default search action
Tian Xie 0001
Person information
- affiliation: Utah State University, Logan, UT, USA
- affiliation (Ph.D.): Michigan State University, East Lansing, ME, USA
Other persons with the same name
- Tian Xie — disambiguation page
- Tian Xie 0002 — Microsoft Research AI for Science
- Tian Xie 0003 — Meta AI
- Tian Xie 0004 — Pennsylvania State University, University Park, PA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Sihan Wang, Tian Xie, Min-Yue Chen, Guan-Hua Tu, Chi-Yu Li, Xinyu Lei, Po-Yi Chou, Fu-Cheng Hsieh, Yiwen Hu, Li Xiao, Chunyi Peng:
Dissecting Operational Cellular IoT Service Security: Attacks and Defenses. IEEE/ACM Trans. Netw. 32(2): 1229-1244 (2024) - [j7]Min-Yue Chen, Yiwen Hu, Guan-Hua Tu, Chi-Yu Li, Sihan Wang, Jingwen Shi, Tian Xie, Ren-Chieh Hsu, Li Xiao, Chunyi Peng, Zhaowei Tan, Songwu Lu:
Taming the Insecurity of Cellular Emergency Services (9-1-1): From Vulnerabilities to Secure Designs. IEEE/ACM Trans. Netw. 32(4): 3076-3091 (2024) - [c16]Jingwen Shi, Sihan Wang, Min-Yue Chen, Guan-Hua Tu, Tian Xie, Man-Hsin Chen, Yiwen Hu, Chi-Yu Li, Chunyi Peng:
IMS is Not That Secure on Your 5G/4G Phones. MobiCom 2024: 513-527 - [c15]Yiwen Hu, Min-Yue Chen, Haitian Yan, Chuan-Yi Cheng, Guan-Hua Tu, Chi-Yu Li, Tian Xie, Chunyi Peng, Li Xiao, Jiliang Tang:
Uncovering Problematic Designs Hindering Ubiquitous Cellular Emergency Services Access. MobiCom 2024: 1455-1469 - 2023
- [j6]Yiwen Hu, Min-Yue Chen, Guan-Hua Tu, Chi-Yu Li, Sihan Wang, Jingwen Shi, Tian Xie, Li Xiao, Chunyi Peng, Zhaowei Tan, Songwu Lu:
Unveiling the Insecurity of Operational Cellular Emergency Services (911): Vulnerabilities, Attacks, and Countermeasures. GetMobile Mob. Comput. Commun. 27(1): 39-43 (2023) - [j5]Tian Xie, Sihan Wang, Xinyu Lei, Jingwen Shi, Guan-Hua Tu, Chi-Yu Li:
MPKIX: Towards More Accountable and Secure Internet Application Services via Mobile Networked Systems. IEEE Trans. Mob. Comput. 22(6): 3489-3507 (2023) - [j4]Yu-Han Lu, Sandy Hsin-Yu Hsiao, Chi-Yu Li, Yi-Chen Hsieh, Po-Yi Chou, Yao-Yu Li, Tian Xie, Guan-Hua Tu:
Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures. IEEE/ACM Trans. Netw. 31(2): 800-815 (2023) - [c14]Jingwen Shi, Tian Xie, Guan-Hua Tu, Chunyi Peng, Chi-Yu Li, Andrew Z. Hou, Sihan Wang, Yiwen Hu, Xinyu Lei, Min-Yue Chen, Li Xiao, Xiaoming Liu:
When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities. CNS 2023: 1-9 - 2022
- [c13]Yiwen Hu, Min-Yue Chen, Guan-Hua Tu, Chi-Yu Li, Sihan Wang, Jingwen Shi, Tian Xie, Li Xiao, Chunyi Peng, Zhaowei Tan, Songwu Lu:
Uncovering insecure designs of cellular emergency services (911). MobiCom 2022: 703-715 - 2021
- [j3]Tian Xie, Guan-Hua Tu, Chi-Yu Li, Chunyi Peng:
How Can IoT Services Pose New Security Threats In Operational Cellular Networks? IEEE Trans. Mob. Comput. 20(8): 2592-2606 (2021) - [j2]Tian Xie, Guan-Hua Tu, Bangjie Yin, Chi-Yu Li, Chunyi Peng, Mi Zhang, Hui Liu, Xiaoming Liu:
