Cited By
View all- Chen YYao YWang XXu DYue CLiu XChen KTang HLiu B(2021)Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis2021 IEEE Symposium on Security and Privacy (SP)10.1109/SP40001.2021.00104(1197-1214)Online publication date: May-2021
- Jagannath AJagannath JDrozd A(2020)High Rate-Reliability Beamformer Design for 2×2 Mimo-OFDM System Under Hostile Jamming2020 29th International Conference on Computer Communications and Networks (ICCCN)10.1109/ICCCN49398.2020.9209635(1-9)Online publication date: Aug-2020
- Hu XLiu CLiu SYou WLi YZhao Y(2019)A Systematic Analysis Method for 5G Non-Access Stratum Signalling SecurityIEEE Access10.1109/ACCESS.2019.29379977(125424-125441)Online publication date: 2019
- Show More Cited By