Xiongwei Xie

Learn More
Primary user emulation (PUE) attacks on cognitive radio networks pose a serious threat to the deployment of this technique. Previous approaches usually depend on individual or combined received signal strength (RSS) measurements to detect emulators. In this paper, we propose a new mechanism based on physical layer network coding to detect the emulators.(More)
As a special type of stealth attacks, a rootkit hides its existence from malware detection and maintains continued privileged access to a computer system. The proliferation of virtualization creates a new technique for the detection of such attacks. In this paper, we propose to design a rootkit detection mechanism for virtual machines through deep(More)
Different from the conventional energy transmission which uses air-core coil as a carrier , This paper mostly discusses the effect of energy transmission efficiency with core added; this paper also discusses the receiving terminal signal virtual value variation of hysteresis loop of the core material with a sine wave signal fixed to the power input(More)
Bivalirudin has been shown to be safe and efficacious compared with heparin plus glycoprotein IIb/IIIa inhibitor (GPI) in patients undergoing percutaneous coronary intervention (PCI). Whether bivalirudin would have the beneficial effects in female patients undergoing PCI remains unknown. We searched the literature for randomized controlled trials that(More)
Since it becomes increasingly difficult to trick end users to install and run executable files from unknown sources, attackers refer to stealthy ways such as manipulation of DLL (Dynamic Link Library) files to compromise user computers. In this paper, we propose to develop mechanisms that allow the hypervisor to conduct lightweight examination of DLL files(More)
In cloud computing, quality of services is often enforced through Service Level Agreement (SLA) between end users and cloud providers. While SLAs on hardware resources such as CPU cycles or bandwidth can be monitored by low layer sensors, the enforcement of security SLAs stays a very challenging problem. Several high level architectures for security SLAs(More)
This paper mainly studies the mathematical model of wireless power transmission based on magnetic coupling and resonance. Our works contain using the circuitry theory to modeling the system, analyzing how other variables influence on transmission efficiency and conducting simulation in MATLAB. In the experiments, two-coil model, three-coil model, four-coil(More)
Coupler as an important component of the wireless power transfer system, its parameters properties are closely related to transmission efficiency of the wireless energy transmission system. This article discusses the optimum design of the coil, studies the impact of parameters of coil, including resistivity and number of turns, on the transmission(More)
  • 1