Xianghang Mi

Orcid: 0000-0002-8747-5601

According to our database1, Xianghang Mi authored at least 26 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

2016
2017
2018
2019
2020
2021
2022
2023
2024
0
1
2
3
4
5
6
7
8
9
10
7
1
1
1
2
2
2
1
4
1
3
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Shining Light into the Tunnel: Understanding and Classifying Network Traffic of Residential Proxies.
CoRR, 2024

An Empirical Study of Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks.
CoRR, 2024

SpamDam: Towards Privacy-Preserving and Adversary-Resistant SMS Spam Detection.
CoRR, 2024

Illicit Promotion on Twitter.
CoRR, 2024

Reflected Search Poisoning for Illicit Promotion.
CoRR, 2024

Enabling Privacy-Preserving Cyber Threat Detection with Federated Learning.
CoRR, 2024

Port Forwarding Services Are Forwarding Security Risks.
CoRR, 2024

Stealthy Peers: Understanding Security and Privacy Risks of Peer-Assisted Video Streaming.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

Command Hijacking on Voice-Controlled IoT in Amazon Alexa Platform.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
An Empirical Study of Storj DCS: Ecosystem, Performance, and Security.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023

Demystifying Decentralized Matrix Communication Network: Ecosystem and Security.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

2022
Stealthy Peers: Understanding Security Risks of WebRTC-Based Peer-Assisted Video Streaming.
CoRR, 2022

An Extensive Study of Residential Proxies in China.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2019
Understanding iOS-based Crowdturfing Through Hidden UI Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019

Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Resident Evil: Understanding Residential IP Proxy as a Dark Service.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home.
CoRR, 2018

Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be.
CoRR, 2017

Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment.
Proceedings of the 26th USENIX Security Symposium, 2017

Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

An empirical characterization of IFTTT: ecosystem, usage, and performance.
Proceedings of the 2017 Internet Measurement Conference, 2017

2016
SMig: Stream Migration Extension for HTTP/2.
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, 2016


  Loading...