Guan-Hua Tu
Orcid: 0000-0002-2542-4817
According to our database1,
Guan-Hua Tu
authored at least 49 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Taming the Insecurity of Cellular Emergency Services (9-1-1): From Vulnerabilities to Secure Designs.
IEEE/ACM Trans. Netw., August, 2024
IEEE/ACM Trans. Netw., April, 2024
Practical Latency-Aware Scheduling for Low-Latency Elephant VR Flows in Wi-Fi Networks.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2024
Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, 2024
2023
MPKIX: Towards More Accountable and Secure Internet Application Services via Mobile Networked Systems.
IEEE Trans. Mob. Comput., June, 2023
Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures.
IEEE/ACM Trans. Netw., April, 2023
Unveiling the Insecurity of Operational Cellular Emergency Services (911): Vulnerabilities, Attacks, and Countermeasures.
GetMobile Mob. Comput. Commun., March, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the IEEE Conference on Communications and Network Security, 2023
2022
IEEE Internet Things J., 2022
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022
2021
The Untold Secrets of WiFi-Calling Services: Vulnerabilities, Attacks, and Countermeasures.
IEEE Trans. Mob. Comput., 2021
IEEE Trans. Mob. Comput., 2021
Insecurity of operational cellular IoT service: new vulnerabilities, attacks, and countermeasures.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
2020
SecWIR: securing smart home IoT communications via wi-fi routers with embedded intelligence.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020
Ghost calls from operational 4G call systems: IMS vulnerability, call DoS attack, and countermeasure.
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
2019
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019
SecEQP: A Secure and Efficient Scheme for SkNN Query Problem Over Encrypted Geodata on Cloud.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019
2018
IEEE/ACM Trans. Netw., 2018
The Untold Secrets of Operational Wi-Fi Calling Services: Vulnerabilities, Attacks, and Countermeasures.
CoRR, 2018
How Voice Service Threatens Cellular-Connected IoT Devices in the Operational 4G LTE Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
V2PSense: Enabling Cellular-Based V2P Collision Warning Service through Mobile Sensing.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the USENIX Workshop on Hot Topics in Edge Computing, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and Countermeasures.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
CoRR, 2017
2016
IEEE/ACM Trans. Netw., 2016
Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, 2016
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
CoRR, 2015
CoRR, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the ACM SIGCOMM 2014 Conference, 2014
Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data Charging.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013
2012
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2006
2005