Xi Xiong

According to our database1, Xi Xiong authored at least 26 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


ADPDF: A Hybrid Attribute Discrimination Method for Psychometric Data With Fuzziness.
IEEE Trans. Systems, Man, and Cybernetics: Systems, 2019

Topological Influence-Aware Recommendation on Social Networks.
Complexity, 2019

A policy-centric approach to protecting OS kernel from vulnerable LKMs.
Softw., Pract. Exper., 2018

Assessing R&D efficiency using a two-stage dynamic DEA model: A case study of research institutes in the Chinese Academy of Sciences.
J. Informetrics, 2018

Maximal fuzzy supplement frequent pattern mining based on advanced pattern-aware dynamic search strategy and an effective FSFP-array technique.
Journal of Intelligent and Fuzzy Systems, 2018

The Strong Local Diagnosability of a Hypercube Network with Missing Edges.
Complexity, 2018

Augmenting Indoor Inertial Tracking with Polarized Light.
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018

Reconstructing Hand Poses Using Visible Light.
IMWUT, 2017

Empirical Analysis and Modeling of the Activity Dilemmas in Big Social Networks.
IEEE Access, 2017

Customizing indoor wireless coverage via 3D-fabricated reflectors.
Proceedings of the 4th ACM International Conference on Systems for Energy-Efficient Built Environments, 2017

Position: Augmenting Inertial Tracking with Light.
Proceedings of the 4th ACM Workshop on Visible Light Communication Systems, 2017

GF(2n) Redundant Representation Using Matrix Embedding for Irreducible Trinomials.
Int. J. Found. Comput. Sci., 2016

Automating 3D wireless measurements with drones.
Proceedings of the Tenth ACM International Workshop on Wireless Network Testbeds, 2016

Between Mutual Trust and Mutual Distrust: Practical Fine-grained Privilege Separation in Multithreaded Applications.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015

SmartGuide: Towards Single-image Building Localization with Smartphone.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

GF(2n) Bit-Parallel Squarer Using Generalized Polynomial Basis For a New Class of Irreducible Pentanomials.
IACR Cryptology ePrint Archive, 2014

Defeating buffer overflow attacks via virtualization.
Computers & Electrical Engineering, 2014

SILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernel.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Bit-Parallel GF(2n) Squarer Using Shifted Polynomial Basis.
IACR Cryptology ePrint Archive, 2012

Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions.
Proceedings of the Network and Distributed System Security Symposium, 2011

Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel Modules.
Proceedings of the Information Security Practice and Experience, 2011

The web interface should be radically refactored.
Proceedings of the Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), 2011

Cross-Layer Damage Assessment for Cyber Situational Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Integrating Offline Analysis and Online Protection to Defeat Buffer Overflow Attacks.
Proceedings of the Information Security - 13th International Conference, 2010

Using Purpose Capturing Signatures to Defeat Computer Virus Mutating.
Proceedings of the Information Security, 2010

SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009