Publications

2024

  1. Practical Latency-aware Scheduling for Low-latency Elephant VR Flows in Wi-Fi Networks
    Shao-Jung Lu, Wei-Xun Chen, Yu-Shao Su, Yu-Shuo Chang, Yao-Wen Liu, Chi-Yu Li, Guan-Hua Tu
    IEEE PerCom'24. (Acceptance rate: 23/158 = 14.5%)

  2. Transparent Third-Party Authentication With Application Mobility for 5G Mobile-Edge Computing
    Asad Ali, Ying-Dar Lin, Chi-Yu Li, Yuan-Cheng Lai
    IEEE Transactions on Network and Service Management (TNSM), Vol. 21, Issue 1, pp. 1142-1157, February 2024.

2023

  1. Congestion-Avoidance Adaptation for Edge-based UAV Video Frame Delivery
    Meng-Shou Wu, Tai Tan Phan, Ping-Kuan Kao, Chi-Yu Li
    IEEE Globecom'23.

  2. Dual-uCPE for High-Availability Retailer Services with Fault Toleranceand Load Balancing
    Ying-Dar Lin, Kuan-Yu Ho, Widhi Yahya, Chi-Yu Li, Yuan-Cheng Lai, Jeans H. Tseng
    IEEE Internet of Things Magazine, Vol. 6, Issue 4, pp. 88-95, December 2023.

  3. When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities
    Jingwen Shi, Tian Xie, Guan-Hua Tu, Chunyi Peng, Chi-Yu Li, Andrew Hou, Sihan Wang, Yiwen Hu, Xinyu Lei, Min-Yue Chen, Li Xiao, Xiaoming Liu
    IEEE CNS'23. (Acceptance rate: 32/112 = 28.6%)

  4. Dissecting Operational Cellular IoT Service Security: Attacks and Defenses
    Sihan Wang, Tian Xie, Min-Yue Chen, Guan-Hua Tu, Chi-Yu Li, Xinyu Lei, Po-Yi Chou, Fucheng Hsieh, Yiwen Hu, Li Xiao, Chunyi Peng
    IEEE/ACM Transactions on Networking (ToN), Early Access, September 2023.

  5. Unveiling the Insecurity of Operational Cellular Emergency Services (911): Vulnerabilities, Attacks, and Countermeasures
    Yiwen Hu, Min-Yue Chen, Guan-Hua Tu, Chi-Yu Li, Sihan Wang, Jingwen Shi, Tian Xie, Xiao Li, Chunyi Peng, Zhaowei Tan, Songwu Lu
    ACM GetMobile: Mobile Computing and Communications, to appear. (Invited Paper)
    GetMobile Research Highlight

  6. A Runtime Anomaly Detector via Service Communication Proxy for 5G Mobile Networks
    Yi-Chi Li, Ping-Tsan Liu, Yi-An Tai, Che-Hung Liu, Man-Hsin Chen, Chi-Yu Li, Guan-Hua Tu
    IEEE INFOCOM'23 Demo.

  7. Remote Detection of 4G/5G UEs Vulnerable to Stealthy Call DoS
    Man-Hsin Chen, Chiung-I Wu, Yi-Chi Li, Chi-Yu Li, Guan-Hua Tu
    IEEE INFOCOM'23 Demo.

2022

  1. Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures
    Yu-Han Lu, Sandy Hsin-Yu Hsiao, Chi-Yu Li, Yi-Chen Hsieh, Po-Yi Chou, Yao-Yu Li, Tian Xie, Guan-Hua Tu
    IEEE/ACM Transactions on Networking (ToN), to appear.

  2. Uncovering Insecure Designs of Cellular Emergency Services (911)
    Yiwen Hu, Min-Yue Chen, Guan-Hua Tu, Chi-Yu Li, Sihan Wang, Jingwen Shi, Tian Xie, Xiao Li, Chunyi Peng, Zhaowei Tan, Songwu Lu
    ACM MOBICOM'22. (Acceptance rate: 56/314 = 17.83%)
    Best Community Paper Award Runner-Up
    AT&T Security Reward

  3. P4-TINS: P4-driven Traffic Isolation for Network Slicing with Bandwidth Guarantee and Management
    Yan-Wei Chen, Chi-Yu Li, Chien-Chao Tseng, Min-Zhi Hu
    IEEE Transactions on Network and Service Management (TNSM), to appear.

