Xianghang Mi

Orcid: 0000-0002-8747-5601

According to our database1, Xianghang Mi authored at least 28 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Detecting and Understanding the Promotion of Illicit Goods and Services on Twitter.
Proceedings of the ACM on Web Conference 2025, 2025

Port Forwarding Services Are Forwarding Security Risks.
Proceedings of the 10th IEEE European Symposium on Security and Privacy, 2025

2024
Shining Light into the Tunnel: Understanding and Classifying Network Traffic of Residential Proxies.
CoRR, 2024

An Empirical Study of Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks.
CoRR, 2024

SpamDam: Towards Privacy-Preserving and Adversary-Resistant SMS Spam Detection.
CoRR, 2024

Illicit Promotion on Twitter.
CoRR, 2024

Reflected Search Poisoning for Illicit Promotion.
CoRR, 2024

Enabling Privacy-Preserving Cyber Threat Detection with Federated Learning.
CoRR, 2024

Stealthy Peers: Understanding Security and Privacy Risks of Peer-Assisted Video Streaming.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

Command Hijacking on Voice-Controlled IoT in Amazon Alexa Platform.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

Dissecting Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks.
Proceedings of the Annual Computer Security Applications Conference, 2024

2023
An Empirical Study of Storj DCS: Ecosystem, Performance, and Security.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023

Demystifying Decentralized Matrix Communication Network: Ecosystem and Security.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

2022
Stealthy Peers: Understanding Security Risks of WebRTC-Based Peer-Assisted Video Streaming.
CoRR, 2022

An Extensive Study of Residential Proxies in China.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2019
Understanding iOS-based Crowdturfing Through Hidden UI Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019

Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Resident Evil: Understanding Residential IP Proxy as a Dark Service.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home.
CoRR, 2018

Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be.
CoRR, 2017

Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment.
Proceedings of the 26th USENIX Security Symposium, 2017

Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

An empirical characterization of IFTTT: ecosystem, usage, and performance.
Proceedings of the 2017 Internet Measurement Conference, 2017

2016
SMig: Stream Migration Extension for HTTP/2.
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, 2016


  Loading...