default search action
Endong Tong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Yalun Wu, Yingxiao Xiang, Endong Tong, Yuqi Ye, Zhibo Cui, Yunzhe Tian, Lejun Zhang, Jiqiang Liu, Zhen Han, Wenjia Niu:
Improving the Robustness of Pedestrian Detection in Autonomous Driving With Generative Data Augmentation. IEEE Netw. 38(3): 63-69 (2024) - [j22]Yunzhe Tian, Dongyue Xu, Endong Tong, Rui Sun, Kang Chen, Yike Li, Thar Baker, Wenjia Niu, Jiqiang Liu:
Toward Learning Model-Agnostic Explanations for Deep Learning-Based Signal Modulation Classifiers. IEEE Trans. Reliab. 73(3): 1529-1543 (2024) - [c23]Dianjing Cheng, Xingyu Wu, Zhenghao Xie, Zhihua Cui, Qiong Li, Endong Tong, Wenjia Niu, Ziyi Wei, Xinyi Zhao:
Recognition of Signal Modulation Pattern Based on Multi-task Self-supervised Learning. Intelligent Information Processing (2) 2024: 32-45 - [c22]Xiaoshu Cui, Yalun Wu, Yanfeng Gu, Qiong Li, Endong Tong, Jiqiang Liu, Wenjia Niu:
Lurking in the Shadows: Imperceptible Shadow Black-Box Attacks Against Lane Detection Models. KSEM (3) 2024: 220-232 - [c21]Jiayin Song, Yike Li, Yunzhe Tian, Xingyu Wu, Qiong Li, Endong Tong, Wenjia Niu, Zhenguo Zhang, Jiqiang Liu:
Knowledge-Driven Backdoor Removal in Deep Neural Networks via Reinforcement Learning. KSEM (3) 2024: 336-348 - 2023
- [j21]Tong Chen, Jiqiang Liu, Thar Baker, Yalun Wu, Yingxiao Xiang, Yike Li, Wenjia Niu, Endong Tong, Albert Y. Zomaya:
A Mutual Information-Based Assessment of Reverse Engineering on Rewards of Reinforcement Learning. IEEE Trans. Artif. Intell. 4(5): 1089-1100 (2023) - [c20]Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Jiqiang Liu:
Robust Reinforcement Learning via Progressive Task Sequence. IJCAI 2023: 455-463 - [c19]Yunzhe Tian, Yike Li, Kang Chen, Endong Tong, Wenjia Niu, Jiqiang Liu, Fangyun Qin, Zheng Zheng:
Mitigating Overfitting for Deep Learning-based Aging-related Bug Prediction via Brain-inspired Regularization in Spiking Neural Networks. ISSREW 2023: 214-221 - [c18]Pengna Liu, Ziyan Qiao, Yalun Wu, Kang Chen, Jiasong Hou, Yingqi Cai, Liqun Chu, Endong Tong, Wenjia Niu, Jiqiang Liu:
Traffic Signal Timing Optimization Based on Intersection Importance in Vehicle-Road Collaboration. ML4CS 2023: 74-89 - 2022
- [j20]Yingxiao Xiang, Chao Li, Tong Chen, Yike Li, Endong Tong, Wenjia Niu, Qiong Li, Jiqiang Liu, Wei Wang:
Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System. IEICE Trans. Inf. Syst. 105-D(2): 280-288 (2022) - [j19]Yike Li, Wenjia Niu, Yunzhe Tian, Tong Chen, Zhiqiang Xie, Yalun Wu, Yingxiao Xiang, Endong Tong, Thar Baker, Jiqiang Liu:
Multiagent Reinforcement Learning-Based Signal Planning for Resisting Congestion Attack in Green Transportation. IEEE Trans. Green Commun. Netw. 6(3): 1448-1458 (2022) - [j18]Endong Tong, Wenjia Niu, Jiqiang Liu:
A Missing QoS Prediction Approach via Time-Aware Collaborative Filtering. IEEE Trans. Serv. Comput. 15(6): 3115-3128 (2022) - [c17]Ziyan Qiao, Rui Sun, Shiyao Chen, Dong Zi, Xingyu Wu, Qian Wang, Endong Tong, Wenjia Niu, Jiqiang Liu:
Adapting on Road Traffic-Oriented Controlled Optimization of Phases to Heterogeneous Intersections. Intelligent Information Processing 2022: 522-535 - 2021
- [j17]Tong Chen, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Endong Tong, Shuoru Wang, He Li, Liang Chang, Gang Li, Qi Alfred Chen:
Adversarial retraining attack of asynchronous advantage actor-critic based pathfinding. Int. J. Intell. Syst. 36(5): 2323-2346 (2021) - [j16]Yingdi Wang, Yunzhe Tian, Jiqiang Liu, Wenjia Niu, Endong Tong:
A Training-Based Identification Approach to VIN Adversarial Examples in Path Planning. J. Circuits Syst. Comput. 30(13): 2150229:1-2150229:21 (2021) - [j15]Tong Chen, Jiqiang Liu, He Li, Shuoru Wang, Wenjia Niu, Endong Tong, Liang Chang, Qi Alfred Chen, Gang Li:
Robustness Assessment of Asynchronous Advantage Actor-Critic Based on Dynamic Skewness and Sparseness Computation: A Parallel Computing View. J. Comput. Sci. Technol. 36(5): 1002-1021 (2021) - [j14]Yunzhe Tian, Jiqiang Liu, Endong Tong, Wenjia Niu, Liang Chang, Qi Alfred Chen, Gang Li, Wei Wang:
Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure. Secur. Commun. Networks 2021: 6631247:1-6631247:13 (2021) - [j13]Endong Tong, Wenjia Niu, Yunzhe Tian, Jiqiang Liu, Thar Baker, Sandeep Verma, Zheli Liu:
A Hierarchical Energy-Efficient Service Selection Approach With QoS Constraints for Internet of Things. IEEE Trans. Green Commun. Netw. 5(2): 645-657 (2021) - [c16]Shuang Zhao, Yalun Wu, Rui Sun, Xiaoai Qian, Dong Zi, Zhiqiang Xie, Endong Tong, Wenjia Niu, Jiqiang Liu, Zhen Han:
Blockchain-based decentralized federated learning: A secure and privacy-preserving system. HPCC/DSS/SmartCity/DependSys 2021: 941-948 - [c15]Zhiqiang Xie, Yingxiao Xiang, Yike Li, Shuang Zhao, Endong Tong, Wenjia Niu, Jiqiang Liu, Jian Wang:
Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning. ICA3PP (1) 2021: 660-675 - [c14]Yalun Wu, Minglu Song, Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Bowei Jia, Haixiang Huang, Qiong Li, Jiqiang Liu:
Improving Convolutional Neural Network-Based Webshell Detection Through Reinforcement Learning. ICICS (1) 2021: 368-383 - [c13]Tong Chen, Yingxiao Xiang, Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Jiqiang Liu, Gang Li, Qi Alfred Chen:
Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory. SRDS 2021: 299-309 - 2020
- [j12]Xinyu Huang, Yunzhe Tian, Yifei He, Endong Tong, Wenjia Niu, Chenyang Li, Jiqiang Liu, Liang Chang:
Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence. Secur. Commun. Networks 2020: 8889122:1-8889122:15 (2020) - [j11]Endong Tong, Lan Chen, Huizi Li:
Energy-Aware Service Selection and Adaptation in Wireless Sensor Networks with QoS Guarantee. IEEE Trans. Serv. Comput. 13(5): 829-842 (2020) - [j10]Yike Li, Yingxiao Xiang, Endong Tong, Wenjia Niu, Bowei Jia, Long Li, Jiqiang Liu, Zhen Han:
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method. Wirel. Commun. Mob. Comput. 2020: 8823300:1-8823300:14 (2020) - [c12]Bowei Jia, Yunzhe Tian, Di Zhao, Xiaojin Wang, Chenyang Li, Wenjia Niu, Endong Tong, Jiqiang Liu:
Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack. Inscrypt 2020: 37-52 - [c11]Yunzhe Tian, Yingdi Wang, Endong Tong, Wenjia Niu, Liang Chang, Qi Alfred Chen, Gang Li, Jiqiang Liu:
Exploring Data Correlation between Feature Pairs for Generating Constraint-based Adversarial Examples. ICPADS 2020: 430-437 - [c10]Xiaojin Wang, Yingxiao Xiang, Wenjia Niu, Endong Tong, Jiqiang Liu:
Explainable Congestion Attack Prediction and Software-level Reinforcement in Intelligent Traffic Signal System. ICPADS 2020: 667-672 - [c9]Xu Gao, Jiqiang Liu, Yike Li, Xiaojin Wang, Yingxiao Xiang, Endong Tong, Wenjia Niu, Zhen Han:
Queue Length Estimation Based Defence Against Data Poisoning Attack for Traffic Signal Control. Intelligent Information Processing 2020: 254-265 - [c8]Xiaojin Wang, Yingxiao Xiang, Wenjia Niu, Endong Tong, Qi Alfred Chen, Gang Li, Jiqiang Liu, Long Li:
