Author of the publication

When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks.

, , , , , , and . EuroS&P, page 595-609. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VITA: 'Carefully Chosen and Weighted Less' Is Better in Medication Recommendation., , , , and . AAAI, page 8600-8607. AAAI Press, (2024)Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations., , , , , , , and . CCS, page 328-339. ACM, (2015)Pay as You Want: Bypassing Charging System in Operational Cellular Networks., , , , , , and . WISA, volume 10144 of Lecture Notes in Computer Science, page 148-160. (2016)Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE., , , , , and . USENIX Security Symposium, page 55-72. USENIX Association, (2019)Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane., , , and . IEEE Symposium on Security and Privacy, page 1153-1168. IEEE, (2019)Peeking Over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -., , , , , , , , and . IEEE Trans. Mob. Comput., 17 (10): 2366-2380 (2018)When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks., , , , , , and . EuroS&P, page 595-609. IEEE, (2017)A Study of Non-photorealistic Rendering Method Using Orientation Sensor in Mobile Devices., , , , , and . ICITCS, volume 215 of Lecture Notes in Electrical Engineering, page 819-827. Springer, (2012)VITA: 'Carefully Chosen and Weighted Less' Is Better in Medication Recommendation., , , , and . CoRR, (2023)