Follow
Tian Xie
Title
Cited by
Cited by
Year
The insecurity of home digital voice assistants-vulnerabilities, attacks and countermeasures
X Lei, GH Tu, AX Liu, CY Li, T Xie
2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018
158*2018
A flexible, micro-lens-coupled LED stimulator for optical neuromodulation
X Bi, T Xie, B Fan, W Khan, Y Guo, W Li
IEEE transactions on biomedical circuits and systems 10 (5), 972-978, 2016
242016
SecWIR: Securing smart home IoT communications via wi-fi routers with embedded intelligence
X Lei, GH Tu, CY Li, T Xie, M Zhang
Proceedings of the 18th International Conference on Mobile Systems …, 2020
122020
The dark side of operational Wi-Fi calling services
T Xie, GH Tu, CY Li, C Peng, J Li, M Zhang
2018 IEEE Conference on Communications and Network Security (CNS), 1-1, 2018
102018
How can iot services pose new security threats in operational cellular networks?
T Xie, GH Tu, CY Li, C Peng
IEEE Transactions on Mobile Computing 20 (8), 2592-2606, 2020
82020
How voice service threatens cellular-connected iot devices in the operational 4g lte networks
T Xie, CY Li, J Tang, GH Tu
2018 Ieee International Conference on Communications (icc), 1-6, 2018
72018
Fast and secure knn query processing in cloud computing
X Lei, GH Tu, AX Liu, T Xie
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
52020
The untold secrets of wifi-calling services: Vulnerabilities, attacks, and countermeasures
T Xie, GH Tu, B Yin, CY Li, C Peng, M Zhang, H Liu, X Liu
IEEE Transactions on Mobile Computing 20 (11), 3131-3147, 2020
5*2020
Ghost calls from operational 4G call systems: IMS vulnerability, call DoS attack, and countermeasure
YH Lu, CY Li, YY Li, SHY Hsiao, T Xie, GH Tu, WX Chen
Proceedings of the 26th Annual International Conference on Mobile Computing …, 2020
42020
Insecurity of operational cellular iot service: new vulnerabilities, attacks, and countermeasures
S Wang, GH Tu, X Lei, T Xie, CY Li, PY Chou, F Hsieh, Y Hu, L Xiao, ...
Proceedings of the 27th Annual International Conference on Mobile Computing …, 2021
32021
Security threats from Bitcoin wallet smartphone applications: Vulnerabilities, attacks, and countermeasures
Y Hu, S Wang, GH Tu, L Xiao, T Xie, X Lei, CY Li
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
32021
Optical propagation of blue LED light in brain tissue and Parylene-C
T Xie, X Bi, R Luo, F Bin, Z Wang, W Li
2017 IEEE 12th International Conference on Nano/Micro Engineered and …, 2017
32017
BFastPay: A Routing-free Protocol for Fast Payment in Bitcoin Network
X Lei, GH Tu, T Xie, S Wang
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
12021
Exploring the insecurity of google account registration protocol via model checking
T Xie, S Wang, GH Tu, CY Li, X Lei
2019 IEEE Symposium Series on Computational Intelligence (SSCI), 3087-3096, 2019
12019
Uncovering insecure designs of cellular emergency services (911)
Y Hu, MY Chen, GH Tu, CY Li, S Wang, J Shi, T Xie, L Xiao, C Peng, ...
Proceedings of the 28th Annual International Conference on Mobile Computing …, 2022
2022
Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures
YH Lu, SHY Hsiao, CY Li, YC Hsieh, PY Chou, YY Li, T Xie, GH Tu
IEEE/ACM Transactions on Networking, 2022
2022
MPKIX: Towards More Accountable and Secure Internet Application Services via Mobile Networked Systems
T Xie, S Wang, X Lei, J Shi, GH Tu, CY Li
IEEE Transactions on Mobile Computing, 2022
2022
An Inter-blockchain Escrow Approach for Fast Bitcoin Payment
X Lei, T Xie, GH Tu, AX Liu
2020 IEEE 40th International Conference on Distributed Computing Systems …, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–18