The following publications are possibly variants of this publication:
- Ghost calls from operational 4G call systems: IMS vulnerability, call DoS attack, and countermeasureYu-Han Lu, Chi-Yu Li, Yao-Yu Li, Sandy Hsin-Yu Hsiao, Tian Xie, Guan-Hua Tu, Wei-Xun Chen. mobicom 2020: [doi]
- Insecurity of operational cellular IoT service: new vulnerabilities, attacks, and countermeasuresSihan Wang, Guan-Hua Tu, Xinyu Lei, Tian Xie, Chi-Yu Li, Po-Yi Chou, Fu-Cheng Hsieh, Yiwen Hu, Li Xiao, Chunyi Peng 0001. mobicom 2021: 437-450 [doi]
- Unveiling the Insecurity of Operational Cellular Emergency Services (911): Vulnerabilities, Attacks, and CountermeasuresYiwen Hu, Min-Yue Chen, Guan-Hua Tu, Chi-Yu Li, Sihan Wang, Jingwen Shi, Tian Xie, Li Xiao, Chunyi Peng 0001, Zhaowei Tan, Songwu Lu. sigmobile, 27(1):39-43, March 2023. [doi]
- The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and CountermeasuresXinyu Lei, Guan-Hua Tu, Alex X. Liu, Chi-Yu Li, Tian Xie. cns 2018: 1-9 [doi]