Publications

Summary: My research has led to datasets and tools released to the public, along with tens of publications in well-recognized security venues, e.g., IEEE Security & Privacy, USENIX Security, CCS, NDSS, IMC, CoNEXT, DSN, ACSAC, AsiaCCS, etc. Most publications can be grouped by the following research topics:

The security of AI agents (e.g., voice assistants): [IMC'17] [SP'19-b] [AsiaCCS'24] [WWW'26]

Residential proxies, reverse proxies, and anonymity: [SP'19-a] [NDSS'21] [CCS'22-a] [arXiv'24-a] [EuroSP'25] [IFIPSEC'26].

The security of decentralized network infrastructures: [IWQoS'23] [DSN'24] [ACSAC'24] [ACISP'26]

Detection and measurement of online abuse and cybercrime: [SP'17] [NDSS'18] [NDSS'19] [Security'19] [CCS'22-b] [WWW'25]

Notation: * indicates co-first author; † indicates corresponding author.

[WWW'26] ICL-EVADER: Zero-Query Black-Box Evasion Attacks on In-Context Learning and Their Defenses ⭐ Highlight
[ACISP'26] Okara: Detection and Attribution of TLS Man-in-the-Middle Vulnerabilities in Android Apps with Foundation Models Recent
[IFIPSEC'26] Pepper: High-bandwidth and Scalable Anonymous Broadcast with Cryptographic Privacy Recent
[EuroSP'25] Port Forwarding Services Are Forwarding Security Risks
[WWW'25] Detecting and Understanding the Promotion of Illicit Goods and Services on Twitter
[ACSAC'24] Dissecting Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks
[AsiaCCS'24] Command Hijacking on Voice-Controlled IoT in Amazon Alexa Platform
[DSN'24] Stealthy Peers: Understanding Security and Privacy Risks of Peer-Assisted Video Streaming
[IWQoS'23] An Empirical Study of Storj DCS: Ecosystem, Performance, and Security
[CCS'22-a] An Extensive Study of Residential Proxies in China
[CCS'22-b] Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam