Adversarial attack and defense in reinforcement learning-from AI security view T Chen, J Liu, Y Xiang, W Niu, E Tong, Z Han Cybersecurity 2 (1), 1-22, 2019 | 132 | 2019 |
Context-aware service ranking in wireless sensor networks W Niu, J Lei, E Tong, G Li, L Chang, Z Shi, S Ci Journal of network and systems management 22, 50-74, 2014 | 41 | 2014 |
物联网情景感知技术研究 童恩栋, 沈强, 雷君, 刘宇, 唐晖 计算机科学 38 (4), 9-14, 2011 | 33 | 2011 |
Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks E Tong, W Niu, G Li, D Tang, L Chang, Z Shi, S Ci Journal of network and computer applications 39, 38-51, 2014 | 29 | 2014 |
Energy-aware service selection and adaptation in wireless sensor networks with QoS guarantee E Tong, L Chen, H Li IEEE Transactions on Services Computing 13 (5), 829-842, 2017 | 28 | 2017 |
Energy efficient sleep schedule with service coverage guarantee in wireless sensor networks B Zhang, E Tong, J Hao, W Niu, G Li Journal of Network and Systems Management 24, 834-858, 2016 | 20 | 2016 |
A missing QoS prediction approach via time-aware collaborative filtering E Tong, W Niu, J Liu IEEE Transactions on Services Computing 15 (6), 3115-3128, 2021 | 18 | 2021 |
用户网络行为画像——大数据中的用户网络行为画像分析与内容推荐应用 牛温佳, 刘击强, 石川 BEIJING BOOK CO. INC., 2016 | 15 | 2016 |
Exposing spoofing attack on flocking-based unmanned aerial vehicle cluster: A threat to swarm intelligence X Huang, Y Tian, Y He, E Tong, W Niu, C Li, J Liu, L Chang Security and Communication Networks 2020, 1-15, 2020 | 11 | 2020 |
Bidirectional RNN-based few-shot training for detecting multi-stage attack D Zhao, J Liu, J Wang, W Niu, E Tong, T Chen, G Li arXiv preprint arXiv:1905.03454, 2019 | 11 | 2019 |
A hierarchical energy-efficient service selection approach with QoS constraints for Internet of Things E Tong, W Niu, Y Tian, J Liu, T Baker, S Verma, Z Liu IEEE Transactions on Green Communications and Networking 5 (2), 645-657, 2021 | 8 | 2021 |
Interaction relationships of caches in agent-based HD video surveillance: Discovery and utilization W Niu, G Li, E Tong, X Yang, L Chang, Z Shi, S Ci Journal of Network and Computer Applications 37, 155-169, 2014 | 8 | 2014 |
Study on context-aware technologies for Internet of Things ED Tong, Q Shen, J Lei, Y Liu, H Tang Computer Science 38 (4), 9, 2011 | 7 | 2011 |
Multiagent reinforcement learning-based signal planning for resisting congestion attack in green transportation Y Li, W Niu, Y Tian, T Chen, Z Xie, Y Wu, Y Xiang, E Tong, T Baker, J Liu IEEE Transactions on Green Communications and Networking 6 (3), 1448-1458, 2022 | 6 | 2022 |
Improving convolutional neural network-based webshell detection through reinforcement learning Y Wu, M Song, Y Li, Y Tian, E Tong, W Niu, B Jia, H Huang, Q Li, J Liu Information and Communications Security: 23rd International Conference …, 2021 | 6 | 2021 |
Congestion attack detection in intelligent traffic signal system: Combining empirical and analytical methods Y Xiang, W Niu, E Tong, Y Li, B Jia, Y Wu, J Liu, L Chang, G Li Security and Communication Networks 2021, 1-17, 2021 | 5 | 2021 |
Hierarchical workflow management in wireless sensor network E Tong, W Niu, G Li, H Tang, D Tang, S Ci Pacific Rim International Conference on Artificial Intelligence, 601-612, 2012 | 5 | 2012 |
Blockchain-based decentralized federated learning: A secure and privacy-preserving system S Zhao, Y Wu, R Sun, X Qian, D Zi, Z Xie, E Tong, W Niu, J Liu, Z Han 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th …, 2021 | 4 | 2021 |
Security analysis of poisoning attacks against multi-agent reinforcement learning Z Xie, Y Xiang, Y Li, S Zhao, E Tong, W Niu, J Liu, J Wang International Conference on Algorithms and Architectures for Parallel …, 2021 | 4 | 2021 |
Robustness Assessment of Asynchronous Advantage Actor-Critic Based on Dynamic Skewness and Sparseness Computation: A Parallel Computing View T Chen, JQ Liu, H Li, SR Wang, WJ Niu, ED Tong, L Chang, QA Chen, ... Journal of Computer Science and Technology 36 (5), 1002-1021, 2021 | 4 | 2021 |