מאמרים עם הרשאות לגישה ציבורית - Xianghang Miלמידע נוסף
לא זמין באתר כלשהו: 1
Demystifying Decentralized Matrix Communication Network: Ecosystem and Security
H Li, Y Wu, R Huang, X Mi, C Hu, S Guo
2023 IEEE 29th International Conference on Parallel and Distributed Systems …, 2023
הרשאות: National Natural Science Foundation of China
זמינים באתר כלשהו: 13
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems
N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian
IEEE Symposium on Security and Privacy 2019, 2018
הרשאות: US National Science Foundation, US Department of Defense
An empirical characterization of IFTTT: ecosystem, usage, and performance
X Mi, F Qian, Y Zhang, XF Wang
Proceedings of the 2017 internet measurement conference, 398-404, 2017
הרשאות: US National Science Foundation
Resident Evil: Understanding Residential IP Proxy as a Dark Service
X Mi, X Feng, X Liao, B Liu, XF Wang, F Qian, Z Li, S Alrwais, ...
IEEE Symposium on Security and Privacy 2019, 2018
הרשאות: US National Science Foundation, US Department of Defense, National Natural …
Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service provider networks
S Alrwais, X Liao, X Mi, P Wang, XF Wang, F Qian, R Beyah, D McCoy
2017 IEEE Symposium on Security and Privacy (SP), 805-823, 2017
הרשאות: US National Science Foundation
Cracking wall of confinement: Understanding and analyzing malicious domain takedowns
E Alowaisheq
The Network and Distributed System Security Symposium (NDSS), 2019
הרשאות: US National Science Foundation
Picking up my tab: Understanding and mitigating synchronized token lifting and spending in mobile payment
X Bai, Z Zhou, XF Wang, Z Li, X Mi, N Zhang, T Li, SM Hu, K Zhang
26th USENIX Security Symposium (USENIX Security 17), 593-608, 2017
הרשאות: US National Science Foundation, US Department of Defense, National Natural …
Clues in tweets: Twitter-guided discovery and analysis of SMS spam
S Tang, X Mi, Y Li, XF Wang, K Chen
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
הרשאות: US National Science Foundation, Chinese Academy of Sciences, National …
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations
P Wang, X Mi, X Liao, XF Wang, K Yuan, F Qian, R Beyah
NDSS, 2018
הרשאות: US National Science Foundation, US Department of Defense
Your phone is my proxy: Detecting and understanding mobile proxy networks
X Mi, S Tang, Z Li, X Liao, F Qian, XF Wang
Proceeding of ISOC Network and Distributed System Security Symposium (NDSS …, 2021
הרשאות: US National Science Foundation
Understanding {iOS-based} crowdturfing through hidden {UI} analysis
Y Lee, X Wang, K Lee, X Liao, XF Wang, T Li, X Mi
28th USENIX Security Symposium (USENIX Security 19), 765-781, 2019
הרשאות: US National Science Foundation, US Department of Defense
Smig: Stream migration extension for http/2
X Mi, F Qian, X Wang
Proceedings of the 12th International on Conference on emerging Networking …, 2016
הרשאות: US National Science Foundation
An extensive study of residential proxies in China
M Yang, Y Yu, X Mi, S Tang, S Guo, Y Li, X Zheng, H Duan
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
הרשאות: National Natural Science Foundation of China
An empirical study of storj dcs: Ecosystem, performance, and security
H Li, X Mi, Y Dou, S Guo
2023 IEEE/ACM 31st International Symposium on Quality of Service (IWQoS), 1-10, 2023
הרשאות: National Natural Science Foundation of China
המידע על הפרסום ועל הגורמים המממנים נקבע באופן אוטומטי על ידי תוכנת מחשב