The Untold Secrets of WiFi-Calling Services: Vulnerabilities, Attacks, and Countermeasures. IEEE Trans. Mob. Comput. 20(11): 3131-3147 (2021) - [c12]Xinyu Lei, Guan-Hua Tu, Tian Xie, Sihan Wang:
BFastPay: A Routing-free Protocol for Fast Payment in Bitcoin Network. CODASPY 2021: 77-87 - [c11]Yiwen Hu, Sihan Wang, Guan-Hua Tu, Li Xiao, Tian Xie, Xinyu Lei, Chi-Yu Li:
Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures. CODASPY 2021: 89-100 - [c10]Sihan Wang, Guan-Hua Tu, Xinyu Lei, Tian Xie, Chi-Yu Li, Po-Yi Chou, Fu-Cheng Hsieh, Yiwen Hu, Li Xiao, Chunyi Peng:
Insecurity of operational cellular IoT service: new vulnerabilities, attacks, and countermeasures. MobiCom 2021: 437-450 - 2020
- [c9]Xinyu Lei, Guan-Hua Tu, Alex X. Liu, Tian Xie:
Fast and Secure kNN Query Processing in Cloud Computing. CNS 2020: 1-9 - [c8]Xinyu Lei, Tian Xie, Guan-Hua Tu, Alex X. Liu:
An Inter-blockchain Escrow Approach for Fast Bitcoin Payment. ICDCS 2020: 1201-1202 - [c7]Yu-Han Lu, Chi-Yu Li, Yao-Yu Li, Sandy Hsin-Yu Hsiao, Tian Xie, Guan-Hua Tu, Wei-Xun Chen:
Ghost calls from operational 4G call systems: IMS vulnerability, call DoS attack, and countermeasure. MobiCom 2020: 8:1-8:14 - [c6]Xinyu Lei, Guan-Hua Tu, Chi-Yu Li, Tian Xie, Mi Zhang:
SecWIR: securing smart home IoT communications via wi-fi routers with embedded intelligence. MobiSys 2020: 260-272
2010 – 2019
- 2019
- [c5]Tian Xie, Sihan Wang, Guan-Hua Tu, Chi-Yu Li, Xinyu Lei:
Exploring the Insecurity of Google Account Registration Protocol via Model Checking. SSCI 2019: 3087-3096 - 2018
- [c4]Xinyu Lei, Guan-Hua Tu, Alex X. Liu, Chi-Yu Li, Tian Xie:
The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and Countermeasures. CNS 2018: 1-9 - [c3]Tian Xie, Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Jiawei Li, Mi Zhang:
The Dark Side of Operational Wi-Fi Calling Services. CNS 2018: 1 - [c2]Tian Xie, Chi-Yu Li, Jiliang Tang, Guan-Hua Tu:
How Voice Service Threatens Cellular-Connected IoT Devices in the Operational 4G LTE Networks. ICC 2018: 1-6 - [i2]Tian Xie, Guan-Hua Tu, Bangjie Yin, Chi-Yu Li, Chunyi Peng, Mi Zhang, Hui Liu, Xiaoming Liu:
The Untold Secrets of Operational Wi-Fi Calling Services: Vulnerabilities, Attacks, and Countermeasures. CoRR abs/1811.11274 (2018) - 2017
- [c1]Tian Xie, Xiao-Peng Bi, Rui Luo, Fan Bin, Zhe Wang, Wen Li:
Optical propagation of blue LED light in brain tissue and Parylene-C. NEMS 2017: 599-602 - [i1]Xinyu Lei, Guan-Hua Tu, Alex X. Liu, Chi-Yu Li, Tian Xie:
The Insecurity of Home Digital Voice Assistants - Amazon Alexa as a Case Study. CoRR abs/1712.03327 (2017) - 2016
- [j1]Xiao-Peng Bi, Tian Xie, Bin Fan, Wasif Khan, Yue Guo, Wen Li:
A Flexible, Micro-Lens-Coupled LED Stimulator for Optical Neuromodulation. IEEE Trans. Biomed. Circuits Syst. 10(5): 972-978 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-15 21:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint