Endong Tong

480 total citations
38 papers, 269 citations indexed

About

Endong Tong is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Endong Tong has authored 38 papers receiving a total of 269 indexed citations (citations by other indexed papers that have themselves been cited), including 15 papers in Computer Networks and Communications, 13 papers in Artificial Intelligence and 10 papers in Information Systems. Recurrent topics in Endong Tong's work include Adversarial Robustness in Machine Learning (9 papers), IoT and Edge/Fog Computing (6 papers) and Energy Efficient Wireless Sensor Networks (6 papers). Endong Tong is often cited by papers focused on Adversarial Robustness in Machine Learning (9 papers), IoT and Edge/Fog Computing (6 papers) and Energy Efficient Wireless Sensor Networks (6 papers). Endong Tong collaborates with scholars based in China, Australia and United States. Endong Tong's co-authors include Wenjia Niu, Jiqiang Liu, Zhen Han, Gang Li, Liang Chang, Zhongzhi Shi, Ci Song, Lan Chen, Thar Baker and Bo Zhang and has published in prestigious journals such as Applied Sciences, IEEE Network and Journal of Network and Computer Applications.

In The Last Decade

Endong Tong

31 papers receiving 260 citations

Peers

Endong Tong
Khalid Aloufi Saudi Arabia
Endong Tong
Citations per year, relative to Endong Tong Endong Tong (= 1×) peers Khalid Aloufi

Countries citing papers authored by Endong Tong

Since Specialization
Citations

This map shows the geographic impact of Endong Tong's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Endong Tong with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Endong Tong more than expected).

Fields of papers citing papers by Endong Tong

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Endong Tong. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Endong Tong. The network helps show where Endong Tong may publish in the future.

Co-authorship network of co-authors of Endong Tong

This figure shows the co-authorship network connecting the top 25 collaborators of Endong Tong. A scholar is included among the top collaborators of Endong Tong based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Endong Tong. Endong Tong is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Tong, Endong, et al.. (2024). Improving the Robustness of Pedestrian Detection in Autonomous Driving With Generative Data Augmentation. IEEE Network. 38(3). 63–69. 6 indexed citations
2.
Baker, Thar, Gang Li, Endong Tong, et al.. (2024). Reinforcement Learning-Based Security Enhancement for Controlled Optimization of Phases in Intelligent Traffic Signal System. University of Brighton Repository (University of Brighton). 2. 575–587. 1 indexed citations
3.
Baker, Thar, Endong Tong, Ye Zhu, et al.. (2024). Collaborative Attack Sequence Generation Model Based on Multiagent Reinforcement Learning for Intelligent Traffic Signal System. International Journal of Intelligent Systems. 2024(1). 1 indexed citations
4.
Tong, Endong, et al.. (2023). Robust Reinforcement Learning via Progressive Task Sequence. 455–463. 1 indexed citations
6.
Li, Qiong, et al.. (2023). Backdoor Attack Influence Assessment and Analysis on Multi-Agent Training. abs/2106.07798. 8885–8890.
7.
Gu, Yanfeng, et al.. (2023). Camouflage Backdoor Attack against Pedestrian Detection. Applied Sciences. 13(23). 12752–12752. 2 indexed citations
8.
Cui, Chen, et al.. (2023). Low-Correlation Node Filter-Based Neural Subgraph Matching. 70. 7742–7748.
9.
Niu, Wenjia, et al.. (2022). Multiagent Reinforcement Learning-Based Signal Planning for Resisting Congestion Attack in Green Transportation. IEEE Transactions on Green Communications and Networking. 6(3). 1448–1458. 6 indexed citations
10.
Liu, Jiqiang, Endong Tong, Wenjia Niu, et al.. (2021). Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure. Security and Communication Networks. 2021. 1–13.
11.
Zhao, Shuang, et al.. (2021). Blockchain-based decentralized federated learning: A secure and privacy-preserving system. 941–948. 6 indexed citations
12.
Tong, Endong, et al.. (2020). An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method. Wireless Communications and Mobile Computing. 2020. 1–14. 3 indexed citations
14.
Tong, Endong, et al.. (2020). Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence. Security and Communication Networks. 2020. 1–15. 9 indexed citations
15.
Wang, Xiaojin, Wenjia Niu, Endong Tong, et al.. (2020). Constructing Optimal Sparse Decision Tree for Analying I-SIG System Attack. 3. 321–328. 1 indexed citations
16.
Liu, Jiqiang, et al.. (2019). Adversarial attack and defense in reinforcement learning-from AI security view. Cybersecurity. 2(1). 75 indexed citations
17.
Niu, Wenjia, Endong Tong, Qian Li, et al.. (2015). Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy. Knowledge and Information Systems. 48(1). 111–141. 2 indexed citations
18.
Niu, Wenjia, Gang Li, Endong Tong, et al.. (2014). A block-aware hybrid data dissemination with hotspot elimination in wireless sensor network. Journal of Network and Computer Applications. 44. 120–133.
19.
Tong, Endong, Wenjia Niu, Gang Li, et al.. (2013). Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks. Journal of Network and Computer Applications. 39. 38–51. 20 indexed citations
20.
Niu, Wenjia, Jun Lei, Endong Tong, et al.. (2013). Context-Aware Service Ranking in Wireless Sensor Networks. Journal of Network and Systems Management. 22(1). 50–74. 23 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026