Constructing Optimal Sparse Decision Tree for Analying I-SIG System Attack. ISPA/BDCloud/SocialCom/SustainCom 2020: 321-328 - [c7]Shuoru Wang, Jiqiang Liu, Tong Chen, He Li, Wenjia Niu, Endong Tong, Long Li, Minglu Song:
A Configurable off-Policy Evaluation with Key State-Based Bias Constraints in AI Reinforcement Learning. SocialSec 2020: 120-131 - [c6]Yifei He, Jiqiang Liu, Endong Tong, Wenjia Niu, Xinyu Huang, Ying Zhou, Chenyang Li, Liang Chang:
Adapt Swarm Path Planning for UAV Based on Artificial Potential Field with Birds Intelligence Extensions. SocialSec 2020: 340-354 - [c5]Yingdi Wang, Yixiang Wang, Endong Tong, Wenjia Niu, Jiqiang Liu:
A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection. VECoS 2020: 207-221
2010 – 2019
- 2019
- [j9]Tong Chen, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Endong Tong, Zhen Han:
Adversarial attack and defense in reinforcement learning-from AI security view. Cybersecur. 2(1): 11 (2019) - [i1]Di Zhao, Jiqiang Liu, Jialin Wang, Wenjia Niu, Endong Tong, Tong Chen, Gang Li:
Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack. CoRR abs/1905.03454 (2019) - 2016
- [j8]Bo Zhang, Endong Tong, Jie Hao, Wenjia Niu, Gang Li:
Energy Efficient Sleep Schedule with Service Coverage Guarantee in Wireless Sensor Networks. J. Netw. Syst. Manag. 24(4): 834-858 (2016) - [j7]Wenjia Niu, Endong Tong, Qian Li, Gang Li, Xuemin Wen, Jianlong Tan, Li Guo:
Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy. Knowl. Inf. Syst. 48(1): 111-141 (2016) - 2015
- [j6]Qian Li, Wenjia Niu, Gang Li, Endong Tong, Yue Hu, Ping Liu, Li Guo:
Recover Fault Services via Complex Service-to-Node Mappings in Wireless Sensor Networks. J. Netw. Syst. Manag. 23(3): 474-501 (2015) - 2014
- [j5]Wenjia Niu, Gang Li, Endong Tong, Xinghua Yang, Liang Chang, Zhongzhi Shi, Song Ci:
Interaction relationships of caches in agent-based HD video surveillance: Discovery and utilization. J. Netw. Comput. Appl. 37: 155-169 (2014) - [j4]Endong Tong, Wenjia Niu, Gang Li, Ding Tang, Liang Chang, Zhongzhi Shi, Song Ci:
Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks. J. Netw. Comput. Appl. 39: 38-51 (2014) - [j3]Wenjia Niu, Gang Li, Endong Tong, Quan Z. Sheng, Qian Li, Yue Hu, Athanasios V. Vasilakos, Li Guo:
A block-aware hybrid data dissemination with hotspot elimination in wireless sensor network. J. Netw. Comput. Appl. 44: 120-133 (2014) - [j2]Wenjia Niu, Jun Lei, Endong Tong, Gang Li, Liang Chang, Zhongzhi Shi, Song Ci:
Context-Aware Service Ranking in Wireless Sensor Networks. J. Netw. Syst. Manag. 22(1): 50-74 (2014) - [j1]Jikang Xia, Lan Chen, Ying Li, Endong Tong:
A Physical Layer Key Negotiation Mechanism to Secure Wireless Networks. J. Networks 9(9): 2299-2308 (2014) - [c4]Endong Tong, Lan Chen, Ying Li:
Towards Optimal Lifetime in Wireless Sensor Networks for QoS Guaranteed Service Selection. PRICAI 2014: 747-758 - 2012
- [c3]Wenjia Niu, Xinghua Yang, Gang Li, Endong Tong, Hui Tang, Song Ci:
An Agent Collaboration-Based Data Hierarchical Caching Approach for HD Video Surveillance. ADMI 2012: 51-64 - [c2]Endong Tong, Wenjia Niu, Gang Li, Hui Tang, Ding Tang, Song Ci:
Hierarchical Workflow Management in Wireless Sensor Network. PRICAI 2012: 601-612 - 2011
- [c1]Endong Tong, Wenjia Niu, Hui Tang, Gang Li, Zhijun Zhao:
Reasoning-Based Context-Aware Workflow Management in Wireless Sensor Network. ICSOC Workshops 2011: 270-282
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint