Tian Xie

Orcid: 0000-0003-1309-6091

Affiliations:
  • Utah State University, Logan, UT, USA
  • Michigan State University, East Lansing, ME, USA (Ph.D.)


According to our database1, Tian Xie authored at least 26 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

2016
2017
2018
2019
2020
2021
2022
2023
2024
0
1
2
3
4
5
6
2
3
2
1
1
1
2
1
1
3
4
1
3
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Taming the Insecurity of Cellular Emergency Services (9-1-1): From Vulnerabilities to Secure Designs.
IEEE/ACM Trans. Netw., August, 2024

Dissecting Operational Cellular IoT Service Security: Attacks and Defenses.
IEEE/ACM Trans. Netw., April, 2024

IMS is Not That Secure on Your 5G/4G Phones.
Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, 2024

Uncovering Problematic Designs Hindering Ubiquitous Cellular Emergency Services Access.
Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, 2024

2023
MPKIX: Towards More Accountable and Secure Internet Application Services via Mobile Networked Systems.
IEEE Trans. Mob. Comput., June, 2023

Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures.
IEEE/ACM Trans. Netw., April, 2023

Unveiling the Insecurity of Operational Cellular Emergency Services (911): Vulnerabilities, Attacks, and Countermeasures.
GetMobile Mob. Comput. Commun., March, 2023

When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
Uncovering insecure designs of cellular emergency services (911).
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

2021
The Untold Secrets of WiFi-Calling Services: Vulnerabilities, Attacks, and Countermeasures.
IEEE Trans. Mob. Comput., 2021

How Can IoT Services Pose New Security Threats In Operational Cellular Networks?
IEEE Trans. Mob. Comput., 2021

Insecurity of operational cellular IoT service: new vulnerabilities, attacks, and countermeasures.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

BFastPay: A Routing-free Protocol for Fast Payment in Bitcoin Network.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
SecWIR: securing smart home IoT communications via wi-fi routers with embedded intelligence.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020

Ghost calls from operational 4G call systems: IMS vulnerability, call DoS attack, and countermeasure.
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020

An Inter-blockchain Escrow Approach for Fast Bitcoin Payment.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Fast and Secure kNN Query Processing in Cloud Computing.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Exploring the Insecurity of Google Account Registration Protocol via Model Checking.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

2018
The Untold Secrets of Operational Wi-Fi Calling Services: Vulnerabilities, Attacks, and Countermeasures.
CoRR, 2018

How Voice Service Threatens Cellular-Connected IoT Devices in the Operational 4G LTE Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

The Dark Side of Operational Wi-Fi Calling Services.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and Countermeasures.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
The Insecurity of Home Digital Voice Assistants - Amazon Alexa as a Case Study.
CoRR, 2017

Optical propagation of blue LED light in brain tissue and Parylene-C.
Proceedings of the 12th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2017

2016
A Flexible, Micro-Lens-Coupled LED Stimulator for Optical Neuromodulation.
IEEE Trans. Biomed. Circuits Syst., 2016


  Loading...