  4. Modeling Control Delays for Edge-enabled UAVs in Cellular Networks
    Yu-Hsuan Wu, Chi-Yu Li, Yi-Bing Lin, Kuochen Wang, Meng-Shou Wu
    IEEE Internet of Things Journal (IoT-J), to appear.

  5. MPKIX: Towards More Accountable and Secure Internet Application Services via Mobile Networked Systems
    Tian Xie, Sihan Wang, Xinyu Lei, Jingwen Shi, Guan-Hua Tu, Chi-Yu Li
    IEEE Transactions on Mobile Computing (TMC), to appear.

  6. Prioritized Traffic Shaping for Low-latency MEC Flows in MEC-enabled Cellular Networks
    Po-Hao Huang, Fu-Cheng Hsieh, Wen-Jen Hsieh, Chi-Yu Li, Ying-Dar Lin
    IEEE CCNC'22.

  7. UAV-FAP: User Fairness-Driven Access Point on UAV for Wi-Fi Networks
    Yung-Chuan Wu, Hong-Rong Chang, Meng-Shou Wu, Chi-Yu Li, Kuochen Wang
    IEEE CCNC'22.

2021

  1. Insecurity of Operational Cellular IoT Service: New Vulnerabilities, Attacks, and Countermeasures
    Sihan Wang, Guan-Hua Tu, Xinyu Lei, Tian Xie, Chi-Yu Li, Po-Yi Chou, Fucheng Hsieh, Yiwen Hu, Li Xiao, Chunyi Peng
    ACM MOBICOM'21. (Acceptance rate: 59/297 = 19.9%)

  2. Scalable Mobile Edge Computing: A Two-tier Multi-site Multi-server Architecture with Autoscaling and Offloading
    Ying-Dar Lin, Widhi Yahya, Chien-Ting Wang, Chi-Yu Li, Jeans H. Tseng
    IEEE Wireless Communications, to appear.

  3. Edge-based Realtime Image Object Detection for UAV Missions
    Meng-Shou Wu, Chi-Yu Li
    WOCC'21.

  4. Privacy Leakage and Protection of InputConnection Interface in Android
    Chi-Yu Li, Hsin-Yi Wang, Wei-Ching Wang, Chun-Ying Huang
    IEEE Transactions on Network and Service Management (TNSM), Vol. 18, Issue 3, pp. 3309-3323, September 2021.

  5. An Experience Driven Design for IEEE 802.11ac Rate Adaptation based on Reinforcement Learning
    Syuan-Cheng Chen, Chi-Yu Li, Chui-Hao Chiu
    IEEE INFOCOM'21. (Acceptance rate: 252/1266 = 19.9%)

  6. Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures
    Yiwen Hu, Sihan Wang, Guan-Hua Tu, Li Xiao, Tian Xie, Xinyu Lei, Chi-Yu Li
    ACM CODASPY'21.

  7. The Untold Secrets of WiFi-Calling Services: Vulnerabilities, Attacks, and Countermeasures
    Tian Xie, Guan-Hua Tu, Bangjie Yin, Chi-Yu Li, Chunyi Peng, Mi Zhang, Hui Liu, Xiaoming Liu
    IEEE Transactions on Mobile Computing (TMC), Vol. 20, Issue 11, pp. 3131-3147, November 2021.

  8. How Can IoT Services Pose New Security Threats in Operational Cellular Networks?
    Tian Xie, Guan-Hua Tu, Chi-Yu Li, Chunyi Peng
    IEEE Transactions on Mobile Computing (TMC), Vol. 20, Issue 8, pp. 2592-2606, August 2021.

