Songwu Lu
YOU?
Author Swipe
View article: Optimization of Smartphone-Based Strain Measurement Algorithm Utilizing Arc-Support Line Segments
Optimization of Smartphone-Based Strain Measurement Algorithm Utilizing Arc-Support Line Segments Open
Smartphone-based strain monitoring of structural components is an emerging approach to structural health monitoring. However, the existing techniques suffer from limited accuracy and poor cross-device adaptability. This study aims to optim…
View article: Direct Reasoning Optimization: LLMs Can Reward And Refine Their Own Reasoning for Open-Ended Tasks
Direct Reasoning Optimization: LLMs Can Reward And Refine Their Own Reasoning for Open-Ended Tasks Open
Recent advances in Large Language Models (LLMs) have showcased impressive reasoning abilities in structured tasks like mathematics and programming, largely driven by Reinforcement Learning with Verifiable Rewards (RLVR), which uses outcome…
View article: RLTHF: Targeted Human Feedback for LLM Alignment
RLTHF: Targeted Human Feedback for LLM Alignment Open
Fine-tuning large language models (LLMs) to align with user preferences is challenging due to the high cost of quality human annotations in Reinforcement Learning from Human Feedback (RLHF) and the generalizability limitations of AI Feedba…
View article: CloudEval-YAML: A Practical Benchmark for Cloud Configuration Generation
CloudEval-YAML: A Practical Benchmark for Cloud Configuration Generation Open
Among the thriving ecosystem of cloud computing and the proliferation of Large Language Model (LLM)-based code generation tools, there is a lack of benchmarking for code generation in cloud-native applications. In response to this need, we…
View article: Sign-to-911: Emergency Call Service for Sign Language Users with Assistive AR Glasses
Sign-to-911: Emergency Call Service for Sign Language Users with Assistive AR Glasses Open
Sign-to-911 offers a compact mobile system solution to fast and runtime American Sign Language (ASL) and English translations. It is designated as 911 call services for ASL users with hearing disabilities upon emergencies. It enables bidir…
View article: CA++: Enhancing Carrier Aggregation Beyond 5G
CA++: Enhancing Carrier Aggregation Beyond 5G Open
Carrier aggregation (CA) is an important component technology in 5G and beyond. It aggregates multiple spectrum fragments to serve a mobile device. However, the current CA suffers under both high mobility and increased spectrum space. The …
View article: Dependent Misconfigurations in 5G/4.5G Radio Resource Control
Dependent Misconfigurations in 5G/4.5G Radio Resource Control Open
In this paper, we study an important, yet unexplored problem of configuration dependencies in 5G/4.5G radio resource control (RRC). Different from the previous studies in 3G/4G networks, 5G/4.5G allows more than one cells to serve a mobile…
View article: SEED
SEED Open
Failures in 5G mobile networks are becoming the norm with the ongoing global rollout. If left unattended, they affect mobile user experiences and the proper functioning of applications. In this work, we describe SEED, which offers a novel …
View article: Breaking Cellular IoT with Forged Data-plane Signaling: Attacks and Countermeasure
Breaking Cellular IoT with Forged Data-plane Signaling: Attacks and Countermeasure Open
We devise new attacks exploiting the unprotected data-plane signaling in cellular IoT networks (a.k.a. both NB-IoT and Cat-M). We show that, despite the deployed security mechanisms on both control-plane signaling and data-plane packet for…
View article: On Key Reinstallation Attacks over 4G LTE Control-Plane: Feasibility and Negative Impact
On Key Reinstallation Attacks over 4G LTE Control-Plane: Feasibility and Negative Impact Open
research-article Open Access Share on On Key Reinstallation Attacks over 4G LTE Control-Plane: Feasibility and Negative Impact Authors: Muhammad Taqi Raza The University of Arizona, United States of America The University of Arizona, Unite…
View article: Data-plane signaling in cellular IoT
Data-plane signaling in cellular IoT Open
In this paper, we devise new attacks exploiting the unprotected data-plane signaling in cellular IoT networks (aka both NB-IoT and Cat-M). We show that, despite the deployed security mechanisms on both control-plane signaling and data-plan…
View article: SecureSIM
SecureSIM Open
The SIM/eSIM card stores critical information for a mobile user to access the 4G/5G network. In this work, we uncover three vulnerabilities of the current SIM practice. We show that the PIN-based access control may expose the in-SIM data t…
View article: Experience
Experience Open
This paper reports our five-year lessons of developing and using MobileInsight, an open-source community tool to enable software-defined full-stack, runtime mobile network analytics inside our phones. We present how MobileInsight evolves f…
View article: Resolving Policy Conflicts in Multi-Carrier Cellular Access
Resolving Policy Conflicts in Multi-Carrier Cellular Access Open
Multi-carrier cellular access dynamically selects a preferred wireless carrier by leveraging the availability and diversity of multiple carrier networks at a location. It offers an alternative to the dominant single-carrier paradigm, and s…
View article: Supporting Mobile VR in LTE Networks
Supporting Mobile VR in LTE Networks Open
In recent years, we have witnessed a boom in virtual reality (VR). 21 million wearable VR headsets are projected to be shipped in 2017, resulting in $4.9 billion revenue [3]. Among all the options, the mobile VR empowered by phones is most…
View article: Supporting Mobile VR in LTE Networks
Supporting Mobile VR in LTE Networks Open
In recent years, we have witnessed a boom in virtual reality (VR). 21 million wearable VR headsets are projected to be shipped in 2017, resulting in $4.9 billion revenue [3]. Among all the options, the mobile VR empowered by phones is most…
View article: Special focus on machine-type communications
Special focus on machine-type communications Open
View article: A First Look at Unstable Mobility Management in Cellular Networks
A First Look at Unstable Mobility Management in Cellular Networks Open
Mobility management is a prominent feature in cellular networks. In this paper, we examine the (in)stability of mobility management. We disclose that handoff may never converge in some real-world cases. We focus on persistent handoff oscil…
View article: New Threats to SMS-Assisted Mobile Internet Services from 4G LTE Networks.
New Threats to SMS-Assisted Mobile Internet Services from 4G LTE Networks. Open
View article: New Threats to SMS-Assisted Mobile Internet Services from 4G LTE: Lessons Learnt from Distributed Mobile-Initiated Attacks towards Facebook and Other Services
New Threats to SMS-Assisted Mobile Internet Services from 4G LTE: Lessons Learnt from Distributed Mobile-Initiated Attacks towards Facebook and Other Services Open
Mobile Internet is becoming the norm. With more personalized mobile devices in hand, many services choose to offer alternative, usually more convenient, approaches to authenticating and delivering the content between mobile users and servi…
View article: iCellular: Define Your Own Cellular Network Access on Commodity Smartphones
iCellular: Define Your Own Cellular Network Access on Commodity Smartphones Open
Leveraging multi-carrier access offers a promising approach to boosting access quality in mobile networks. However, our experiments show that the potential benefits are hard to fulfill due to fundamental limitations in the network-controll…