Xi Xiong

According to our database1, Xi Xiong authored at least 25 papers between 2009 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A policy-centric approach to protecting OS kernel from vulnerable LKMs.
Softw., Pract. Exper., 2018

Assessing R&D efficiency using a two-stage dynamic DEA model: A case study of research institutes in the Chinese Academy of Sciences.
J. Informetrics, 2018

Maximal fuzzy supplement frequent pattern mining based on advanced pattern-aware dynamic search strategy and an effective FSFP-array technique.
Journal of Intelligent and Fuzzy Systems, 2018

Augmenting Indoor Inertial Tracking with Polarized Light.
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018

2017
Reconstructing Hand Poses Using Visible Light.
IMWUT, 2017

Empirical Analysis and Modeling of the Activity Dilemmas in Big Social Networks.
IEEE Access, 2017

Customizing indoor wireless coverage via 3D-fabricated reflectors.
Proceedings of the 4th ACM International Conference on Systems for Energy-Efficient Built Environments, 2017

Position: Augmenting Inertial Tracking with Light.
Proceedings of the 4th ACM Workshop on Visible Light Communication Systems, 2017

2016
GF(2n) Redundant Representation Using Matrix Embedding for Irreducible Trinomials.
Int. J. Found. Comput. Sci., 2016

Combining Deep Reinforcement Learning and Safety Based Control for Autonomous Driving.
CoRR, 2016

Automating 3D wireless measurements with drones.
Proceedings of the Tenth ACM International Workshop on Wireless Network Testbeds, 2016

2015
Between Mutual Trust and Mutual Distrust: Practical Fine-grained Privilege Separation in Multithreaded Applications.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015

SmartGuide: Towards Single-image Building Localization with Smartphone.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

2014
GF(2n) Bit-Parallel Squarer Using Generalized Polynomial Basis For a New Class of Irreducible Pentanomials.
IACR Cryptology ePrint Archive, 2014

Defeating buffer overflow attacks via virtualization.
Computers & Electrical Engineering, 2014

2013
Practical Fine-grained Privilege Separation in Multithreaded Applications
CoRR, 2013

SILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernel.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

2012
Bit-Parallel GF(2n) Squarer Using Shifted Polynomial Basis.
IACR Cryptology ePrint Archive, 2012

2011
Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions.
Proceedings of the Network and Distributed System Security Symposium, 2011

Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel Modules.
Proceedings of the Information Security Practice and Experience, 2011

The web interface should be radically refactored.
Proceedings of the Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), 2011

2010
Cross-Layer Damage Assessment for Cyber Situational Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Integrating Offline Analysis and Online Protection to Defeat Buffer Overflow Attacks.
Proceedings of the Information Security - 13th International Conference, 2010

Using Purpose Capturing Signatures to Defeat Computer Virus Mutating.
Proceedings of the Information Security, 2010

2009
SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009


  Loading...