2020

  1. Proxy-based Federated Authentication: A Transparent Third-party Solution for Cloud-Edge Federation
    Ying-Dar Lin, Duc-Tai Truong, Asad Ali, Chi-Yu Li, Yuan-Cheng Lai and Thai-Mai Thi Dinh
    IEEE Network, Vol. 34, Issue 6, pp. 220-227, November 2020.

  2. Practical Machine Learning-based Rate Adaptation Solution for Wi-Fi NICs: IEEE 802.11ac as a Case Study
    Chi-Yu Li, Syuan-Cheng Chen, Chien-Ting Kuo, Chui-Hao Chiu
    IEEE Transactions on Vehicular Technology (TVT), Vol. 69, Issue 9, pp. 10264-10277, September 2020.

  3. Transparent 3rd-Party Authentication with Application Mobility for 5G Mobile Edge Computing
    Asad Ali, Ying-Dar Lin, Chi-Yu Li, Yuan-Cheng Lai
    EuCNC'20.

  4. SecWIR: Securing Smart Home IoT Communications via Wi-Fi Routers with Embedded Intelligence
    Xinyu Lei, Guan-Hua Tu, Chi-Yu Li, Tian Xie, Mi Zhang
    ACM MOBISYS'20. (Acceptance rate: 34/175 = 19.4%)

  5. 3D On-Demand Flying Mobile Communication for Millimeter Wave Heterogeneous Networks
    Kai-Ten Feng, Li-Hsiang Shen, Chi-Yu Li, Po-Tsang Huang, Sau-Hsuan Wu, Li-Chun Wang, Yi-Bing Lin, Mau-Chung Frank Chang
    IEEE Network, Vol. 34, Issue 5, pp. 198-204, September 2020.

  6. Transparent AAA Security Design for Low-latency MEC-integrated Cellular Networks
    Chi-Yu Li, Ying-Dar Lin, Yuan-Cheng Lai, Hsu-Tung Chien, Yu-Sheng Huang, Po-Hao Huang, Hsueh-Yang Liu
    IEEE Transactions on Vehicular Technology (TVT), Vol. 69, Issue 3, pp. 3231-3243, March 2020.

  7. Ghost Calls from Operational 4G Call Systems: IMS Vulnerability, Call DoS Attack, and Countermeasure
    Yu-Han Lu, Chi-Yu Li, Yao-Yu Li, Sandy Hsin-Yu Hsiao, Tian Xie, Guan-Hua Tu, Wei-Xun Chen
    ACM MOBICOM'20. (Acceptance rate: 62/384 = 16.15%)
    MOST FutureTech Award 2021

  8. WBF-PS: WiGig Beam Fingerprinting for UAV Positioning System in GPS-denied Environments
    Pei-Yuan Hong, Chi-Yu Li, Hong-Rong Chang, YuanHao Hsueh, Kuochen Wang
    IEEE INFOCOM'20. (Acceptance rate: 268/1354 = 19.8%)

  9. Deep Reinforcement Learning Based Rate Adaptation in 802.11ac Wireless Networks
    Syuan-Cheng Chen, Chi-Yu Li, Chui-Hao Chiu, Yu-Shuo Chang
    Telecom'20.
    Best Paper Award

2019

  1. Communications and Networking Technologies for Intelligent Drone Cruisers
    Li-Chun Wang, Chuan-Chi Lai, Hong-Han Shuai, Hsin-Piao Lin, Chi-Yu Li, Teng-Hu Cheng, Chiun-Hsun Chen
    IEEE Globecom'19 Workshop on SGINs.

  2. Mobility Support for Networks on Trains Using Commercial Off-the-shelf Routers
    Sandy Hsin-Yu Hsiao, Hong-Rong Chang, Yu-Han Lu, Chi-Yu Li
    IEEE APNOMS'19 Poster

  3. A Transparent MEC Testbed for 4G/5G Cellular Networks
    Yu-Sheng Huang, Po-Hao Huang, Yu-Cheng Lai, Hsu-Tung Chien, Chi-Yu Li
    Mobile Computing Workshop'19.
    Best Demo Award, MOST FutureTech Award 2021

  4. Exploring the Insecurity of Google Account Registration Protocol via Model Checking
    Tian Xie, Sihan Wang, Guan-Hua Tu, Chi-Yu Li, Xinyu Lei
    IEEE SSCI'19.

