According to our database1, Xi Xiong authored at least 24 papers between 2009 and 2018.
Legend:Book In proceedings Article PhD thesis Other
A policy-centric approach to protecting OS kernel from vulnerable LKMs.
Softw., Pract. Exper., 2018
Assessing R&D efficiency using a two-stage dynamic DEA model: A case study of research institutes in the Chinese Academy of Sciences.
J. Informetrics, 2018
Maximal fuzzy supplement frequent pattern mining based on advanced pattern-aware dynamic search strategy and an effective FSFP-array technique.
Journal of Intelligent and Fuzzy Systems, 2018
The Strong Local Diagnosability of a Hypercube Network with Missing Edges.
Augmenting Indoor Inertial Tracking with Polarized Light.
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018
Reconstructing Hand Poses Using Visible Light.
Empirical Analysis and Modeling of the Activity Dilemmas in Big Social Networks.
IEEE Access, 2017
Customizing indoor wireless coverage via 3D-fabricated reflectors.
Proceedings of the 4th ACM International Conference on Systems for Energy-Efficient Built Environments, 2017
Position: Augmenting Inertial Tracking with Light.
Proceedings of the 4th ACM Workshop on Visible Light Communication Systems, 2017
GF(2n) Redundant Representation Using Matrix Embedding for Irreducible Trinomials.
Int. J. Found. Comput. Sci., 2016
Automating 3D wireless measurements with drones.
Proceedings of the Tenth ACM International Workshop on Wireless Network Testbeds, 2016
Between Mutual Trust and Mutual Distrust: Practical Fine-grained Privilege Separation in Multithreaded Applications.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015
SmartGuide: Towards Single-image Building Localization with Smartphone.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015
GF(2n) Bit-Parallel Squarer Using Generalized Polynomial Basis For a New Class of Irreducible Pentanomials.
IACR Cryptology ePrint Archive, 2014
Defeating buffer overflow attacks via virtualization.
Computers & Electrical Engineering, 2014
SILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernel.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
Bit-Parallel GF(2n) Squarer Using Shifted Polynomial Basis.
IACR Cryptology ePrint Archive, 2012
Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions.
Proceedings of the Network and Distributed System Security Symposium, 2011
Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel Modules.
Proceedings of the Information Security Practice and Experience, 2011
The web interface should be radically refactored.
Proceedings of the Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), 2011
Cross-Layer Damage Assessment for Cyber Situational Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
Integrating Offline Analysis and Online Protection to Defeat Buffer Overflow Attacks.
Proceedings of the Information Security - 13th International Conference, 2010
Using Purpose Capturing Signatures to Defeat Computer Virus Mutating.
Proceedings of the Information Security, 2010
SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009