default search action
Liang Tong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Yunlong Tang, Jing Sun, Huan Wang, Junyi Deng, Liang Tong, Wenhong Xu:
A method of network attack-defense game and collaborative defense decision-making based on hierarchical multi-agent reinforcement learning. Comput. Secur. 142: 103871 (2024) - [j5]Yulin Zhu, Liang Tong, Gaolei Li, Xiapu Luo, Kai Zhou:
FocusedCleaner: Sanitizing Poisoned Graphs for Robust GNN-Based Node Classification. IEEE Trans. Knowl. Data Eng. 36(6): 2476-2489 (2024) - 2023
- [c16]Dongjie Wang, Zhengzhang Chen, Jingchao Ni, Liang Tong, Zheng Wang, Yanjie Fu, Haifeng Chen:
Interdependent Causal Networks for Root Cause Localization. KDD 2023: 5051-5060 - [c15]Yizhou Zhang, Jingchao Ni, Wei Cheng, Zhengzhang Chen, Liang Tong, Haifeng Chen, Yan Liu:
Hierarchical Gaussian Mixture based Task Generative Model for Robust Meta-Learning. NeurIPS 2023 - [i9]Dongjie Wang, Zhengzhang Chen, Jingchao Ni, Liang Tong, Zheng Wang, Yanjie Fu, Haifeng Chen:
Hierarchical Graph Neural Networks for Causal Discovery and Root Cause Localization. CoRR abs/2302.01987 (2023) - 2022
- [j4]Honghong Zhang, Xusheng Gan, Ying Liu, Yarong Wu, Jingjuan Sun, Liang Tong, Feng Yang:
Risk assessment framework for low-altitude UAV traffic management. J. Intell. Fuzzy Syst. 42(3): 2775-2792 (2022) - [c14]Liang Tong:
Complex Analysis of Heart Rate on Obstructive Sleep Apnea using Fuzzy Approximate Entropy. BIC 2022: 151-159 - [c13]Tianchun Wang, Wei Cheng, Dongsheng Luo, Wenchao Yu, Jingchao Ni, Liang Tong, Haifeng Chen, Xiang Zhang:
Personalized Federated Learning via Heterogeneous Modular Networks. ICDM 2022: 1197-1202 - [i8]Yulin Zhu, Liang Tong, Kai Zhou:
FocusedCleaner: Sanitizing Poisoned Graphs for Robust GNN-based Node Classification. CoRR abs/2210.13815 (2022) - [i7]Tianchun Wang, Wei Cheng, Dongsheng Luo, Wenchao Yu, Jingchao Ni, Liang Tong, Haifeng Chen, Xiang Zhang:
Personalized Federated Learning via Heterogeneous Modular Networks. CoRR abs/2210.14830 (2022) - 2021
- [c12]Liang Tong, Zhengzhang Chen, Jingchao Ni, Wei Cheng, Dongjin Song, Haifeng Chen, Yevgeniy Vorobeychik:
FaceSec: A Fine-Grained Robustness Evaluation Framework for Face Recognition Systems. CVPR 2021: 13254-13263 - [i6]Liang Tong, Zhengzhang Chen, Jingchao Ni, Wei Cheng, Dongjin Song, Haifeng Chen, Yevgeniy Vorobeychik:
FACESEC: A Fine-grained Robustness Evaluation Framework for Face Recognition Systems. CoRR abs/2104.04107 (2021) - 2020
- [j3]Lin Zhang, Zhe Liu, Tianwei Ren, Diyou Liu, Zhe Ma, Liang Tong, Chao Zhang, Tianying Zhou, Xiaodong Zhang, Shaoming Li:
Identification of Seed Maize Fields With High Spatial Resolution and Multiple Spectral Remote Sensing Using Random Forest Classifier. Remote. Sens. 12(3): 362 (2020) - [c11]Liang Tong, Aron Laszka, Chao Yan, Ning Zhang, Yevgeniy Vorobeychik:
Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning. AAAI 2020: 946-953 - [c10]Tong Wu, Liang Tong, Yevgeniy Vorobeychik:
Defending Against Physically Realizable Attacks on Image Classification. ICLR 2020 - [i5]Liang Tong, Minzhe Guo, Atul Prakash, Yevgeniy Vorobeychik:
Towards Robustness against Unsuspicious Adversarial Examples. CoRR abs/2005.04272 (2020)
2010 – 2019
- 2019
- [c9]Liang Tong, Bo Li, Chen Hajaj, Chaowei Xiao, Ning Zhang, Yevgeniy Vorobeychik:
Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features. USENIX Security Symposium 2019: 285-302 - [i4]Liang Tong, Aron Laszka, Chao Yan, Ning Zhang, Yevgeniy Vorobeychik:
Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning. CoRR abs/1906.08805 (2019) - [i3]Tong Wu, Liang Tong, Yevgeniy Vorobeychik:
Defending Against Physically Realizable Attacks on Image Classification. CoRR abs/1909.09552 (2019) - 2018
- [c8]Liang Zheng, Chao Huo, Xianbo Ke, Fengjie Shen, Gang Zhang, Liang Tong, Jie Wang, Xinyi Liang:
System Protection Controllable Resource Pool Situational Awareness. CCIS 2018: 963-967 - [c7]Liang Tong, Sixie Yu, Scott Alfeld, Yevgeniy Vorobeychik:
Adversarial Regression with Multiple Learners. ICML 2018: 4953-4961 - [i2]Liang Tong, Sixie Yu, Scott Alfeld, Yevgeniy Vorobeychik:
Adversarial Regression with Multiple Learners. CoRR abs/1806.02256 (2018) - 2017
- [i1]Liang Tong, Bo Li, Chen Hajaj, Yevgeniy Vorobeychik:
Feature Conservation in Adversarial Classifier Evasion: A Case Study. CoRR abs/1708.08327 (2017) - 2016
- [c6]Liang Tong, Wei Gao:
Application-aware traffic scheduling for workload offloading in mobile clouds. INFOCOM 2016: 1-9 - [c5]Liang Tong, Yong Li, Wei Gao:
A hierarchical edge cloud architecture for mobile computing. INFOCOM 2016: 1-9 - 2014
- [j2]Xuefeng Yan, Bing Chen, Liang Tong, Xiaolin Hu, Yi Pan:
Adaptive dual cluster heads collaborative target tracking in wireless sensor networks. Int. J. Sens. Networks 15(1): 11-22 (2014) - [c4]Changyue Liu, Supeng Leng, Kun Yang, Liang Tong, Ke Zhang:
A Cooperative-pricing-based Access Selection Mechanism for vehicular heterogeneous networks. ChinaCom 2014: 181-186 - 2013
- [c3]Mao Li, Tigang Jiang, Liang Tong:
Spectrum Handoff Scheme for Prioritized Multimedia Services in Cognitive Radio Network with Finite Buffer. DASC 2013: 410-415 - [c2]Liang Tong, Lixiang Ma, Longjiang Li, Mao Li:
A Coalitional Game Theoretical Model for Content Downloading in Multihop VANETs. DASC 2013: 627-632 - 2011
- [c1]Jie Wang, Liang Tong:
Asynchronous Modeling and Implementation of Web Services Based on JMS. ICIC (1) 2011: 553-559
2000 – 2009
- 2004
- [j1]Jin Chen, Dan He, Liang Tong:
Innovation business process reengineering based on workflow technology: a type of e-innovation. Int. J. Inf. Technol. Manag. 3(1): 20-40 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-10 00:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint