Xiongwei Xie

Learn More
Primary user emulation (PUE) attacks on cognitive radio networks pose a serious threat to the deployment of this technique. Previous approaches usually depend on individual or combined received signal strength (RSS) measurements to detect emulators. In this paper, we propose a new mechanism based on physical layer network coding to detect the emulators.(More)
—As a special type of stealth attacks, a rootkit hides its existence from malware detection and maintains continued privileged access to a computer system. The proliferation of virtualization creates a new technique for the detection of such attacks. In this paper, we propose to design a rootkit detection mechanism for virtual machines through deep(More)
Since it becomes increasingly difficult to trick end users to install and run executable files from unknown sources, attackers refer to stealthy ways such as manipulation of DLL (Dynamic Link Library) files to compromise user computers. In this paper, we propose to develop mechanisms that allow the hypervisor to conduct lightweight examination of DLL files(More)
OBJECTIVE To explore the effects of Baisong tablets (BST) on synapse protein synatotagmin (SYT) and synaptophysin (SYN) of hippocampus in chronic stress depression in rats. METHODS Twenty eight male Sprague-Dawley rats were randomly allocated to 4 groups: a normal control group,a model group,a fluoxetine (FXT) group and a BST group. The normal control(More)
  • 1