Xiongwei Xie

Learn More
Primary user emulation (PUE) attacks on cognitive radio networks pose a serious threat to the deployment of this technique. Previous approaches usually depend on individual or combined received signal strength (RSS) measurements to detect emulators. In this paper, we propose a new mechanism based on physical layer network coding to detect the emulators.(More)
As a special type of stealth attacks, a rootkit hides its existence from malware detection and maintains continued privileged access to a computer system. The proliferation of virtualization creates a new technique for the detection of such attacks. In this paper, we propose to design a rootkit detection mechanism for virtual machines through deep(More)
Different from the conventional energy transmission which uses air-core coil as a carrier , This paper mostly discusses the effect of energy transmission efficiency with core added; this paper also discusses the receiving terminal signal virtual value variation of hysteresis loop of the core material with a sine wave signal fixed to the power input(More)
This paper mainly studies the mathematical model of wireless power transmission based on magnetic coupling and resonance. Our works contain using the circuitry theory to modeling the system, analyzing how other variables influence on transmission efficiency and conducting simulation in MATLAB. In the experiments, two-coil model, three-coil model, four-coil(More)
BACKGROUND Percutaneous left atrial appendage (LAA) occlusion has emerged as an important treatment for patients with nonvalvular atrial fibrillation (NVAF) who are at high stroke risk and have contraindications for anticoagulation. However, literature about the efficacy and safety of LAA occlusion is minimal to date. We performed a meta-analysis to assess(More)
OBJECTIVE To compare the effect of the two methods of back propagation network (BPN) test on TCM syndrome typing of depression. METHODS Test was carried out by two methods as following: (1) Cross train-test method: 1731 patients with depression typed to 5 syndrome types were randomly divided into 2 groups, and they were trained and tested in turn; (2)(More)
Since it becomes increasingly difficult to trick end users to install and run executable files from unknown sources, attackers refer to stealthy ways such as manipulation of DLL (Dynamic Link Library) files to compromise user computers. In this paper, we propose to develop mechanisms that allow the hypervisor to conduct lightweight examination of DLL files(More)
Coupler as an important component of the wireless power transfer system, its parameters properties are closely related to transmission efficiency of the wireless energy transmission system. This article discusses the optimum design of the coil, studies the impact of parameters of coil, including resistivity and number of turns, on the transmission(More)
In cloud computing, quality of services is often enforced through Service Level Agreement (SLA) between end users and cloud providers. While SLAs on hardware resources such as CPU cycles or bandwidth can be monitored by low layer sensors, the enforcement of security SLAs stays a very challenging problem. Several high level architectures for security SLAs(More)