Xianghang (Scott) Mi
Xianghang (Scott) Mi
About
Publications
Courses
Data & Tools
Students
Experience
CV
Light
Dark
Automatic
XiaoFeng Wang
Latest
Stealthy Peers: Understanding Security and Privacy Risks of Peer-Assisted Video Streaming
Shining Light into the Tunnel: Understanding and Classifying Network Traffic of Residential Proxies
Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam
Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks
Understanding iOS-based Crowdturfing Through Hidden UI Analysis
Resident Evil: Understanding Residential IP Proxy as a Dark Service
Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems
Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations
An Empirical Characterization of IFTTT: Ecosystem, Usage, and Performance
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment
Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service pr ovider networks
Understanding iot security through the data crystal ball: Where we are now and where we are going to be
SMig: Stream Migration Extension For HTTP/2
Cite
×