default search action
Chi-Yu Li 0001
Person information
- affiliation: National Chiao Tung University, Hsinchu, Taiwan
- affiliation (PhD 2015): University of California, Los Angeles, CA, USA
Other persons with the same name
- Chi-Yu Li 0002 — Brandenburg University of Technology, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Asad Ali, Ying-Dar Lin, Chi-Yu Li, Yuan-Cheng Lai:
Transparent Third-Party Authentication With Application Mobility for 5G Mobile-Edge Computing. IEEE Trans. Netw. Serv. Manag. 21(1): 1142-1157 (2024) - [j21]Sihan Wang, Tian Xie, Min-Yue Chen, Guan-Hua Tu, Chi-Yu Li, Xinyu Lei, Po-Yi Chou, Fu-Cheng Hsieh, Yiwen Hu, Li Xiao, Chunyi Peng:
Dissecting Operational Cellular IoT Service Security: Attacks and Defenses. IEEE/ACM Trans. Netw. 32(2): 1229-1244 (2024) - [j20]Min-Yue Chen, Yiwen Hu, Guan-Hua Tu, Chi-Yu Li, Sihan Wang, Jingwen Shi, Tian Xie, Ren-Chieh Hsu, Li Xiao, Chunyi Peng, Zhaowei Tan, Songwu Lu:
Taming the Insecurity of Cellular Emergency Services (9-1-1): From Vulnerabilities to Secure Designs. IEEE/ACM Trans. Netw. 32(4): 3076-3091 (2024) - [j19]Shiuhpyng Winston Shieh, Jeffrey M. Voas, Phil Laplante, Jason W. Rupe, Christian K. Hansen, Yu-Sung Wu, Yi-Ting Chen, Chi-Yu Li, Kai-Chiang Wu:
Reliability Engineering in a Time of Rapidly Converging Technologies. IEEE Trans. Reliab. 73(1): 73-82 (2024) - [c50]Yi-Chen Hsieh, Tzu-Chi Yu, Chi-Yu Li, Guan-Hua Tu:
InstaMAuth: Instant Mobile Authentication Service Based on 5G Authenticated Call Sessions. DSC 2024: 131-138 - [c49]Kai-Wen Chen, Li-Ping Tung, Tai Tan Phan, Chi-Yu Li:
Stealthy Remote Collection of Call Statistics in 4G/5G Mobile Networks. ISCC 2024: 1-6 - [c48]Tan Tai Phan, Shang-Chun Tai, Yu-Shuo Chang, Wei-Xun Chen, Chi-Yu Li:
Automatic Bridging for Mobile Wireless Backhaul System. ISCC 2024: 1-4 - [c47]Jingwen Shi, Sihan Wang, Min-Yue Chen, Guan-Hua Tu, Tian Xie, Man-Hsin Chen, Yiwen Hu, Chi-Yu Li, Chunyi Peng:
IMS is Not That Secure on Your 5G/4G Phones. MobiCom 2024: 513-527 - [c46]Shao-Jung Lu, Wei-Xun Chen, Yu-Shao Su, Yu-Shou Chang, Yao-Wen Liu, Chi-Yu Li, Guan-Hua Tu:
Practical Latency-Aware Scheduling for Low-Latency Elephant VR Flows in Wi-Fi Networks. PerCom 2024: 57-68 - 2023
- [j18]Ying-Dar Lin, Kuan-Yu Ho, Widhi Yahya, Chi-Yu Li, Yuan-Cheng Lai, Jeans H. Tseng:
Dual-uCPE for High-Availability Retailer Services with Fault Toleranceand Load Balancing. IEEE Internet Things Mag. 6(4): 88-95 (2023) - [j17]Yiwen Hu, Min-Yue Chen, Guan-Hua Tu, Chi-Yu Li, Sihan Wang, Jingwen Shi, Tian Xie, Li Xiao, Chunyi Peng, Zhaowei Tan, Songwu Lu:
Unveiling the Insecurity of Operational Cellular Emergency Services (911): Vulnerabilities, Attacks, and Countermeasures. GetMobile Mob. Comput. Commun. 27(1): 39-43 (2023) - [j16]Tian Xie, Sihan Wang, Xinyu Lei, Jingwen Shi, Guan-Hua Tu, Chi-Yu Li:
MPKIX: Towards More Accountable and Secure Internet Application Services via Mobile Networked Systems. IEEE Trans. Mob. Comput. 22(6): 3489-3507 (2023) - [j15]Yu-Han Lu, Sandy Hsin-Yu Hsiao, Chi-Yu Li, Yi-Chen Hsieh, Po-Yi Chou, Yao-Yu Li, Tian Xie, Guan-Hua Tu:
Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures. IEEE/ACM Trans. Netw. 31(2): 800-815 (2023) - [c45]Jingwen Shi, Tian Xie, Guan-Hua Tu, Chunyi Peng, Chi-Yu Li, Andrew Z. Hou, Sihan Wang, Yiwen Hu, Xinyu Lei, Min-Yue Chen, Li Xiao, Xiaoming Liu:
When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities. CNS 2023: 1-9 - [c44]Meng-Shou Wu, Tan Tai Phan, Ping-Kuan Kao, Chi-Yu Li:
Congestion-Avoidance Adaptation for Edge-based UAV Video Frame Delivery. GLOBECOM 2023: 4546-4551 - [c43]Man-Hsin Chen, Chiung-I Wu, Yin-Chi Li, Chi-Yu Li, Guan-Hua Tu:
Remote Detection of 4G/5G UEs Vulnerable to Stealthy Call DoS. INFOCOM Workshops 2023: 1-2 - [c42]Yin-Chi Li, Ping-Tsan Liu, Yi-An Tai, Che-Hung Liu, Man-Hsin Chen, Chi-Yu Li, Guan-Hua Tu:
A Runtime Anomaly Detector via Service Communication Proxy for 5G Mobile Networks. INFOCOM Workshops 2023: 1-2 - 2022
- [j14]Yu-Hsuan Wu, Chi-Yu Li, Yi-Bing Lin, Kuochen Wang, Meng-Shou Wu:
Modeling Control Delays for Edge-Enabled UAVs in Cellular Networks. IEEE Internet Things J. 9(17): 16222-16233 (2022) - [j13]Yan-Wei Chen, Chi-Yu Li, Chien-Chao Tseng, Min-Zhi Hu:
P4-TINS: P4-Driven Traffic Isolation for Network Slicing With Bandwidth Guarantee and Management. IEEE Trans. Netw. Serv. Manag. 19(3): 3290-3303 (2022) - [c41]Po-Hao Huang, Fu-Cheng Hsieh, Wen-Jen Hsieh, Chi-Yu Li, Ying-Dar Lin:
Prioritized Traffic Shaping for Low-latency MEC Flows in MEC-enabled Cellular Networks. CCNC 2022: 120-125 - [c40]Yung-Chuan Wu, Hong-Rong Chang, Meng-Shou Wu, Chi-Yu Li, Kuochen Wang:
UAV-FAP: User Fairness-Driven Access Point on UAV for Wi-Fi Networks. CCNC 2022: 473-476 - [c39]Yiwen Hu, Min-Yue Chen, Guan-Hua Tu, Chi-Yu Li, Sihan Wang, Jingwen Shi, Tian Xie, Li Xiao, Chunyi Peng, Zhaowei Tan, Songwu Lu:
Uncovering insecure designs of cellular emergency services (911). MobiCom 2022: 703-715 - 2021
- [j12]Tian Xie, Guan-Hua Tu, Chi-Yu Li, Chunyi Peng:
How Can IoT Services Pose New Security Threats In Operational Cellular Networks? IEEE Trans. Mob. Comput. 20(8): 2592-2606 (2021) - [j11]Tian Xie, Guan-Hua Tu, Bangjie Yin, Chi-Yu Li, Chunyi Peng, Mi Zhang, Hui Liu, Xiaoming Liu:
The Untold Secrets of WiFi-Calling Services: Vulnerabilities, Attacks, and Countermeasures. IEEE Trans. Mob. Comput. 20(11): 3131-3147 (2021) - [j10]Chi-Yu Li, Hsin-Yi Wang, Wei-Ching Wang, Chun-Ying Huang:
Privacy Leakage and Protection of InputConnection Interface in Android. IEEE Trans. Netw. Serv. Manag. 18(3): 3309-3323 (2021) - [j9]Ying-Dar Lin, Widhi Yahya, Chien-Ting Wang, Chi-Yu Li, Jeans H. Tseng:
Scalable Mobile Edge Computing: A Two-Tier Multi-Site Multi-Server Architecture with Autoscaling and Offloading. IEEE Wirel. Commun. 28(6): 168-175 (2021) - [c38]Yiwen Hu, Sihan Wang, Guan-Hua Tu, Li Xiao, Tian Xie, Xinyu Lei, Chi-Yu Li:
Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures. CODASPY 2021: 89-100 - [c37]Syuan-Cheng Chen, Chi-Yu Li, Chui-Hao Chiu:
