Yiwen Hu

Orcid: 0000-0002-8790-5579

Affiliations:
  • University of Maryland, Baltimore County, Department of Computer Science and Electrical Engineering, Baltimore, MD, USA
  • Michigan State University, Department of Computer Science and Engineering, East Lansing, MI, USA (PhD 2025)


According to our database1, Yiwen Hu authored at least 12 papers between 2021 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
IMS is Not That Secure on Your 5G/4G Phones.
GetMobile Mob. Comput. Commun., March, 2025

2024
On the Inference of Original Graph Information from Graph Embeddings.
ACM Trans. Sens. Networks, September, 2024

Taming the Insecurity of Cellular Emergency Services (9-1-1): From Vulnerabilities to Secure Designs.
IEEE/ACM Trans. Netw., August, 2024

Dissecting Operational Cellular IoT Service Security: Attacks and Defenses.
IEEE/ACM Trans. Netw., April, 2024

Uncovering Problematic Designs Hindering Ubiquitous Cellular Emergency Services Access.
Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, 2024

2023
Unveiling the Insecurity of Operational Cellular Emergency Services (911): Vulnerabilities, Attacks, and Countermeasures.
GetMobile Mob. Comput. Commun., March, 2023

The Security in Optical Wireless Communication: A Survey.
ACM Comput. Surv., 2023

Towards Inference of Original Graph Data Information from Graph Embeddings.
Proceedings of the International Joint Conference on Neural Networks, 2023

When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
Uncovering insecure designs of cellular emergency services (911).
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

2021
Insecurity of operational cellular IoT service: new vulnerabilities, attacks, and countermeasures.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021


  Loading...