Xianghang (Scott) Mi
Xianghang (Scott) Mi
About
Publications
Courses
Data & Tools
Students
Experience
CV
Light
Dark
Automatic
Xianghang Mi
Latest
Dissecting Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks
Command Hijacking on Voice-Controlled IoT in Amazon Alexa Platform
Stealthy Peers: Understanding Security and Privacy Risks of Peer-Assisted Video Streaming
Shining Light into the Tunnel: Understanding and Classifying Network Traffic of Residential Proxies
Port Forwarding Services Are Forwarding Security Risks
Reflected Search Poisoning for Illicit Promotion
Illicit Promotion on Twitter
Enabling Privacy-Preserving Cyber Threat Detection with Federated Learning
SpamDam: Towards Privacy-Preserving and Adversary-Resistant SMS Spam Detection
An Empirical Study of Storj DCS: Ecosystem, Performance, and Security
An Extensive Study of Residential Proxies in China
Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam
Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks
Understanding iOS-based Crowdturfing Through Hidden UI Analysis
Resident Evil: Understanding Residential IP Proxy as a Dark Service
Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems
Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations
An Empirical Characterization of IFTTT: Ecosystem, Usage, and Performance
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment
Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service pr ovider networks
Understanding iot security through the data crystal ball: Where we are now and where we are going to be
SMig: Stream Migration Extension For HTTP/2
Cite
×