An Experience Driven Design for IEEE 802.11ac Rate Adaptation based on Reinforcement Learning. INFOCOM 2021: 1-10 - [c36]Sihan Wang, Guan-Hua Tu, Xinyu Lei, Tian Xie, Chi-Yu Li, Po-Yi Chou, Fu-Cheng Hsieh, Yiwen Hu, Li Xiao, Chunyi Peng:
Insecurity of operational cellular IoT service: new vulnerabilities, attacks, and countermeasures. MobiCom 2021: 437-450 - [c35]Meng-Shou Wu, Chi-Yu Li:
Edge-based Realtime Image Object Detection for UAV Missions. WOCC 2021: 293-294 - 2020
- [j8]Kai-Ten Feng, Li-Hsiang Shen, Chi-Yu Li, Po-Tsang Huang, Sau-Hsuan Wu, Li-Chun Wang, Yi-Bing Lin, Mau-Chung Frank Chang:
3D On-Demand Flying Mobile Communication for Millimeter-Wave Heterogeneous Networks. IEEE Netw. 34(5): 198-204 (2020) - [j7]Ying-Dar Lin, Duc-Tai Truong, Asad Ali, Chi-Yu Li, Yuan-Cheng Lai, Thai-Mai Thi Dinh:
Proxy-Based Federated Authentication: A Transparent Third-Party Solution for Cloud-Edge Federation. IEEE Netw. 34(6): 220-227 (2020) - [j6]Chi-Yu Li, Ying-Dar Lin, Yuan-Cheng Lai, Hsu-Tung Chien, Yu-Sheng Huang, Po-Hao Huang, Hsueh-Yang Liu:
Transparent AAA Security Design for Low-Latency MEC-Integrated Cellular Networks. IEEE Trans. Veh. Technol. 69(3): 3231-3243 (2020) - [j5]Chi-Yu Li, Syuan-Cheng Chen, Chien-Ting Kuo, Chui-Hao Chiu:
Practical Machine Learning-Based Rate Adaptation Solution for Wi-Fi NICs: IEEE 802.11ac as a Case Study. IEEE Trans. Veh. Technol. 69(9): 10264-10277 (2020) - [c34]Asad Ali, Ying-Dar Lin, Chi-Yu Li, Yuan-Cheng Lai:
Transparent 3rd-Party Authentication with Application Mobility for 5G Mobile Edge Computing. EuCNC 2020: 219-224 - [c33]Pei-Yuan Hong, Chi-Yu Li, Hong-Rong Chang, YuanHao Hsueh, Kuochen Wang:
WBF-PS: WiGig Beam Fingerprinting for UAV Positioning System in GPS-denied Environments. INFOCOM 2020: 1778-1787 - [c32]Yu-Han Lu, Chi-Yu Li, Yao-Yu Li, Sandy Hsin-Yu Hsiao, Tian Xie, Guan-Hua Tu, Wei-Xun Chen:
Ghost calls from operational 4G call systems: IMS vulnerability, call DoS attack, and countermeasure. MobiCom 2020: 8:1-8:14 - [c31]Xinyu Lei, Guan-Hua Tu, Chi-Yu Li, Tian Xie, Mi Zhang:
SecWIR: securing smart home IoT communications via wi-fi routers with embedded intelligence. MobiSys 2020: 260-272
2010 – 2019
- 2019
- [c30]Sandy H. Hsiao, Hong-Rong Chang, Yu-Han Lu, Chi-Yu Li:
Mobility Support for Networks on Trains Using Commercial Off-the-shelf Routers. APNOMS 2019: 1-4 - [c29]Li-Chun Wang, Chuan-Chi Lai, Hong-Han Shuai, Hsin-Piao Lin, Chi-Yu Li, Teng-Hu Cheng, Chiun-Hsun Chen:
Communications and Networking Technologies for Intelligent Drone Cruisers. GLOBECOM Workshops 2019: 1-6 - [c28]Tian Xie, Sihan Wang, Guan-Hua Tu, Chi-Yu Li, Xinyu Lei:
Exploring the Insecurity of Google Account Registration Protocol via Model Checking. SSCI 2019: 3087-3096 - [i4]Li-Chun Wang, Chuan-Chi Lai, Hong-Han Shuai, Hsin-Piao Lin, Chi-Yu Li, Teng-Hu Cheng, Chiun-Hsun Chen:
Communications and Networking Technologies for Intelligent Drone Cruisers. CoRR abs/1910.05309 (2019) - 2018
- [c27]Damiano Rapone, Roberto Quasso, Shahzoob Bilal Chundrigar, Samer T. Talat, Luca Cominardi, Antonio de la Oliva, Ping-Heng Kuo, Alain Mourad, Alessandro Colazzo, Giacomo Parmeggiani, Aitor Zabala Orive, Chenguang Lu, Chi-Yu Li:
