Xianghang Mi
Orcid: 0000-0002-8747-5601
According to our database1,
Xianghang Mi
authored at least 26 papers
between 2016 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2016
2017
2018
2019
2020
2021
2022
2023
2024
0
1
2
3
4
5
6
7
8
9
10
7
1
1
1
2
2
2
1
4
1
3
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Shining Light into the Tunnel: Understanding and Classifying Network Traffic of Residential Proxies.
CoRR, 2024
An Empirical Study of Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Stealthy Peers: Understanding Security and Privacy Risks of Peer-Assisted Video Streaming.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
2022
Stealthy Peers: Understanding Security Risks of WebRTC-Based Peer-Assisted Video Streaming.
CoRR, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
2019
Proceedings of the 28th USENIX Security Symposium, 2019
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
2018
Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home.
CoRR, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
2017
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be.
CoRR, 2017
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment.
Proceedings of the 26th USENIX Security Symposium, 2017
Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 2017 Internet Measurement Conference, 2017
2016
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, 2016