Follow
Tian Xie
Title
Cited by
Cited by
Year
The insecurity of home digital voice assistants-vulnerabilities, attacks and countermeasures
X Lei, GH Tu, AX Liu, CY Li, T Xie
2018 IEEE conference on communications and network security (CNS), 1-9, 2018
207*2018
A flexible, micro-lens-coupled LED stimulator for optical neuromodulation
X Bi, T Xie, B Fan, W Khan, Y Guo, W Li
IEEE transactions on biomedical circuits and systems 10 (5), 972-978, 2016
272016
SecWIR: Securing smart home IoT communications via wi-fi routers with embedded intelligence
X Lei, GH Tu, CY Li, T Xie, M Zhang
Proceedings of the 18th International Conference on Mobile Systems …, 2020
222020
Security threats from bitcoin wallet smartphone applications: Vulnerabilities, attacks, and countermeasures
Y Hu, S Wang, GH Tu, L Xiao, T Xie, X Lei, CY Li
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
172021
How can IoT services pose new security threats in operational cellular networks?
T Xie, GH Tu, CY Li, C Peng
IEEE Transactions on Mobile Computing 20 (8), 2592-2606, 2020
172020
Fast and secure knn query processing in cloud computing
X Lei, GH Tu, AX Liu, T Xie
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
122020
The dark side of operational Wi-Fi calling services
T Xie, GH Tu, CY Li, C Peng, J Li, M Zhang
2018 IEEE Conference on Communications and Network Security (CNS), 1-1, 2018
122018
Ghost calls from operational 4G call systems: IMS vulnerability, call DoS attack, and countermeasure
YH Lu, CY Li, YY Li, SHY Hsiao, T Xie, GH Tu, WX Chen
Proceedings of the 26th Annual International Conference on Mobile Computing …, 2020
112020
The untold secrets of wifi-calling services: Vulnerabilities, attacks, and countermeasures
T Xie, GH Tu, B Yin, CY Li, C Peng, M Zhang, H Liu, X Liu
IEEE Transactions on Mobile Computing 20 (11), 3131-3147, 2020
10*2020
How voice service threatens cellular-connected IoT devices in the operational 4G LTE networks
T Xie, CY Li, J Tang, GH Tu
2018 Ieee International Conference on Communications (icc), 1-6, 2018
102018
Insecurity of operational cellular IoT service: new vulnerabilities, attacks, and countermeasures
S Wang, GH Tu, X Lei, T Xie, CY Li, PY Chou, F Hsieh, Y Hu, L Xiao, ...
Proceedings of the 27th Annual International Conference on Mobile Computing …, 2021
92021
BFastPay: A routing-free protocol for fast payment in bitcoin network
X Lei, GH Tu, T Xie, S Wang
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
42021
Uncovering insecure designs of cellular emergency services (911)
Y Hu, MY Chen, GH Tu, CY Li, S Wang, J Shi, T Xie, L Xiao, C Peng, ...
Proceedings of the 28th Annual International Conference on Mobile Computing …, 2022
32022
Optical propagation of blue LED light in brain tissue and Parylene-C
T Xie, X Bi, R Luo, F Bin, Z Wang, W Li
2017 IEEE 12th International Conference on Nano/Micro Engineered and …, 2017
32017
Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures
YH Lu, SHY Hsiao, CY Li, YC Hsieh, PY Chou, YY Li, T Xie, GH Tu
IEEE/ACM Transactions on Networking 31 (2), 800-815, 2022
22022
Mpkix: Towards more accountable and secure internet application services via mobile networked systems
T Xie, S Wang, X Lei, J Shi, GH Tu, CY Li
IEEE Transactions on Mobile Computing, 2022
12022
Exploring the insecurity of google account registration protocol via model checking
T Xie, S Wang, GH Tu, CY Li, X Lei
2019 IEEE Symposium Series on Computational Intelligence (SSCI), 3087-3096, 2019
12019
Taming the Insecurity of Cellular Emergency Services (9-1-1): From Vulnerabilities to Secure Designs
MY Chen, Y Hu, GH Tu, CY Li, S Wang, J Shi, T Xie, RC Hsu, L Xiao, ...
IEEE/ACM Transactions on Networking, 2024
2024
When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities
J Shi, T Xie, GH Tu, C Peng, CY Li, A Hou, S Wang, Y Hu, X Lei, MY Chen, ...
2023 IEEE Conference on Communications and Network Security (CNS), 1-9, 2023
2023
Dissecting Operational Cellular IoT Service Security: Attacks and Defenses
S Wang, T Xie, MY Chen, GH Tu, CY Li, X Lei, PY Chou, F Hsieh, Y Hu, ...
IEEE/ACM Transactions on Networking, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20