Guan-Hua Tu

Orcid: 0000-0002-2542-4817

According to our database1, Guan-Hua Tu authored at least 49 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Taming the Insecurity of Cellular Emergency Services (9-1-1): From Vulnerabilities to Secure Designs.
IEEE/ACM Trans. Netw., August, 2024

Dissecting Operational Cellular IoT Service Security: Attacks and Defenses.
IEEE/ACM Trans. Netw., April, 2024

Practical Latency-Aware Scheduling for Low-Latency Elephant VR Flows in Wi-Fi Networks.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2024

IMS is Not That Secure on Your 5G/4G Phones.
Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, 2024

2023
MPKIX: Towards More Accountable and Secure Internet Application Services via Mobile Networked Systems.
IEEE Trans. Mob. Comput., June, 2023

Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures.
IEEE/ACM Trans. Netw., April, 2023

Unveiling the Insecurity of Operational Cellular Emergency Services (911): Vulnerabilities, Attacks, and Countermeasures.
GetMobile Mob. Comput. Commun., March, 2023

The Security in Optical Wireless Communication: A Survey.
ACM Comput. Surv., 2023

A Runtime Anomaly Detector via Service Communication Proxy for 5G Mobile Networks.
Proceedings of the IEEE INFOCOM 2023, 2023

Remote Detection of 4G/5G UEs Vulnerable to Stealthy Call DoS.
Proceedings of the IEEE INFOCOM 2023, 2023

When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
Wi-Fi-Based Tracking of Human Walking for Home Health Monitoring.
IEEE Internet Things J., 2022

Uncovering insecure designs of cellular emergency services (911).
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

2021
The Untold Secrets of WiFi-Calling Services: Vulnerabilities, Attacks, and Countermeasures.
IEEE Trans. Mob. Comput., 2021

How Can IoT Services Pose New Security Threats In Operational Cellular Networks?
IEEE Trans. Mob. Comput., 2021

Insecurity of operational cellular IoT service: new vulnerabilities, attacks, and countermeasures.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

BFastPay: A Routing-free Protocol for Fast Payment in Bitcoin Network.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
SecWIR: securing smart home IoT communications via wi-fi routers with embedded intelligence.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020

Ghost calls from operational 4G call systems: IMS vulnerability, call DoS attack, and countermeasure.
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020

An Inter-blockchain Escrow Approach for Fast Bitcoin Payment.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Fast and Secure kNN Query Processing in Cloud Computing.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Exploring the Insecurity of Google Account Registration Protocol via Model Checking.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

SecEQP: A Secure and Efficient Scheme for SkNN Query Problem Over Encrypted Geodata on Cloud.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

2018
Device-Customized Multi-Carrier Network Access on Commodity Smartphones.
IEEE/ACM Trans. Netw., 2018

The Untold Secrets of Operational Wi-Fi Calling Services: Vulnerabilities, Attacks, and Countermeasures.
CoRR, 2018

How Voice Service Threatens Cellular-Connected IoT Devices in the Operational 4G LTE Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

V2PSense: Enabling Cellular-Based V2P Collision Warning Service through Mobile Sensing.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Mobile Edge Computing Platform Deployment in 4G LTE Networks: A Middlebox Approach.
Proceedings of the USENIX Workshop on Hot Topics in Edge Computing, 2018

The Dark Side of Operational Wi-Fi Calling Services.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and Countermeasures.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
The Insecurity of Home Digital Voice Assistants - Amazon Alexa as a Case Study.
CoRR, 2017

2016
Detecting Problematic Control-Plane Protocol Interactions in Mobile Networks.
IEEE/ACM Trans. Netw., 2016

VoLTE*: A Lightweight Voice Solution to 4G LTE Networks.
Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, 2016

iCellular: Device-Customized Cellular Network Access on Commodity Smartphones.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Control-Plane Protocol Interactions in Mobile Networks.
PhD thesis, 2015

New Threats to SMS-Assisted Mobile Internet Services from 4G LTE Networks.
CoRR, 2015

iCellular: Define Your Own Cellular Network Access on Commodity Smartphones.
CoRR, 2015

How voice call technology poses security threats in 4G LTE networks.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Insecurity of Voice Solution VoLTE in LTE Mobile Networks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Control-plane protocol interactions in cellular networks.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data Charging.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Accounting for roaming users on mobile data access: issues and root causes.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

How voice calls affect data in operational LTE networks.
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013

2012
Can we pay for what we get in 3G data access?
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

Mobile data charging: new attacks and countermeasures.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2006
An Improved GGSN Failure Restoration Mechanism for UMTS.
Wirel. Networks, 2006

2005
An intelligent GGSN dispatching mechanism for UMTS.
Comput. Commun., 2005


  Loading...