Xianghang Mi
Xianghang Mi
Assistant Professor, SUNY Buffalo
Verified email at buffalo.edu - Homepage
Cited by
Cited by
An empirical characterization of IFTTT: ecosystem, usage, and performance
X Mi, F Qian, Y Zhang, XF Wang
Proceedings of the 2017 Internet Measurement Conference, 398-404, 2017
Understanding IoT security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
Understanding and mitigating the security risks of voice-controlled third-party skills on amazon alexa and google home
N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian
arXiv preprint arXiv:1805.01525, 2018
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems
N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian
IEEE Symposium on Security and Privacy 2019, 2018
Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service provider networks
S Alrwais, X Liao, X Mi, P Wang, XF Wang, F Qian, R Beyah, D McCoy
2017 IEEE Symposium on Security and Privacy (SP), 805-823, 2017
Resident Evil: Understanding Residential IP Proxy as a Dark Service
X Mi, X Feng, X Liao, B Liu, XF Wang, F Qian, Z Li, S Alrwais, ...
IEEE Symposium on Security and Privacy 2019, 2018
Picking up my tab: Understanding and mitigating synchronized token lifting and spending in mobile payment
X Bai, Z Zhou, XF Wang, Z Li, X Mi, N Zhang, T Li, SM Hu, K Zhang
26th {USENIX} Security Symposium ({USENIX} Security 17), 593-608, 2017
Smig: Stream migration extension for http/2
X Mi, F Qian, X Wang
Proceedings of the 12th International on Conference on emerging Networking …, 2016
Cracking Wall of Confinement: Understanding and Analyzing Malicious Domain Takedowns
E Alowaisheq
The Network and Distributed System Security Symposium (NDSS), 2019
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations
P Wang, X Mi, X Liao, XF Wang, K Yuan, F Qian, R Beyah
NDSS, 2018
Understanding iOS-based Crowdturfing Through Hidden {UI} Analysis
Y Lee, X Wang, K Lee, X Liao, XF Wang, T Li, X Mi
28th {USENIX} Security Symposium ({USENIX} Security 19), 765-781, 2019
Characterizing Emerging Cybersecurity Threats: An Ecosystem Approach
X Mi
PQDT-UK & Ireland, 2020
Demystifying Resource Management Risks in Emerging Mobile App-in-App Ecosystems
H Lu, L Xing, Y Xiao, Y Zhang, X Liao, XF Wang, X Wang, Y Lee, ...
The system can't perform the operation now. Try again later.
Articles 1–13