Xiongwei Xie

Learn More
As a special type of stealth attacks, a rootkit hides its existence from malware detection and maintains continued privileged access to a computer system. The proliferation of virtualization creates a new technique for the detection of such attacks. In this paper, we propose to design a rootkit detection mechanism for virtual machines through deep(More)
Primary user emulation (PUE) attacks on cognitive radio networks pose a serious threat to the deployment of this technique. Previous approaches usually depend on individual or combined received signal strength (RSS) measurements to detect emulators. In this paper, we propose a new mechanism based on physical layer network coding to detect the emulators.(More)
Different from the conventional energy transmission which uses air-core coil as a carrier , This paper mostly discusses the effect of energy transmission efficiency with core added; this paper also discusses the receiving terminal signal virtual value variation of hysteresis loop of the core material with a sine wave signal fixed to the power input(More)
Coupler as an important component of the wireless power transfer system, its parameters properties are closely related to transmission efficiency of the wireless energy transmission system. This article discusses the optimum design of the coil, studies the impact of parameters of coil, including resistivity and number of turns, on the transmission(More)
The chronic high-dose right ventricular apical (RVA) pacing may have deleterious effects on left ventricular (LV) systolic function. We hypothesized that the expression changes of genes regulating cardiomyocyte energy metabolism and contractility were associated with deterioration of LV function in patients who underwent chronic RVA pacing. Sixty patients(More)
Bivalirudin has been shown to be safe and efficacious compared with heparin plus glycoprotein IIb/IIIa inhibitor (GPI) in patients undergoing percutaneous coronary intervention (PCI). Whether bivalirudin would have the beneficial effects in female patients undergoing PCI remains unknown. We searched the literature for randomized controlled trials that(More)
OBJECTIVE To compare the effect of the two methods of back propagation network (BPN) test on TCM syndrome typing of depression. METHODS Test was carried out by two methods as following: (1) Cross train-test method: 1731 patients with depression typed to 5 syndrome types were randomly divided into 2 groups, and they were trained and tested in turn; (2)(More)
This paper mainly studies the mathematical model of wireless power transmission based on magnetic coupling and resonance. Our works contain using the circuitry theory to modeling the system, analyzing how other variables influence on transmission efficiency and conducting simulation in MATLAB. In the experiments, two-coil model, three-coil model, four-coil(More)
In cloud computing, quality of services is often enforced through Service Level Agreement (SLA) between end users and cloud providers. While SLAs on hardware resources such as CPU cycles or bandwidth can be monitored by low layer sensors, the enforcement of security SLAs stays a very challenging problem. Several high level architectures for security SLAs(More)