Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accounting for roaming users on mobile data access: issues and root causes., , , , , , and . MobiSys, page 305-318. ACM, (2013)Control-plane protocol interactions in cellular networks., , , , , and . SIGCOMM, page 223-234. ACM, (2014)Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data Charging., , , , and . ACM Conference on Computer and Communications Security, page 727-738. ACM, (2014)Insecurity of Voice Solution VoLTE in LTE Mobile Networks., , , , , , and . ACM Conference on Computer and Communications Security, page 316-327. ACM, (2015)Mobile data charging: new attacks and countermeasures., , , , and . ACM Conference on Computer and Communications Security, page 195-204. ACM, (2012)New Threats to SMS-Assisted Mobile Internet Services from 4G LTE Networks., , , , , , and . CoRR, (2015)Mobile Edge Computing Platform Deployment in 4G LTE Networks: A Middlebox Approach., , , , , , and . HotEdge, USENIX Association, (2018)How voice call technology poses security threats in 4G LTE networks., , , and . CNS, page 442-450. IEEE, (2015)VoLTE*: A Lightweight Voice Solution to 4G LTE Networks., , , , , , and . HotMobile, page 3-8. ACM, (2016)Can we pay for what we get in 3G data access?, , , and . MobiCom, page 113-124. ACM, (2012)