Endong Tong

Orcid: 0000-0003-0348-2108

According to our database1, Endong Tong authored at least 42 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Recognition of Signal Modulation Pattern Based on Multi-task Self-supervised Learning.
Proceedings of the Intelligent Information Processing XII, 2024

2023
A Mutual Information-Based Assessment of Reverse Engineering on Rewards of Reinforcement Learning.
IEEE Trans. Artif. Intell., October, 2023

Mitigating Overfitting for Deep Learning-based Aging-related Bug Prediction via Brain-inspired Regularization in Spiking Neural Networks.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, ISSRE 2023, 2023

Robust Reinforcement Learning via Progressive Task Sequence.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

2022
A Missing QoS Prediction Approach via Time-Aware Collaborative Filtering.
IEEE Trans. Serv. Comput., 2022

Multiagent Reinforcement Learning-Based Signal Planning for Resisting Congestion Attack in Green Transportation.
IEEE Trans. Green Commun. Netw., 2022

Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System.
IEICE Trans. Inf. Syst., 2022

Adapting on Road Traffic-Oriented Controlled Optimization of Phases to Heterogeneous Intersections.
Proceedings of the Intelligent Information Processing XI, 2022

2021
A Hierarchical Energy-Efficient Service Selection Approach With QoS Constraints for Internet of Things.
IEEE Trans. Green Commun. Netw., 2021

Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure.
Secur. Commun. Networks, 2021

Robustness Assessment of Asynchronous Advantage Actor-Critic Based on Dynamic Skewness and Sparseness Computation: A Parallel Computing View.
J. Comput. Sci. Technol., 2021

A Training-Based Identification Approach to VIN Adversarial Examples in Path Planning.
J. Circuits Syst. Comput., 2021

Adversarial retraining attack of asynchronous advantage actor-critic based pathfinding.
Int. J. Intell. Syst., 2021

Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021

Improving Convolutional Neural Network-Based Webshell Detection Through Reinforcement Learning.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

Blockchain-based decentralized federated learning: A secure and privacy-preserving system.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

2020
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method.
Wirel. Commun. Mob. Comput., 2020

Energy-Aware Service Selection and Adaptation in Wireless Sensor Networks with QoS Guarantee.
IEEE Trans. Serv. Comput., 2020

Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence.
Secur. Commun. Networks, 2020

A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection.
Proceedings of the Verification and Evaluation of Computer and Communication Systems, 2020

A Configurable off-Policy Evaluation with Key State-Based Bias Constraints in AI Reinforcement Learning.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Adapt Swarm Path Planning for UAV Based on Artificial Potential Field with Birds Intelligence Extensions.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Constructing Optimal Sparse Decision Tree for Analying I-SIG System Attack.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

Queue Length Estimation Based Defence Against Data Poisoning Attack for Traffic Signal Control.
Proceedings of the Intelligent Information Processing X, 2020

Explainable Congestion Attack Prediction and Software-level Reinforcement in Intelligent Traffic Signal System.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

Exploring Data Correlation between Feature Pairs for Generating Constraint-based Adversarial Examples.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
Adversarial attack and defense in reinforcement learning-from AI security view.
Cybersecur., 2019

Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack.
CoRR, 2019

2016
Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy.
Knowl. Inf. Syst., 2016

Energy Efficient Sleep Schedule with Service Coverage Guarantee in Wireless Sensor Networks.
J. Netw. Syst. Manag., 2016

2015
Recover Fault Services via Complex Service-to-Node Mappings in Wireless Sensor Networks.
J. Netw. Syst. Manag., 2015

2014
A Physical Layer Key Negotiation Mechanism to Secure Wireless Networks.
J. Networks, 2014

Context-Aware Service Ranking in Wireless Sensor Networks.
J. Netw. Syst. Manag., 2014

Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks.
J. Netw. Comput. Appl., 2014

Interaction relationships of caches in agent-based HD video surveillance: Discovery and utilization.
J. Netw. Comput. Appl., 2014

A block-aware hybrid data dissemination with hotspot elimination in wireless sensor network.
J. Netw. Comput. Appl., 2014

Towards Optimal Lifetime in Wireless Sensor Networks for QoS Guaranteed Service Selection.
Proceedings of the PRICAI 2014: Trends in Artificial Intelligence, 2014

2012
Hierarchical Workflow Management in Wireless Sensor Network.
Proceedings of the PRICAI 2012: Trends in Artificial Intelligence, 2012

An Agent Collaboration-Based Data Hierarchical Caching Approach for HD Video Surveillance.
Proceedings of the Agents and Data Mining Interaction - 8th International Workshop, 2012

2011
Reasoning-Based Context-Aware Workflow Management in Wireless Sensor Network.
Proceedings of the Service-Oriented Computing - ICSOC 2011 Workshops, 2011


  Loading...