Follow
Xianghang Mi
Xianghang Mi
Other namesScott Mi
Verified email at ustc.edu.cn - Homepage
Title
Cited by
Cited by
Year
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems
N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian
IEEE Symposium on Security and Privacy 2019, 2018
314*2018
An empirical characterization of IFTTT: ecosystem, usage, and performance
X Mi, F Qian, Y Zhang, XF Wang
Proceedings of the 2017 Internet Measurement Conference, 398-404, 2017
1772017
Resident Evil: Understanding Residential IP Proxy as a Dark Service
X Mi, X Feng, X Liao, B Liu, XF Wang, F Qian, Z Li, S Alrwais, ...
IEEE Symposium on Security and Privacy 2019, 2018
972018
Understanding iot security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
832017
Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service provider networks
S Alrwais, X Liao, X Mi, P Wang, XF Wang, F Qian, R Beyah, D McCoy
2017 IEEE Symposium on Security and Privacy (SP), 805-823, 2017
592017
Cracking wall of confinement: Understanding and analyzing malicious domain takedowns
E Alowaisheq
The Network and Distributed System Security Symposium (NDSS), 2019
482019
Picking up my tab: Understanding and mitigating synchronized token lifting and spending in mobile payment
X Bai, Z Zhou, XF Wang, Z Li, X Mi, N Zhang, T Li, SM Hu, K Zhang
26th USENIX Security Symposium (USENIX Security 17), 593-608, 2017
392017
Clues in tweets: Twitter-guided discovery and analysis of SMS spam
S Tang, X Mi, Y Li, XF Wang, K Chen
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
262022
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations
P Wang, X Mi, X Liao, XF Wang, K Yuan, F Qian, R Beyah
NDSS, 2018
232018
Understanding {iOS-based} Crowdturfing Through Hidden {UI} Analysis
Y Lee, X Wang, K Lee, X Liao, XF Wang, T Li, X Mi
28th USENIX Security Symposium (USENIX Security 19), 765-781, 2019
162019
Smig: Stream migration extension for http/2
X Mi, F Qian, X Wang
Proceedings of the 12th International on Conference on emerging Networking …, 2016
162016
Your phone is my proxy: Detecting and understanding mobile proxy networks
X Mi, S Tang, Z Li, X Liao, F Qian, XF Wang
Proceeding of ISOC Network and Distributed System Security Symposium (NDSS …, 2021
152021
An extensive study of residential proxies in China
M Yang, Y Yu, X Mi, S Tang, S Guo, Y Li, X Zheng, H Duan
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
102022
An empirical study of storj dcs: Ecosystem, performance, and security
H Li, X Mi, Y Dou, S Guo
2023 IEEE/ACM 31st International Symposium on Quality of Service (IWQoS), 1-10, 2023
22023
基于安卓的智能储物柜控制平台设计
魏天骐, 罗庆生, 王勇, 糜相行
机械与电子, 28-31, 2013
22013
Enabling Privacy-Preserving Cyber Threat Detection with Federated Learning
Y Bi, Y Li, X Feng, X Mi
arXiv preprint arXiv:2404.05130, 2024
12024
Port Forwarding Services Are Forwarding Security Risks
H Wang, Y Xue, X Feng, C Zhou, X Mi
arXiv preprint arXiv:2403.16060, 2024
12024
Characterizing Emerging Cybersecurity Threats: An Ecosystem Approach
X Mi
Indiana University, 2020
12020
Hijacking Connected Vehicle Alexa Skills
W Ding, L Cheng, X Mi, Z Zhao, H Hu
1
Command Hijacking on Voice-Controlled IoT in Amazon Alexa Platform
W Ding, S Liao, L Cheng, X Mi, Z Zhao, H Hu
Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20