Follow
Endong Tong
Title
Cited by
Cited by
Year
Adversarial attack and defense in reinforcement learning-from AI security view
T Chen, J Liu, Y Xiang, W Niu, E Tong, Z Han
Cybersecurity 2 (1), 1-22, 2019
842019
Context-aware service ranking in wireless sensor networks
W Niu, J Lei, E Tong, G Li, L Chang, Z Shi, S Ci
Journal of network and systems management 22, 50-74, 2014
402014
物联网情景感知技术研究
童恩栋, 沈强, 雷君, 刘宇, 唐晖
计算机科学 38 (4), 9-14, 2011
322011
Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks
E Tong, W Niu, G Li, D Tang, L Chang, Z Shi, S Ci
Journal of network and computer applications 39, 38-51, 2014
282014
Energy-aware service selection and adaptation in wireless sensor networks with QoS guarantee
E Tong, L Chen, H Li
IEEE Transactions on Services Computing 13 (5), 829-842, 2017
212017
Wearable Real-Time Monitoring System Based on Fiber Bragg Grating Pressure Sensor for Compression Therapy Applications
Z Xiang, J Liu, Z Zhou, Z Ma, Z Gong, J Zhang, CC Chan
Advances in Usability, User Experience, Wearable and Assistive Technology …, 2020
202020
Energy efficient sleep schedule with service coverage guarantee in wireless sensor networks
B Zhang, E Tong, J Hao, W Niu, G Li
Journal of Network and Systems Management 24, 834-858, 2016
182016
用户网络行为画像——大数据中的用户网络行为画像分析与内容推荐应用
牛温佳, 刘击强, 石川
BEIJING BOOK CO. INC., 2016
122016
Interaction relationships of caches in agent-based HD video surveillance: Discovery and utilization
W Niu, G Li, E Tong, X Yang, L Chang, Z Shi, S Ci
Journal of Network and Computer Applications 37, 155-169, 2014
82014
Study on context-aware technologies for Internet of Things
ED Tong, Q Shen, J Lei, Y Liu, H Tang
Computer Science 38 (4), 9, 2011
72011
Bidirectional RNN-based few-shot training for detecting multi-stage attack
D Zhao, J Liu, J Wang, W Niu, E Tong, T Chen, G Li
arXiv preprint arXiv:1905.03454, 2019
62019
Exposing spoofing attack on flocking-based unmanned aerial vehicle cluster: A threat to swarm intelligence
X Huang, Y Tian, Y He, E Tong, W Niu, C Li, J Liu, L Chang
Security and Communication Networks 2020, 1-15, 2020
52020
Hierarchical workflow management in wireless sensor network
E Tong, W Niu, G Li, H Tang, D Tang, S Ci
PRICAI 2012: Trends in Artificial Intelligence: 12th Pacific Rim …, 2012
52012
Study on Context-aware Technologies for Internet of Thing
T En-dong, S Qiang, L Jun
Computer Science 38 (4), 9-14, 2011
52011
Reasoning-based context-aware workflow management in wireless sensor network
E Tong, W Niu, H Tang, G Li, Z Zhao
Service-Oriented Computing-ICSOC 2011 Workshops: ICSOC 2011, International …, 2012
42012
Survey on Astroturfing Detection and Analysis from an Information Technology Perspective
T Chen, J Liu, Y Wu, Y Tian, E Tong, W Niu, Y Li, Y Xiang, W Wang
Security and Communication Networks 2021, 1-16, 2021
32021
A missing QoS prediction approach via time-aware collaborative filtering
E Tong, W Niu, J Liu
IEEE Transactions on Services Computing 15 (6), 3115-3128, 2021
32021
A hierarchical energy-efficient service selection approach with QoS constraints for Internet of Things
E Tong, W Niu, Y Tian, J Liu, T Baker, S Verma, Z Liu
IEEE Transactions on Green Communications and Networking 5 (2), 645-657, 2021
32021
Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure
Y Tian, J Liu, E Tong, W Niu, L Chang, QA Chen, G Li, W Wang
Security and Communication Networks 2021, 1-13, 2021
32021
Exploring data correlation between feature pairs for generating constraint-based adversarial examples
Y Tian, Y Wang, E Tong, W Niu, L Chang, QA Chen, G Li, J Liu
2020 IEEE 26th International Conference on Parallel and Distributed Systems …, 2020
32020
The system can't perform the operation now. Try again later.
Articles 1–20