


default search action
Fei Tong 0001
Person information
- affiliation: Southeast University, School of Cyber Science and Engineering, Nanjing, China
- affiliation (PhD 2016): University of Victoria, Department of Computer Science, Victoria, BC, Canada
Other persons with the same name
- Fei Tong — disambiguation page
- Fei Tong 0002
— University of New Brunswick, Department of Geodesy and Geomatics Engineering, Fredericton, NB, Canada
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j43]Chenyu Zhang, Zhihai Tang, Fei Tong
:
LEGEM: A Scalable and Adversarial-Resilient Framework for Cross-Platform IoT Binary Vulnerability Detection. IEEE Internet Things J. 13(1): 1379-1389 (2026)- 2025
[j42]Fangyuan Xing, Zhiquan Jiang, Yutian Tan, Fei Tong:
Trust management for underwater Internet of Things: A combined hidden Markov and cloud model approach. Ad Hoc Networks 178: 104000 (2025)
[j41]Yuhan Liu
, Zihang Yang
, Fei Tong
, Liang Cheng, Ming Ling
:
Camulator: A Lightweight and Extensible Trace-Driven Cache Simulator for Embedded Multicore SoCs. IEEE Comput. Archit. Lett. 24(2): 229-232 (2025)
[j40]Guanghui Wang
, Xueyuan Zhang
, Lingfeng Shen
, Shengbo Chen
, Fei Tong, Xin He
, Wenyao Li:
Achieving efficient and accurate privacy-preserving localization for internet of things: A quantization-based approach. Future Gener. Comput. Syst. 167: 107740 (2025)
[j39]Fangyuan Xing
, Fei Tong
, Xiaonan Liu
, Zhenduo Wang
, Victor C. M. Leung
:
Precoding Optimization for Rate Splitting Enabled Internet of Underwater Things Over Optical Wireless Underwater Turbulent Channels. IEEE Internet Things J. 12(14): 26782-26798 (2025)
[j38]Xueji Yang
, Fei Tong
, Fang Jiang, Guang Cheng
:
A Lightweight and Dynamic Open-Set Intrusion Detection for Industrial Internet of Things. IEEE Trans. Inf. Forensics Secur. 20: 2930-2943 (2025)
[j37]Xiaoyu Cheng
, Fei Tong
, Zhe Zhou
, Fang Jiang, Hongyu Wang
, Guang Cheng
, Yuxing Mao
:
SCSGuardian: A Practical Hardware Defense Against Speculative Cache Side-Channel Attacks. IEEE Trans. Inf. Forensics Secur. 20: 8833-8847 (2025)
[j36]Fei Tong
, Zihao Li
, Guang Cheng
, Yujian Zhang
, Heng Li
:
sBugChecker: A Systematic Framework for Detecting Solidity Compiler-Introduced Bugs. IEEE Trans. Inf. Forensics Secur. 20: 9760-9775 (2025)
[j35]Yuanhang Zhou
, Fei Tong
, Chunming Kong
, Shibo He
, Guang Cheng
:
Towards Efficient, Robust, and Privacy-Preserving Incentives for Crowdsensing via Blockchain. IEEE Trans. Mob. Comput. 24(8): 7136-7151 (2025)
[j34]Yuanhang Zhou
, Shubo Peng, Hanzheng Lyu
, Fei Tong
, Chengqiang Huang, Jianyu Niu
:
KLOTSKI: Towards Consensus Enabled Collaborative Vehicles in Intelligent Transportation. IEEE Trans. Veh. Technol. 74(12): 18620-18634 (2025)
[c31]Fang Jiang, Fei Tong, Xiaoyu Cheng, Zhe Zhou, Hongyu Wang, Yuxing Mao:
SpectrePrefetch: Undermining Cache-Centric Secure Speculation with Modern Hardware Prefetchers. ICCAD 2025: 1-9- 2024
[j33]Fei Tong
, Cheng Chen, Jianping Pan
:
A Novel Detection and Localization Scheme for Wormhole Attack in Internet of Things. IEEE Internet Things J. 11(4): 7141-7152 (2024)
[j32]Fangyuan Xing
, Fei Tong
, Jialong Yang
, Guang Cheng
, Shibo He
:
RAM: A Resource-Aware DDoS Attack Mitigation Framework in Clouds. IEEE Trans. Cloud Comput. 12(4): 1387-1400 (2024)
[j31]Fei Tong
, Yuanhang Zhou
, Kaiming Wang
, Guang Cheng
, Jianyu Niu
, Shibo He
:
A Privacy-Preserving Incentive Mechanism for Mobile Crowdsensing Based on Blockchain. IEEE Trans. Dependable Secur. Comput. 21(6): 5071-5085 (2024)
[j30]Fei Tong
, Bowen Ding
, Yujian Zhang, Shibo He
, Yuyang Peng
:
A Single-Anchor Mobile Localization Scheme. IEEE Trans. Mob. Comput. 23(1): 56-69 (2024)
[j29]Yuanhang Zhou
, Fei Tong
, Shibo He
:
Bi-Objective Incentive Mechanism for Mobile Crowdsensing With Budget/Cost Constraint. IEEE Trans. Mob. Comput. 23(1): 223-237 (2024)
[j28]Guanghui Wang
, Yajie Li, Rui Liu
, Fei Tong
, Jianping Pan
, Fang Zuo
, Xin He
:
Enhancing Privacy-Preserving Localization by Integrating Random Noise With Blockchain in Internet of Things. IEEE Trans. Netw. Serv. Manag. 21(2): 2445-2459 (2024)
[c30]Xiaoyu Cheng, Fei Tong, Hongyu Wang, Zhe Zhou, Fang Jiang, Yuxing Mao:
SpecLFB: Eliminating Cache Side Channels in Speculative Executions. USENIX Security Symposium 2024- 2023
[j27]Yujian Zhang
, Mingde Li, Fei Tong:
Energy-efficient load balancing for divisible tasks on heterogeneous clusters. Trans. Emerg. Telecommun. Technol. 34(10) (2023)
[j26]Fei Tong
, Xing Chen
, Cheng Huang
, Yujian Zhang, Xuemin Shen
:
Blockchain-Assisted Secure Intra/Inter-Domain Authorization and Authentication for Internet of Things. IEEE Internet Things J. 10(9, May 1): 7761-7773 (2023)
[j25]Yuwei Xu
, Enze Yu
, Yuxing Song
, Fei Tong
, Qiao Xiang, Liang He
:
$\mathcal {R}$-Tracing: Consortium Blockchain-Based Vehicle Reputation Management for Resistance to Malicious Attacks and Selfish Behaviors. IEEE Trans. Veh. Technol. 72(6): 7095-7110 (2023)
[c29]Jiao Ma, Fei Tong:
SA-SWS: A Self-Adaptive Sleep/Wake-Up Scheduling Approach for Linear Sensor Networks. ICCC 2023: 1-6- 2022
[j24]Chaorong Zhang
, Yuyang Peng
, Jun Li
, Fei Tong
:
An IRS-Aided GSSK Scheme for Wireless Communication System. IEEE Commun. Lett. 26(6): 1398-1402 (2022)
[j23]Fei Tong
, Tian Zhu, Yuyang Peng:
Interference and secrecy analysis based on randomly spacial model in clustered WSNs. IET Commun. 16(19): 2278-2292 (2022)
[j22]Yujian Zhang
, Yuhao Luo, Xing Chen
, Fei Tong
, Yuwei Xu, Jun Tao, Guang Cheng:
A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross-Domain IoT. Secur. Commun. Networks 2022: 9686049:1-9686049:15 (2022)
[j21]Fei Tong
, Xing Chen
, Kaiming Wang
, Yujian Zhang:
CCAP: A Complete Cross-Domain Authentication Based on Blockchain for Internet of Things. IEEE Trans. Inf. Forensics Secur. 17: 3789-3800 (2022)
[c28]Cheng Chen, Fei Tong, Yujian Zhang, Ziyan Zhu:
A Novel Detection and Localization Scheme of Wormhole Attack in IoT Network. ASCC 2022: 1983-1988
[c27]Yujian Zhang, Mingde Li, Fei Tong:
An Energy-Efficient Load Balancing Scheme in Heterogeneous Clusters by Linear Programming. ICCCN 2022: 1-10
[c26]Qin Xiong, Yujian Zhang, Junhao Li, Fei Tong:
Enhancing Security of Certificate Authorities by Blockchain-based Domain Transparency. ICPADS 2022: 304-311
[c25]Zhe Zhou, Xiaoyu Cheng, Yang Sun, Fang Jiang, Fei Tong, Yuxing Mao, Ruilin Wang:
Cache Design Effect on Microarchitecture Security: A Contrast between Xuantie-910 and BOOM. TrustCom 2022: 1199-1204
[c24]Kai Gao, Fei Tong, Yujian Zhang:
Intrusion Detection Based on Statistical Analysis for RPL-based Internet of Things. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 681-688- 2021
[j20]Yujian Zhang
, Chuanyou Li, Fei Tong, Yuwei Xu:
A variable neighborhood search algorithm for energy conscious task scheduling in heterogeneous computing systems. Concurr. Comput. Pract. Exp. 33(24) (2021)
[j19]Zhentao Huang
, Yuyang Peng
, Jun Li
, Fei Tong
, Konglin Zhu
, Limei Peng
:
Secrecy Enhancing of SSK Systems for IoT Applications in Smart Cities. IEEE Internet Things J. 8(8): 6385-6392 (2021)
[c23]Ziyan Zhu, Fei Tong
, Cheng Chen:
Security Performance Analysis for Cellular Mobile Communication System with Randomly-Located Eavesdroppers. ICA3PP (3) 2021: 479-493
[c22]Simeng Wang, Xing Chen
, Fei Tong, Yujian Zhang:
RSU-Aided Authentication for VANET Based on Consortium Blockchain. ICPADS 2021: 324-331
[c21]Fei Tong, Rucong Sui, Yujian Zhang, Wan Tang:
MPDC: A Multi-channel Pipelined Data Collection MAC for Duty-Cycled Linear Sensor Networks. WASA (2) 2021: 550-562
[i4]Ziyan Zhu, Fei Tong:
The Distance Distribution between Mobile Node and Reference Node in Regular Hexagon. CoRR abs/2111.06553 (2021)- 2020
[j18]Xiufang Shi
, Fei Tong
, Wen-An Zhang
, Li Yu
:
Resilient Privacy-Preserving Distributed Localization Against Dishonest Nodes in Internet of Things. IEEE Internet Things J. 7(9): 9214-9223 (2020)
[j17]Fei Tong
, Yuyang Peng:
A Data-Gathering, Dynamic Duty-Cycling MAC Protocol for Large-Scale Wireless Sensor Networks. Sensors 20(15): 4071 (2020)
[j16]Quanwei Zhang, Dazhong Li, Yue Fei, Jiakang Zhang, Yu Chen, Fei Tong
:
RDCPF: A Redundancy-Based Duty-Cycling Pipelined-Forwarding MAC for Linear Sensor Networks. Sensors 20(19): 5608 (2020)
[j15]Lei Shu, Yuanfang Chen
, Zhihong Sun, Fei Tong
, Mithun Mukherjee
:
Detecting the Dangerous Area of Toxic Gases with Wireless Sensor Networks. IEEE Trans. Emerg. Top. Comput. 8(1): 137-147 (2020)
[c20]Fei Tong, Yujian Zhang, Jun Tao, Guanghui Wang
, Xiufang Shi, Guang Cheng:
EPDC: An Enhanced Pipelined Data Collection MAC for Duty-Cycled Linear Sensor Networks. VTC Fall 2020: 1-5
[c19]Yujian Zhang, Fei Tong, Yuwei Xu, Jun Tao, Guang Cheng:
A Privacy-Preserving Authentication Scheme for VANETs based on Consortium Blockchain. VTC Fall 2020: 1-6
[c18]Tian Zhu, Fei Tong:
A Cluster-based Cooperative Jamming Scheme for Secure Communication in Wireless Sensor Network. VTC Fall 2020: 1-5
2010 – 2019
- 2019
[j14]Fei Tong
, Shibo He
, Jianping Pan
:
Modeling and Analysis for Data Collection in Duty-Cycled Linear Sensor Networks With Pipelined-Forwarding Feature. IEEE Internet Things J. 6(6): 9489-9502 (2019)