2018

  1. Setting Malicious Flow Entries Against SDN Operations: Attacks and Countermeasures
    Cheng-Hsu Lin, Chi-Yu Li, Kuochen Wang
    IEEE DSC'18

  2. Mobile Edge Computing Platform Deployment in 4G LTE Networks: A Middlebox Approach
    Chi-Yu Li, Hsueh-Yang Liu, Po-Hao Huang, Hsu-Tung Chien, Guan-Hua Tu, Pei-Yuan Hong, Ying-Dar Lin
    USENIX HotEdge'18

  3. A Fast Converging Mechanism for Load Balancing Among SDN Multiple Controllers
    Yan-Ting Chen, Chi-Yu Li, Kuochen Wang
    IEEE ISCC'18

  4. The Dark Side of Operational Wi-Fi Calling Services
    Tian Xie, Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Jaiwei Li, Mi Zhang
    IEEE CNS'18 (Acceptance rate: 51/181 = 28.1%)
    Best Paper Award, Google Security Reward

  5. The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and Countermeasures
    Xinyu Lei, Guan-Hua Tu, Alex Liu, Chi-Yu Li, Tian Xie
    IEEE CNS'18 (Acceptance rate: 51/181 = 28.1%)

  6. How Voice Service Threatens Cellular-connected IoT Devices in the Operational 4G LTE Networks
    Tian Xie, Chi-Yu Li, Jiliang Tang, Guan-Hua Tu
    IEEE ICC'18

  7. V2PSense: Enabling Cellular-based V2P Collision Warning Service Through Mobile Sensing
    Chi-Yu Li, Giovanni Salinas, Po-Hao Huang, Guan-Hua Tu, Guo-Huang Hsu, Tien-Yuan Hsieh
    IEEE ICC'18

  8. VoWiFi系統安全弱點檢測
    呂昱翰、蕭欣語、李奇育
    107年度國防科技學術合作計畫成果發表會

2017

  1. ReSDN: A Lightweight Solution for Data-plane State Recovery in Software-defined Networks s
    Guan-Rong Chen, Chi-Yu Li, Kuochen Wang
    IEEE ICC'17

  2. Enabling Seamless WiGig/WiFi Handovers in Tri-band Wireless Systems
    Yao-Yu Li, Chi-Yu Li, Wei-Han Chen, Chia-Jui Yeh, Kuochen Wang
    IEEE ICNP'17 (Demo)

  3. VoLTE系統安全弱點檢測
    葉家睿、李奇育
    106年度國防科技學術合作計畫成果發表會

  4. 基於商用裝置支援無線IPv4網路移動的實作和效能評估
    呂昱翰、李奇育
    106年台灣網際網路研討會 (TANET)

2016

  1. New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks
    Guan-Hua Tu*, Chi-Yu Li* (*:Co-Primary), Chunyi Peng, Yuanjie Li, Songwu Lu
    ACM CCS'16 (Acceptance rate: 137/837 = 16.4%)
    Facebook Security Reward

  2. VoLTE*: A Lightweight Voice Solution to 4G LTE Networks
    Guan-Hua Tu*, Chi-Yu Li* (*:Co-Primary), Chunyi Peng, Zenwen Yuan, Yuanjie Li, Xiaohu Zhao, Songwu Lu
    ACM HotMobile'16.

  3. An Energy Efficiency Perspective on Rate Adaptation for 802.11n NIC
    Chi-Yu Li, Chunyi Peng, Peng Cheng, Songwu Lu, Xinbing Wang, Fengyuan Ren, Tao Wang
    IEEE Transactions on Mobile Computing (TMC), vol. 15, no. 6, p1333-1347, 2016.

  4. Detecting Problematic Control-Plane Protocol Interactions in Mobile Networks
    Guan-Hua Tu, Yuanjie Li, Chunyi Peng, Chi-Yu Li, Songwu Lu
    IEEE/ACM Transactions on Networking (TON), vol. 24, no. 2, p1209-1222, 2016.