An Integrated, Virtualized Joint Edge and Fog Computing System with Multi-RAT Convergence. BMSB 2018: 1-5 - [c26]Xinyu Lei, Guan-Hua Tu, Alex X. Liu, Chi-Yu Li, Tian Xie:
The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and Countermeasures. CNS 2018: 1-9 - [c25]Tian Xie, Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Jiawei Li, Mi Zhang:
The Dark Side of Operational Wi-Fi Calling Services. CNS 2018: 1 - [c24]Cheng-Hsu Lin, Chi-Yu Li, Kuochen Wang:
Setting Malicious Flow Entries Against SDN Operations: Attacks and Countermeasures. DSC 2018: 1-8 - [c23]Chi-Yu Li, Hsueh-Yang Liu, Po-Hao Huang, Hsu-Tung Chien, Guan-Hua Tu, Pei-Yuan Hong, Ying-Dar Lin:
Mobile Edge Computing Platform Deployment in 4G LTE Networks: A Middlebox Approach. HotEdge 2018 - [c22]Chi-Yu Li, Giovanni Salinas, Po-Hao Huang, Guan-Hua Tu, Guo-Huang Hsu, Tien-Yuan Hsieh:
V2PSense: Enabling Cellular-Based V2P Collision Warning Service through Mobile Sensing. ICC 2018: 1-6 - [c21]Tian Xie, Chi-Yu Li, Jiliang Tang, Guan-Hua Tu:
How Voice Service Threatens Cellular-Connected IoT Devices in the Operational 4G LTE Networks. ICC 2018: 1-6 - [c20]Yan-Ting Chen, Chi-Yu Li, Kuochen Wang:
A Fast Converging Mechanism for Load Balancing among SDN Multiple Controllers. ISCC 2018: 682-687 - [c19]Ping-Heng Kuo, Alain Mourad, Chenguang Lu, Miguel Berg, Simon Duquennoy, Ying-Yu Chen, Yi-Huai Hsu, Aitor Zabala, Riccardo Ferrari, Sergio González, Chi-Yu Li, Hsu-Tung Chien:
An integrated edge and Fog system for future communication networks. WCNC Workshops 2018: 338-343 - [i3]Tian Xie, Guan-Hua Tu, Bangjie Yin, Chi-Yu Li, Chunyi Peng, Mi Zhang, Hui Liu, Xiaoming Liu:
The Untold Secrets of Operational Wi-Fi Calling Services: Vulnerabilities, Attacks, and Countermeasures. CoRR abs/1811.11274 (2018) - 2017
- [c18]Guan-Rong Chen, Chi-Yu Li, Kuochen Wang:
ReSDN: A lightweight solution for data-plane state recovery in software-defined networks. ICC 2017: 1-7 - [c17]Yao-Yu Li, Chi-Yu Li, Wei-Han Chen, Chia-Jui Yeh, Kuochen Wang:
Enabling seamless WiGig/WiFi handovers in tri-band wireless systems. ICNP 2017: 1-2 - [i2]Xinyu Lei, Guan-Hua Tu, Alex X. Liu, Chi-Yu Li, Tian Xie:
The Insecurity of Home Digital Voice Assistants - Amazon Alexa as a Case Study. CoRR abs/1712.03327 (2017) - 2016
- [j4]Chi-Yu Li, Chunyi Peng, Peng Cheng, Songwu Lu, Xinbing Wang, Fengyuan Ren, Tao Wang:
An Energy Efficiency Perspective on Rate Adaptation for 802.11n NIC. IEEE Trans. Mob. Comput. 15(6): 1333-1347 (2016) - [j3]Guan-Hua Tu, Yuanjie Li, Chunyi Peng, Chi-Yu Li, Songwu Lu:
Detecting Problematic Control-Plane Protocol Interactions in Mobile Networks. IEEE/ACM Trans. Netw. 24(2): 1209-1222 (2016) - [c16]Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Yuanjie Li, Songwu Lu:
New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks. CCS 2016: 1118-1130 - [c15]Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Zengwen Yuan, Yuanjie Li, Xiaohu Zhao, Songwu Lu:
VoLTE*: A Lightweight Voice Solution to 4G LTE Networks. HotMobile 2016: 3-8 - 2015
