Adversarial attack and defense in reinforcement learning-from AI security view T Chen, J Liu, Y Xiang, W Niu, E Tong, Z Han Cybersecurity 2 (1), 1-22, 2019 | 93 | 2019 |
Context-aware service ranking in wireless sensor networks W Niu, J Lei, E Tong, G Li, L Chang, Z Shi, S Ci Journal of network and systems management 22, 50-74, 2014 | 40 | 2014 |
物联网情景感知技术研究 童恩栋, 沈强, 雷君, 刘宇, 唐晖 计算机科学 38 (4), 9-14, 2011 | 32 | 2011 |
Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks E Tong, W Niu, G Li, D Tang, L Chang, Z Shi, S Ci Journal of network and computer applications 39, 38-51, 2014 | 28 | 2014 |
Energy-aware service selection and adaptation in wireless sensor networks with QoS guarantee E Tong, L Chen, H Li IEEE Transactions on Services Computing 13 (5), 829-842, 2017 | 21 | 2017 |
Wearable Real-Time Monitoring System Based on Fiber Bragg Grating Pressure Sensor for Compression Therapy Applications Z Xiang, J Liu, Z Zhou, Z Ma, Z Gong, J Zhang, CC Chan Advances in Usability, User Experience, Wearable and Assistive Technology …, 2020 | 20 | 2020 |
Energy efficient sleep schedule with service coverage guarantee in wireless sensor networks B Zhang, E Tong, J Hao, W Niu, G Li Journal of Network and Systems Management 24, 834-858, 2016 | 18 | 2016 |
用户网络行为画像——大数据中的用户网络行为画像分析与内容推荐应用 牛温佳, 刘击强, 石川 BEIJING BOOK CO. INC., 2016 | 12 | 2016 |
Bidirectional RNN-based few-shot training for detecting multi-stage attack D Zhao, J Liu, J Wang, W Niu, E Tong, T Chen, G Li arXiv preprint arXiv:1905.03454, 2019 | 8 | 2019 |
Interaction relationships of caches in agent-based HD video surveillance: Discovery and utilization W Niu, G Li, E Tong, X Yang, L Chang, Z Shi, S Ci Journal of Network and Computer Applications 37, 155-169, 2014 | 8 | 2014 |
Study on context-aware technologies for Internet of Things ED Tong, Q Shen, J Lei, Y Liu, H Tang Computer Science 38 (4), 9, 2011 | 7 | 2011 |
Exposing spoofing attack on flocking-based unmanned aerial vehicle cluster: A threat to swarm intelligence X Huang, Y Tian, Y He, E Tong, W Niu, C Li, J Liu, L Chang Security and Communication Networks 2020, 1-15, 2020 | 6 | 2020 |
A missing QoS prediction approach via time-aware collaborative filtering E Tong, W Niu, J Liu IEEE Transactions on Services Computing 15 (6), 3115-3128, 2021 | 5 | 2021 |
A hierarchical energy-efficient service selection approach with QoS constraints for Internet of Things E Tong, W Niu, Y Tian, J Liu, T Baker, S Verma, Z Liu IEEE Transactions on Green Communications and Networking 5 (2), 645-657, 2021 | 5 | 2021 |
Hierarchical workflow management in wireless sensor network E Tong, W Niu, G Li, H Tang, D Tang, S Ci PRICAI 2012: Trends in Artificial Intelligence: 12th Pacific Rim …, 2012 | 5 | 2012 |
Study on Context-aware Technologies for Internet of Thing T En-dong, S Qiang, L Jun Computer Science 38 (4), 9-14, 2011 | 5 | 2011 |
Exploring data correlation between feature pairs for generating constraint-based adversarial examples Y Tian, Y Wang, E Tong, W Niu, L Chang, QA Chen, G Li, J Liu 2020 IEEE 26th International Conference on Parallel and Distributed Systems …, 2020 | 4 | 2020 |
Reasoning-based context-aware workflow management in wireless sensor network E Tong, W Niu, H Tang, G Li, Z Zhao Service-Oriented Computing-ICSOC 2011 Workshops: ICSOC 2011, International …, 2012 | 4 | 2012 |
Survey on Astroturfing Detection and Analysis from an Information Technology Perspective T Chen, J Liu, Y Wu, Y Tian, E Tong, W Niu, Y Li, Y Xiang, W Wang Security and Communication Networks 2021, 1-16, 2021 | 3 | 2021 |
Congestion attack detection in intelligent traffic signal system: combining empirical and analytical methods Y Xiang, W Niu, E Tong, Y Li, B Jia, Y Wu, J Liu, L Chang, G Li Security and Communication Networks 2021, 1-17, 2021 | 3 | 2021 |