Follow
Endong Tong
Title
Cited by
Cited by
Year
Adversarial attack and defense in reinforcement learning-from AI security view
T Chen, J Liu, Y Xiang, W Niu, E Tong, Z Han
Cybersecurity 2 (1), 1-22, 2019
1302019
Context-aware service ranking in wireless sensor networks
W Niu, J Lei, E Tong, G Li, L Chang, Z Shi, S Ci
Journal of network and systems management 22, 50-74, 2014
412014
物联网情景感知技术研究
童恩栋, 沈强, 雷君, 刘宇, 唐晖
计算机科学 38 (4), 9-14, 2011
322011
Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks
E Tong, W Niu, G Li, D Tang, L Chang, Z Shi, S Ci
Journal of network and computer applications 39, 38-51, 2014
292014
Energy-aware service selection and adaptation in wireless sensor networks with QoS guarantee
E Tong, L Chen, H Li
IEEE Transactions on Services Computing 13 (5), 829-842, 2017
282017
Energy efficient sleep schedule with service coverage guarantee in wireless sensor networks
B Zhang, E Tong, J Hao, W Niu, G Li
Journal of Network and Systems Management 24, 834-858, 2016
202016
A missing QoS prediction approach via time-aware collaborative filtering
E Tong, W Niu, J Liu
IEEE Transactions on Services Computing 15 (6), 3115-3128, 2021
172021
用户网络行为画像——大数据中的用户网络行为画像分析与内容推荐应用
牛温佳, 刘击强, 石川
BEIJING BOOK CO. INC., 2016
152016
Bidirectional RNN-based few-shot training for detecting multi-stage attack
D Zhao, J Liu, J Wang, W Niu, E Tong, T Chen, G Li
arXiv preprint arXiv:1905.03454, 2019
102019
Exposing spoofing attack on flocking-based unmanned aerial vehicle cluster: A threat to swarm intelligence
X Huang, Y Tian, Y He, E Tong, W Niu, C Li, J Liu, L Chang
Security and Communication Networks 2020, 1-15, 2020
92020
A hierarchical energy-efficient service selection approach with QoS constraints for Internet of Things
E Tong, W Niu, Y Tian, J Liu, T Baker, S Verma, Z Liu
IEEE Transactions on Green Communications and Networking 5 (2), 645-657, 2021
82021
Interaction relationships of caches in agent-based HD video surveillance: Discovery and utilization
W Niu, G Li, E Tong, X Yang, L Chang, Z Shi, S Ci
Journal of Network and Computer Applications 37, 155-169, 2014
82014
Study on context-aware technologies for Internet of Things
ED Tong, Q Shen, J Lei, Y Liu, H Tang
Computer Science 38 (4), 9, 2011
72011
Multiagent reinforcement learning-based signal planning for resisting congestion attack in green transportation
Y Li, W Niu, Y Tian, T Chen, Z Xie, Y Wu, Y Xiang, E Tong, T Baker, J Liu
IEEE Transactions on Green Communications and Networking 6 (3), 1448-1458, 2022
62022
Hierarchical workflow management in wireless sensor network
E Tong, W Niu, G Li, H Tang, D Tang, S Ci
Pacific Rim International Conference on Artificial Intelligence, 601-612, 2012
52012
Blockchain-based decentralized federated learning: A secure and privacy-preserving system
S Zhao, Y Wu, R Sun, X Qian, D Zi, Z Xie, E Tong, W Niu, J Liu, Z Han
2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th …, 2021
42021
Congestion attack detection in intelligent traffic signal system: Combining empirical and analytical methods
Y Xiang, W Niu, E Tong, Y Li, B Jia, Y Wu, J Liu, L Chang, G Li
Security and Communication Networks 2021, 1-17, 2021
42021
Towards revealing parallel adversarial attack on politician socialnet of graph structure
Y Tian, J Liu, E Tong, W Niu, L Chang, QA Chen, G Li, W Wang
Security and Communication Networks 2021, 1-13, 2021
42021
Improving convolutional neural network-based webshell detection through reinforcement learning
Y Wu, M Song, Y Li, Y Tian, E Tong, W Niu, B Jia, H Huang, Q Li, J Liu
Information and Communications Security: 23rd International Conference …, 2021
42021
An empirical study on gan-based traffic congestion attack analysis: A visualized method
Y Li, Y Xiang, E Tong, W Niu, B Jia, L Li, J Liu, Z Han
Wireless Communications and Mobile Computing 2020, 1-14, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20