- [b1]Chi-Yu Li:
Toward Customizable Wi-Fi. University of California, Los Angeles, USA, 2015 - [c14]Chi-Yu Li, Guan-Hua Tu, Chunyi Peng, Zengwen Yuan, Yuanjie Li, Songwu Lu, Xinbing Wang:
Insecurity of Voice Solution VoLTE in LTE Mobile Networks. CCS 2015: 316-327 - [c13]Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Songwu Lu:
How voice call technology poses security threats in 4G LTE networks. CNS 2015: 442-450 - [c12]Chi-Yu Li, Chunyi Peng, Songwu Lu, Xinbing Wang, Ranveer Chandra:
Latency-aware rate adaptation in 802.11n home networks. INFOCOM 2015: 1293-1301 - [i1]Guan-Hua Tu, Yuanjie Li, Chunyi Peng, Chi-Yu Li, Muhammad Taqi Raza, Hsiao-Yun Tseng, Songwu Lu:
New Threats to SMS-Assisted Mobile Internet Services from 4G LTE Networks. CoRR abs/1510.08531 (2015) - 2014
- [c11]Chunyi Peng, Chi-Yu Li, Hongyi Wang, Guan-Hua Tu, Songwu Lu:
Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data Charging. CCS 2014: 727-738 - [c10]Guan-Hua Tu, Yuanjie Li, Chunyi Peng, Chi-Yu Li, Hongyi Wang, Songwu Lu:
Control-plane protocol interactions in cellular networks. SIGCOMM 2014: 223-234 - 2013
- [c9]Ioannis Pefkianakis, Chi-Yu Li, Chunyi Peng, Suk-Bok Lee, Songwu Lu:
CMES: Collaborative Energy Save for MIMO 802.11 wireless networks. ICNP 2013: 1-10 - [c8]Guan-Hua Tu, Chunyi Peng, Hongqi Wang, Chi-Yu Li, Songwu Lu:
How voice calls affect data in operational LTE networks. MobiCom 2013: 87-98 - [c7]Guan-Hua Tu, Chunyi Peng, Chi-Yu Li, Xingyu Ma, Hongqi Wang, Tao Wang, Songwu Lu:
Accounting for roaming users on mobile data access: issues and root causes. MobiSys 2013: 305-318 - 2012
- [c6]Chunyi Peng, Chi-Yu Li, Guan-Hua Tu, Songwu Lu, Lixia Zhang:
Mobile data charging: new attacks and countermeasures. CCS 2012: 195-204 - [c5]Chi-Yu Li, Ioannis Pefkianakis, Bojie Li, Chenghui Peng, Wei Zhang, Songwu Lu:
A multimedia service migration protocol for single user multiple devices. ICC 2012: 1923-1927 - [c4]Chunyi Peng, Guan-Hua Tu, Chi-Yu Li, Songwu Lu:
Can we pay for what we get in 3G data access? MobiCom 2012: 113-124 - [c3]Chi-Yu Li, Chunyi Peng, Songwu Lu, Xinbing Wang:
Energy-based rate adaptation for 802.11n. MobiCom 2012: 341-352 - 2011
- [j2]Andy An-Kai Jeng, Rong-Hong Jan, Chi-Yu Li, Chien Chen:
Release-time-based multi-channel MAC protocol for wireless mesh networks. Comput. Networks 55(9): 2176-2195 (2011) - [c2]Ioannis Pefkianakis, Chi-Yu Li, Songwu Lu:
What is wrong/right with IEEE 802.11n Spatial Multiplexing Power Save feature? ICNP 2011: 186-195 - 2010
- [c1]Jiangzhe Wang, Eric Osterweil, Chunyi Peng, Ryuji Wakikawa, Lixia Zhang, Chi-Yu Li, Pei-Chun Cheng:
Implementing instant messaging using named data. AINTEC 2010: 40-47
2000 – 2009
- 2007
- [j1]Chi-Yu Li, Andy An-Kai Jeng, Rong-Hong Jan:
A MAC Protocol for Multi-Channel Multi-Interface Wireless Mesh Network using Hybrid Channel Assignment Scheme. J. Inf. Sci. Eng. 23(4): 1041-1055 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-17 21:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint