the IEEE Global Communications Conference, 2023

When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
P4-TINS: P4-Driven Traffic Isolation for Network Slicing With Bandwidth Guarantee and Management.
IEEE Trans. Netw. Serv. Manag., 2022

Modeling Control Delays for Edge-Enabled UAVs in Cellular Networks.
IEEE Internet Things J., 2022

Uncovering insecure designs of cellular emergency services (911).
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

UAV-FAP: User Fairness-Driven Access Point on UAV for Wi-Fi Networks.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

Prioritized Traffic Shaping for Low-latency MEC Flows in MEC-enabled Cellular Networks.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
Scalable Mobile Edge Computing: A Two-Tier Multi-Site Multi-Server Architecture with Autoscaling and Offloading.
IEEE Wirel. Commun., 2021

Privacy Leakage and Protection of InputConnection Interface in Android.
IEEE Trans. Netw. Serv. Manag., 2021

The Untold Secrets of WiFi-Calling Services: Vulnerabilities, Attacks, and Countermeasures.
IEEE Trans. Mob. Comput., 2021

How Can IoT Services Pose New Security Threats In Operational Cellular Networks?
IEEE Trans. Mob. Comput., 2021

Edge-based Realtime Image Object Detection for UAV Missions.
Proceedings of the 30th Wireless and Optical Communications Conference, 2021

Insecurity of operational cellular IoT service: new vulnerabilities, attacks, and countermeasures.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

An Experience Driven Design for IEEE 802.11ac Rate Adaptation based on Reinforcement Learning.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
Transparent AAA Security Design for Low-Latency MEC-Integrated Cellular Networks.
IEEE Trans. Veh. Technol., 2020

Practical Machine Learning-Based Rate Adaptation Solution for Wi-Fi NICs: IEEE 802.11ac as a Case Study.
IEEE Trans. Veh. Technol., 2020

Proxy-Based Federated Authentication: A Transparent Third-Party Solution for Cloud-Edge Federation.
IEEE Netw., 2020

3D On-Demand Flying Mobile Communication for Millimeter-Wave Heterogeneous Networks.
IEEE Netw., 2020

SecWIR: securing smart home IoT communications via wi-fi routers with embedded intelligence.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020

Ghost calls from operational 4G call systems: IMS vulnerability, call DoS attack, and countermeasure.
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020

WBF-PS: WiGig Beam Fingerprinting for UAV Positioning System in GPS-denied Environments.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Transparent 3rd-Party Authentication with Application Mobility for 5G Mobile Edge Computing.
Proceedings of the 2020 European Conference on Networks and Communications, 2020

2019
Exploring the Insecurity of Google Account Registration Protocol via Model Checking.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

Communications and Networking Technologies for Intelligent Drone Cruisers.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Mobility Support for Networks on Trains Using Commercial Off-the-shelf Routers.
Proceedings of the 20th Asia-Pacific Network Operations and Management Symposium, 2019

2018
The Untold Secrets of Operational Wi-Fi Calling Services: Vulnerabilities, Attacks, and Countermeasures.
CoRR, 2018

An integrated edge and Fog system for future communication networks.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference Workshops, 2018

A Fast Converging Mechanism for Load Balancing among SDN Multiple Controllers.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

How Voice Service Threatens Cellular-Connected IoT Devices in the Operational 4G LTE Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

V2PSense: Enabling Cellular-Based V2P Collision Warning Service through Mobile Sensing.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Mobile Edge Computing Platform Deployment in 4G LTE Networks: A Middlebox Approach.
Proceedings of the USENIX Workshop on Hot Topics in Edge Computing, 2018

Setting Malicious Flow Entries Against SDN Operations: Attacks and Countermeasures.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

The Dark Side of Operational Wi-Fi Calling Services.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and Countermeasures.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

An Integrated, Virtualized Joint Edge and Fog Computing System with Multi-RAT Convergence.
Proceedings of the 2018 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2018

2017
The Insecurity of Home Digital Voice Assistants - Amazon Alexa as a Case Study.
CoRR, 2017

Enabling seamless WiGig/WiFi handovers in tri-band wireless systems.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017

ReSDN: A lightweight solution for data-plane state recovery in software-defined networks.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Detecting Problematic Control-Plane Protocol Interactions in Mobile Networks.
IEEE/ACM Trans. Netw., 2016

An Energy Efficiency Perspective on Rate Adaptation for 802.11n NIC.
IEEE Trans. Mob. Comput., 2016

VoLTE*: A Lightweight Voice Solution to 4G LTE Networks.
Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, 2016

New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Toward Customizable Wi-Fi.
PhD thesis, 2015

New Threats to SMS-Assisted Mobile Internet Services from 4G LTE Networks.
CoRR, 2015

Latency-aware rate adaptation in 802.11n home networks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

How voice call technology poses security threats in 4G LTE networks.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Insecurity of Voice Solution VoLTE in LTE Mobile Networks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Control-plane protocol interactions in cellular networks.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data Charging.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Accounting for roaming users on mobile data access: issues and root causes.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

How voice calls affect data in operational LTE networks.
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013

CMES: Collaborative Energy Save for MIMO 802.11 wireless networks.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

2012
Can we pay for what we get in 3G data access?
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

Energy-based rate adaptation for 802.11n.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

A multimedia service migration protocol for single user multiple devices.
Proceedings of IEEE International Conference on Communications, 2012

Mobile data charging: new attacks and countermeasures.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Release-time-based multi-channel MAC protocol for wireless mesh networks.
Comput. Networks, 2011

What is wrong/right with IEEE 802.11n Spatial Multiplexing Power Save feature?
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

2010
Implementing instant messaging using named data.
Proceedings of the AINTEC '10, 2010

2007
A MAC Protocol for Multi-Channel Multi-Interface Wireless Mesh Network using Hybrid Channel Assignment Scheme.
J. Inf. Sci. Eng., 2007


  Loading...