Scott Xianghang Mi
Scott Xianghang Mi
Verified email at iu.edu - Homepage
TitleCited byYear
Understanding iot security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
272017
An empirical characterization of IFTTT: ecosystem, usage, and performance
X Mi, F Qian, Y Zhang, XF Wang
Proceedings of the 2017 Internet Measurement Conference, 398-404, 2017
252017
Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service provider networks
S Alrwais, X Liao, X Mi, P Wang, XF Wang, F Qian, R Beyah, D McCoy
2017 IEEE Symposium on Security and Privacy (SP), 805-823, 2017
182017
Understanding and mitigating the security risks of voice-controlled third-party skills on amazon alexa and google home
N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian
arXiv preprint arXiv:1805.01525, 2018
142018
Smig: Stream migration extension for http/2
X Mi, F Qian, X Wang
Proceedings of the 12th International on Conference on emerging Networking …, 2016
102016
Picking up my tab: Understanding and mitigating synchronized token lifting and spending in mobile payment
X Bai, Z Zhou, XF Wang, Z Li, X Mi, N Zhang, T Li, SM Hu, K Zhang
26th {USENIX} Security Symposium ({USENIX} Security 17), 593-608, 2017
82017
Resident Evil: Understanding Residential IP Proxy as a Dark Service
X Mi, X Feng, X Liao, B Liu, XF Wang, F Qian, Z Li, S Alrwais, ...
IEEE Symposium on Security and Privacy 2019, 2018
72018
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems
N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian
IEEE Symposium on Security and Privacy 2019, 2018
42018
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations
P Wang, X Mi, X Liao, XF Wang, K Yuan, F Qian, R Beyah
NDSS, 2018
22018
基于安卓的智能储物柜控制平台设计
魏天骐, 罗庆生, 王勇, 糜相行
机械与电子, 28-31, 2013
22013
Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs.
E Alowaisheq, P Wang, SA Alrwais, X Liao, XF Wang, T Alowaisheq, X Mi, ...
NDSS, 2019
12019
Understanding iOS-based Crowdturfing Through Hidden {UI} Analysis
Y Lee, X Wang, K Lee, X Liao, XF Wang, T Li, X Mi
28th {USENIX} Security Symposium ({USENIX} Security 19), 765-781, 2019
2019
Design of Control System Based on Android for the Indoor Height Space Items Storage and Intelligent Management System [J]
T WEI, Q LUO, Y WANG, X MI
Machinery & Electronics 3, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–13