Xianghang Mi
Cytowane przez
Cytowane przez
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems
N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian
IEEE Symposium on Security and Privacy 2019, 2018
An empirical characterization of IFTTT: ecosystem, usage, and performance
X Mi, F Qian, Y Zhang, XF Wang
Proceedings of the 2017 Internet Measurement Conference, 398-404, 2017
Resident Evil: Understanding Residential IP Proxy as a Dark Service
X Mi, X Feng, X Liao, B Liu, XF Wang, F Qian, Z Li, S Alrwais, ...
IEEE Symposium on Security and Privacy 2019, 2018
Understanding IoT security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service provider networks
S Alrwais, X Liao, X Mi, P Wang, XF Wang, F Qian, R Beyah, D McCoy
2017 IEEE Symposium on Security and Privacy (SP), 805-823, 2017
Cracking wall of confinement: Understanding and analyzing malicious domain takedowns
E Alowaisheq
The Network and Distributed System Security Symposium (NDSS), 2019
Picking up my tab: Understanding and mitigating synchronized token lifting and spending in mobile payment
X Bai, Z Zhou, XF Wang, Z Li, X Mi, N Zhang, T Li, SM Hu, K Zhang
26th USENIX Security Symposium (USENIX Security 17), 593-608, 2017
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations
P Wang, X Mi, X Liao, XF Wang, K Yuan, F Qian, R Beyah
NDSS, 2018
Clues in tweets: Twitter-guided discovery and analysis of SMS spam
S Tang, X Mi, Y Li, XF Wang, K Chen
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
Smig: Stream migration extension for http/2
X Mi, F Qian, X Wang
Proceedings of the 12th International on Conference on emerging Networking …, 2016
Your phone is my proxy: Detecting and understanding mobile proxy networks
X Mi, S Tang, Z Li, X Liao, F Qian, XF Wang
Proceeding of ISOC Network and Distributed System Security Symposium (NDSS …, 2021
Understanding {iOS-based} Crowdturfing Through Hidden {UI} Analysis
Y Lee, X Wang, K Lee, X Liao, XF Wang, T Li, X Mi
28th USENIX Security Symposium (USENIX Security 19), 765-781, 2019
An extensive study of residential proxies in China
M Yang, Y Yu, X Mi, S Tang, S Guo, Y Li, X Zheng, H Duan
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
An empirical study of storj dcs: Ecosystem, performance, and security
H Li, X Mi, Y Dou, S Guo
2023 IEEE/ACM 31st International Symposium on Quality of Service (IWQoS), 1-10, 2023
魏天骐, 罗庆生, 王勇, 糜相行
机械与电子, 28-31, 2013
Characterizing Emerging Cybersecurity Threats: An Ecosystem Approach
X Mi
Indiana University, 2020
Shining Light into the Tunnel: Understanding and Classifying Network Traffic of Residential Proxies
R Huang, D Zhao, X Mi, X Wang
arXiv preprint arXiv:2404.10610, 2024
SpamDam: Towards Privacy-Preserving and Adversary-Resistant SMS Spam Detection
Y Li, R Zhang, W Rong, X Mi
arXiv preprint arXiv:2404.09481, 2024
An Empirical Study of Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks
Y Bi, M Yang, Y Fang, X Mi, S Guo, S Tang, H Duan
arXiv preprint arXiv:2404.09681, 2024
Illicit Promotion on Twitter
H Wang, Y Li, R Huang, X Mi
arXiv preprint arXiv:2404.07797, 2024
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20