Xiongwei Xie

Learn More
Primary user emulation (PUE) attacks on cognitive radio networks pose a serious threat to the deployment of this technique. Previous approaches usually depend on individual or combined received signal strength (RSS) measurements to detect emulators. In this paper, we propose a new mechanism based on physical layer network coding to detect the emulators.(More)
—As a special type of stealth attacks, a rootkit hides its existence from malware detection and maintains continued privileged access to a computer system. The proliferation of virtualization creates a new technique for the detection of such attacks. In this paper, we propose to design a rootkit detection mechanism for virtual machines through deep(More)
Bivalirudin has been shown to be safe and efficacious compared with heparin plus glycoprotein IIb/IIIa inhibitor (GPI) in patients undergoing percutaneous coronary intervention (PCI). Whether bivalirudin would have the beneficial effects in female patients undergoing PCI remains unknown. We searched the literature for randomized controlled trials that(More)
Since it becomes increasingly difficult to trick end users to install and run executable files from unknown sources, attackers refer to stealthy ways such as manipulation of DLL (Dynamic Link Library) files to compromise user computers. In this paper, we propose to develop mechanisms that allow the hypervisor to conduct lightweight examination of DLL files(More)
  • 1