Xianghang (Scott) Mi
Xianghang (Scott) Mi
About
Publications
Courses
Data & Tools
Students
Experience
CV
Light
Dark
Automatic
Xianghang Mi
Latest
Port Forwarding Services Are Forwarding Security Risks
Detecting and Understanding the Promotion of Illicit Goods and Services on Twitter
Dissecting Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks
Command Hijacking on Voice-Controlled IoT in Amazon Alexa Platform
Stealthy Peers: Understanding Security and Privacy Risks of Peer-Assisted Video Streaming
Shining Light into the Tunnel: Understanding and Classifying Network Traffic of Residential Proxies
Reflected Search Poisoning for Illicit Promotion
Enabling Privacy-Preserving Cyber Threat Detection with Federated Learning
SpamDam: Towards Privacy-Preserving and Adversary-Resistant SMS Spam Detection
An Empirical Study of Storj DCS: Ecosystem, Performance, and Security
An Extensive Study of Residential Proxies in China
Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam
Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks
Understanding iOS-based Crowdturfing Through Hidden UI Analysis
Resident Evil: Understanding Residential IP Proxy as a Dark Service
Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems
Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations
An Empirical Characterization of IFTTT: Ecosystem, Usage, and Performance
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment
Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service pr ovider networks
Understanding iot security through the data crystal ball: Where we are now and where we are going to be
SMig: Stream Migration Extension For HTTP/2
Cite
×