Chi-Yu Li
Orcid: 0000-0002-1077-6801Affiliations:
- National Chiao Tung University, Hsinchu, Taiwan
- University of California, Los Angeles, CA, USA (PhD 2015)
According to our database1,
Chi-Yu Li
authored at least 73 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Taming the Insecurity of Cellular Emergency Services (9-1-1): From Vulnerabilities to Secure Designs.
IEEE/ACM Trans. Netw., August, 2024
IEEE/ACM Trans. Netw., April, 2024
IEEE Trans. Reliab., March, 2024
Transparent Third-Party Authentication With Application Mobility for 5G Mobile-Edge Computing.
IEEE Trans. Netw. Serv. Manag., February, 2024
Practical Latency-Aware Scheduling for Low-Latency Elephant VR Flows in Wi-Fi Networks.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2024
Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, 2024
2023
Dual-uCPE for High-Availability Retailer Services with Fault Toleranceand Load Balancing.
IEEE Internet Things Mag., December, 2023
MPKIX: Towards More Accountable and Secure Internet Application Services via Mobile Networked Systems.
IEEE Trans. Mob. Comput., June, 2023
Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures.
IEEE/ACM Trans. Netw., April, 2023
Unveiling the Insecurity of Operational Cellular Emergency Services (911): Vulnerabilities, Attacks, and Countermeasures.
GetMobile Mob. Comput. Commun., March, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the IEEE Conference on Communications and Network Security, 2023
2022
P4-TINS: P4-Driven Traffic Isolation for Network Slicing With Bandwidth Guarantee and Management.
IEEE Trans. Netw. Serv. Manag., 2022
IEEE Internet Things J., 2022
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022
Prioritized Traffic Shaping for Low-latency MEC Flows in MEC-enabled Cellular Networks.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022
2021
Scalable Mobile Edge Computing: A Two-Tier Multi-Site Multi-Server Architecture with Autoscaling and Offloading.
IEEE Wirel. Commun., 2021
IEEE Trans. Netw. Serv. Manag., 2021
The Untold Secrets of WiFi-Calling Services: Vulnerabilities, Attacks, and Countermeasures.
IEEE Trans. Mob. Comput., 2021
IEEE Trans. Mob. Comput., 2021
Proceedings of the 30th Wireless and Optical Communications Conference, 2021
Insecurity of operational cellular IoT service: new vulnerabilities, attacks, and countermeasures.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021
An Experience Driven Design for IEEE 802.11ac Rate Adaptation based on Reinforcement Learning.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
2020
IEEE Trans. Veh. Technol., 2020
Practical Machine Learning-Based Rate Adaptation Solution for Wi-Fi NICs: IEEE 802.11ac as a Case Study.
IEEE Trans. Veh. Technol., 2020
Proxy-Based Federated Authentication: A Transparent Third-Party Solution for Cloud-Edge Federation.
IEEE Netw., 2020
IEEE Netw., 2020
SecWIR: securing smart home IoT communications via wi-fi routers with embedded intelligence.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020
Ghost calls from operational 4G call systems: IMS vulnerability, call DoS attack, and countermeasure.
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020
WBF-PS: WiGig Beam Fingerprinting for UAV Positioning System in GPS-denied Environments.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Transparent 3rd-Party Authentication with Application Mobility for 5G Mobile Edge Computing.
Proceedings of the 2020 European Conference on Networks and Communications, 2020
2019
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
Proceedings of the 20th Asia-Pacific Network Operations and Management Symposium, 2019
2018
The Untold Secrets of Operational Wi-Fi Calling Services: Vulnerabilities, Attacks, and Countermeasures.
CoRR, 2018
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference Workshops, 2018
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018
How Voice Service Threatens Cellular-Connected IoT Devices in the Operational 4G LTE Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
V2PSense: Enabling Cellular-Based V2P Collision Warning Service through Mobile Sensing.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the USENIX Workshop on Hot Topics in Edge Computing, 2018
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and Countermeasures.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
An Integrated, Virtualized Joint Edge and Fog Computing System with Multi-RAT Convergence.
Proceedings of the 2018 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2018
2017
CoRR, 2017
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017
ReSDN: A lightweight solution for data-plane state recovery in software-defined networks.
Proceedings of the IEEE International Conference on Communications, 2017
2016
IEEE/ACM Trans. Netw., 2016
IEEE Trans. Mob. Comput., 2016
Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
CoRR, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the ACM SIGCOMM 2014 Conference, 2014
Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data Charging.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013
2012
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Comput. Networks, 2011
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011
2010
2007
A MAC Protocol for Multi-Channel Multi-Interface Wireless Mesh Network using Hybrid Channel Assignment Scheme.
J. Inf. Sci. Eng., 2007