[j13]Fei Tong
, Yuyi Sun
, Shibo He
:
On Positioning Performance for the Narrow-Band Internet of Things: How Participating eNBs Impact? IEEE Trans. Ind. Informatics 15(1): 423-433 (2019)
[j12]Fei Tong
, Shibo He
, Yuyang Peng
, Zhiguo Shi
:
A Tractable Analysis of Positioning Fundamentals in Low-Power Wide Area Internet of Things. IEEE Trans. Veh. Technol. 68(7): 7024-7034 (2019)
[c17]Jun Tao, Xiaoyan Li, Jinghao Li, Qian Fang, Zuyan Wang
, Fei Tong:
Similarity-Guided Multimedia Recommendation in Heterogeneous Information Network. GLOBECOM 2019: 1-6
[c16]Fei Tong, Guanghui Wang, Xiufang Shi:
A Novel Single Anchor Localization Mechanism Employing Target Movement. HPSR 2019: 1-5
[c15]Guanghui Wang, Yifan Xu, Fei Tong, Jianping Pan
, Subin Shen:
Modeling and Analyzing Single Anchor Localization for Internet of Things. ICC 2019: 1-6
[i3]Ross Pure, Salman Durrani, Fei Tong, Jianping Pan:
Distance Distribution Between Two Random Nodes in Arbitrary Polygons. CoRR abs/1903.07757 (2019)- 2018
[j11]Yuyi Sun
, Fei Tong
, Zhikun Zhang
, Shibo He
:
Throughput Modeling and Analysis of Random Access in Narrowband Internet of Things. IEEE Internet Things J. 5(3): 1485-1493 (2018)
[c14]Sadia Batool, Fei Tong, Songyuan Li, Shibo He:
Direction Based Charging in Rechargeable Wireless Sensor Network. IoTaaS 2018: 401-408- 2017
[j10]Yuyang Peng, Fawaz AL-Hazemi
, Raouf Boutaba, Fei Tong, Il-Sun Hwang, Chan-Hyun Youn:
Enhancing Energy Efficiency via Cooperative MIMO in Wireless Sensor Networks: State of the Art and Future Research Directions. IEEE Commun. Mag. 55(11): 47-53 (2017)
[j9]Jun Tao, Yifan Xu, Ziyi Zhang, Fuqin Feng, Fei Tong, Fang Dong:
A resource allocation game with restriction mechanism in VANET cloud. Concurr. Comput. Pract. Exp. 29(14) (2017)
[j8]Fei Tong
, Jianping Pan
:
ADC: an Adaptive Data Collection Protocol with Free Addressing and Dynamic Duty-Cycling for Sensor Networks. Mob. Networks Appl. 22(5): 983-994 (2017)
[j7]Fei Tong
, Jianping Pan
:
Random-to-Random Nodal Distance Distributions in Finite Wireless Networks. IEEE Trans. Veh. Technol. 66(11): 10070-10083 (2017)
[j6]Fei Tong
, Ying Wan, Lei Zheng, Jianping Pan
, Lin Cai
:
A Probabilistic Distance-Based Modeling and Analysis for Cellular Networks With Underlaying Device-to-Device Communications. IEEE Trans. Wirel. Commun. 16(1): 451-463 (2017)
[c13]Fei Tong, Shibo He, Jianping Pan
:
Distance Distribution-Based Modeling and Analysis for Pipelined-Forwarding Sensor Networks. GLOBECOM 2017: 1-6- 2016
[b1]Fei Tong:
Protocol design and performance evaluation for wireless ad hoc networks. University of Victoria, Canada, 2016
[j5]Fei Tong
, Lei Zheng, Maryam Ahmadi, Minming Ni, Jianping Pan
:
Modeling and Analyzing Duty-Cycling Pipelined-Scheduling MAC for Linear Sensor Networks. IEEE Trans. Veh. Technol. 65(4): 2608-2620 (2016)
[c12]Fei Tong, Jianping Pan
, Ruonan Zhang:
Distance Distributions in Finite Ad Hoc Networks: Approaches, Applications, and Directions. ADHOCNETS 2016: 167-179
[c11]Fei Tong, Jianping Pan
:
Adaptive Data Collection with Free Addressing and Dynamic Duty-Cycling for Sensor Networks. QSHINE 2016: 212-222
[c10]Maryam Tanha, Seyed Dawood Sajjadi Torshizi
, Fei Tong, Jianping Pan
:
Disaster Management and Response for Modern Cellular Networks Using Flow-Based Multi-Hop Device-to-Device Communications. VTC Fall 2016: 1-7
[i2]Fei Tong, Jianping Pan:
Random Distances Associated with Arbitrary Polygons: An Algorithmic Approach between Two Random Points. CoRR abs/1602.03407 (2016)- 2015
[j4]Minming Ni, Lei Zheng, Fei Tong, Jianping Pan
, Lin Cai
:
A Geometrical-Based Throughput Bound Analysis for Device-to-Device Communications in Cellular Networks. IEEE J. Sel. Areas Commun. 33(1): 100-110 (2015)
[j3]Jinsong Gui, Maryam Ahmadi, Fei Tong:
Dynamically constructing and maintaining virtual access points in a macro cell with selfish nodes. J. Syst. Softw. 108: 1-22 (2015)
[c9]Jun Tao, Yaodan Hu, Fei Tong, Jianping Pan
:
Data sweeping in deterministic trajectories-covered Wireless Sensor Networks. ICC 2015: 6312-6317
[c8]Maryam Ahmadi, Fei Tong, Lei Zheng, Jianping Pan
:
Performance analysis for two-tier cellular systems based on probabilistic distance models. INFOCOM 2015: 352-360- 2014
[j2]Lei Zhang, Lin Cai
, Jianping Pan
, Fei Tong:
A New Approach to the Directed Connectivity in Two-Dimensional Lattice Networks. IEEE Trans. Mob. Comput. 13(11): 2458-2472 (2014)
[c7]Fei Tong, Lei Zheng, Maryam Ahmadi, Minming Ni, Jianping Pan
:
Modeling duty-cycling MAC protocols with pipelined scheduling for linear sensor networks. ICCC 2014: 813-817
[c6]Maryam Ahmadi, Jianping Pan
, Lei Zheng, Lin Cai
, Fei Tong:
Poster: geometrical distance distribution for modeling performance metrics in wireless communication networks. MobiCom 2014: 341-344
[i1]Minming Ni, Lei Zheng, Fei Tong, Jianping Pan, Lin Cai:
A Geometrical-Based Throughput Bound Analysis for Device-to-Device Communications in Cellular Networks. CoRR abs/1404.2366 (2014)- 2013
[c5]Fei Tong, Minming Ni, Lei Shu
, Jianping Pan
:
A Pipelined-forwarding, Routing-integrated and effectively-Identifying MAC for large-scale WSN. GLOBECOM 2013: 225-230- 2011
[j1]Fei Tong
, Rong Xie, Lei Shu
, Young-Chon Kim:
A Cross-Layer Duty Cycle MAC Protocol Supporting a Pipeline Feature for Wireless Sensor Networks. Sensors 11(5): 5183-5201 (2011)
[c4]Fei Tong, Wan Tang, Rong Xie, Lei Shu
, Young-Chon Kim:
P-MAC: A Cross-Layer Duty Cycle MAC Protocol Towards Pipelining for Wireless Sensor Networks. ICC 2011: 1-5
[c3]Rong Xie, Fei Tong, Dong-Ki Kang, Young-Chon Kim:
A reconfigurable routing protocol for free space optical sensor network. ICOIN 2011: 165-170
[c2]Rong Xie, Fei Tong, Won-Hyuk Yang, Young-Chon Kim:
An Energy Considered Routing Protocol of Free Space Optical Sensor Network. NTMS 2011: 1-5- 2010
[c1]Won-Hyuk Yang, Dong-Ki Kang, Fei Tong, Young-Chon Kim:
Performance Analysis of Energy Savings according to Traffic Patterns in Ethernet with Rate Adaptation. UKSim 2010: 619-624
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-02-19 01:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







