Guan-Hua Tu
Title
Cited by
Cited by
Year
Insecurity of voice solution volte in lte mobile networks
CY Li, GH Tu, C Peng, Z Yuan, Y Li, S Lu, X Wang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
602015
Address resolution protocol (arp) cache management methods and devices
JH Sun, GH Tu
US Patent App. 11/552,678, 2008
512008
The Insecurity of Home Digital Voice Assistants--Amazon Alexa as a Case Study
X Lei, GH Tu, AX Liu, K Ali, CY Li, T Xie
arXiv preprint arXiv:1712.03327, 2017
442017
Method and system for serverless VoIP service in personal communication network
GH Tu
US Patent 7,519,075, 2009
422009
System and method for processing multimedia messages
CW Li, GH Tu
US Patent App. 11/358,542, 2007
422007
Mobile data charging: new attacks and countermeasures
C Peng, C Li, GH Tu, S Lu, L Zhang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
402012
Can we pay for what we get in 3G data access?
C Peng, G Tu, C Li, S Lu
Proceedings of the 18th annual international conference on Mobile computing …, 2012
402012
Control-plane protocol interactions in cellular networks
GH Tu, Y Li, C Peng, CY Li, H Wang, S Lu
ACM SIGCOMM Computer Communication Review 44 (4), 223-234, 2014
392014
Mobile communication apparatus having anti-theft and auto-notification functions
GH Tu
US Patent 7,574,235, 2009
372009
How voice calls affect data in operational LTE networks
GH Tu, C Peng, H Wang, CY Li, S Lu
Proceedings of the 19th annual international conference on Mobile computing …, 2013
292013
Mobile communication apparatus having anti-theft and auto-notification functions
A Jain, A Kumar, GH Tu
US Patent 9,160,830, 2015
272015
Accounting for roaming users on mobile data access: Issues and root causes
GH Tu, C Peng, CY Li, X Ma, H Wang, T Wang, S Lu
Proceeding of the 11th annual international conference on Mobile systems …, 2013
262013
New security threats caused by IMS-based SMS service in 4G LTE networks
GH Tu, CY Li, C Peng, Y Li, S Lu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
252016
How voice call technology poses security threats in 4G LTE networks
GH Tu, CY Li, C Peng, S Lu
2015 IEEE Conference on Communications and Network Security (CNS), 442-450, 2015
242015
Real threats to your data bills: Security loopholes and defenses in mobile data charging
C Peng, CY Li, H Wang, GH Tu, S Lu
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
222014
Communication device for wireless virtual storage and method thereof
GH Tu, WH Lien
US Patent App. 11/942,812, 2009
212009
Mobile edge computing platform deployment in 4G {LTE} networks: A middlebox approach
CY Li, HY Liu, PH Huang, HT Chien, GH Tu, PY Hong, YD Lin
{USENIX} Workshop on Hot Topics in Edge Computing (HotEdge 18), 2018
192018
icellular: Device-customized cellular network access on commodity smartphones
Y Li, H Deng, C Peng, Z Yuan, GH Tu, J Li, S Lu
13th {USENIX} Symposium on Networked Systems Design and Implementation …, 2016
182016
The insecurity of home digital voice assistants-vulnerabilities, attacks and countermeasures
X Lei, GH Tu, AX Liu, CY Li, T Xie
2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018
152018
An improved GGSN failure restoration mechanism for UMTS
P Lin, GH Tu
Wireless Networks 12 (1), 91-103, 2006
122006
The system can't perform the operation now. Try again later.
Articles 1–20