The following publications are possibly variants of this publication:
- Insecurity of operational cellular IoT service: new vulnerabilities, attacks, and countermeasuresSihan Wang, Guan-Hua Tu, Xinyu Lei, Tian Xie, Chi-Yu Li, Po-Yi Chou, Fu-Cheng Hsieh, Yiwen Hu, Li Xiao, Chunyi Peng 0001. mobicom 2021: 437-450 [doi]
- Uncovering insecure designs of cellular emergency services (911)Yiwen Hu, Min-Yue Chen, Guan-Hua Tu, Chi-Yu Li, Sihan Wang, Jingwen Shi, Tian Xie, Li Xiao, Chunyi Peng 0001, Zhaowei Tan, Songwu Lu. mobicom 2022: 703-715 [doi]
- Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and CountermeasuresYu-Han Lu, Sandy Hsin-Yu Hsiao, Chi-Yu Li 0001, Yi-Chen Hsieh, Po-Yi Chou, Yao-Yu Li, Tian Xie, Guan-Hua Tu. ton, 31(2):800-815, April 2023. [doi]
- The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and CountermeasuresXinyu Lei, Guan-Hua Tu, Alex X. Liu, Chi-Yu Li, Tian Xie. cns 2018: 1-9 [doi]
- The Untold Secrets of WiFi-Calling Services: Vulnerabilities, Attacks, and CountermeasuresTian Xie, Guan-Hua Tu, Bangjie Yin, Chi-Yu Li, Chunyi Peng 0001, Mi Zhang, Hui Liu, Xiaoming Liu 0002. tmc, 20(11):3131-3147, 2021. [doi]