


default search action
Fei Tong
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Fei Tong 0001
— Southeast University, School of Cyber Science and Engineering, Nanjing, China (and 1 more) - Fei Tong 0002
— University of New Brunswick, Department of Geodesy and Geomatics Engineering, Fredericton, NB, Canada
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j8]Lin Li, Yiqi Feng
, Yinan Guo, Ru Lei
, Fei Tong, Zuowei Zhang
, Linkai Cai:
Feasibility-guided momentum prediction for dynamic constrained multi-objective optimization. Expert Syst. Appl. 299: 129978 (2026)- 2025
[j7]Fei Tong
, Dongqing Bai, Xufei Ma
, Lin Cheng, Jie Yang, Xiangyu Cao:
Ahybrid ICEEMDAN-BO-GRU model for real-time grouting parameter prediction. Appl. Soft Comput. 185: 113912 (2025)
[j6]Lina Ma
, Zhiwei Zhang
, Fei Tong
, Shaobin Liu
, Changzhan Gu:
A Compact Co-Linearly Polarized Full-Duplex Patch Antenna With High Isolation and Broadside Symmetrical Radiation Pattern for Integrated Sensing and Communication in IoT. IEEE Internet Things J. 12(12): 21630-21645 (2025)
[j5]Yuanyuan Cai, Fei Tong, Qingchuan Zhang, Haitao Xiong:
Multi-task learning framework using tri-encoder with caption prompt for multimodal aspect-based sentiment analysis. J. Supercomput. 81(6): 791 (2025)
[i4]Zhe Zhou, Fei Tong, Hongyu Wang, Xiaoyu Cheng, Fang Jiang, Zhikun Zhang, Yuxing Mao:
CIBPU: A Conflict-Invisible Secure Branch Prediction Unit. CoRR abs/2501.10983 (2025)- 2024
[c16]Haitham H. Mahmoud, Adel Aneiba, Ziming He, Fei Tong, Liucheng Guo, A. Taufiq Asyhari, Ziwei Wang, Zhen Gao:
Intelligent Network Optimisation for Beyond 5G Networks Considering Packet Drop Rate. ICIT 2024: 1-6
[c15]Yuanhang Zhou, Chunming Kong, Fei Tong:
Enabling Privacy-Preserving Incentives for Blockchain-Based Mobile Crowdsensing. MSN 2024: 1208-1209
[c14]Fei Tong, Kaijing Hu, Wei Li, Shaohua Yu, Weihua Lian, Hanqi Zhao, Bin Wu, Danke Hong, Ming Luo, Qianggao Hu, Jian Xu:
Measurement of optical signal state of polarization in OPGW under lightning strike condition. OFC 2024: 1-3
[c13]Fei Tong, Jingtao Liu
, Changzhan Gu, Junfa Mao
:
Displacement Motion Sensing with Asynchronous Bandpass Sampling Using a Single-Channel Dual-PLL SSB low-IF Doppler Radar. WiSNeT 2024: 22-25
[i3]Fang Jiang, Fei Tong, Hongyu Wang, Xiaoyu Cheng, Zhe Zhou, Ming Ling, Yuxing Mao:
PCG: Mitigating Conflict-based Cache Side-channel Attacks with Prefetching. CoRR abs/2405.03217 (2024)- 2023
[j4]Fei Tong, Jie Yang, Chengzhi Zheng, Lin Cheng
, XuFei Ma, Gaochao Li:
Research on the Comprehensive Evaluation of Grouting Quality Based on Fuzzy Rock Engineering System and Variable Fuzzy Set Theory. Int. J. Fuzzy Syst. 25(3): 1191-1212 (2023)
[c12]Xia Deng, Guole Lin, Le Chang, Fei Tong:
Deep Reinforcement Learning for QoE-Aware Offloading in Space-Terrestrial Integrated Networks. MSN 2023: 246-253
[c11]Iqra Akram, Yi Ma, Ziming He
, Fei Tong:
Learning the Long-term Memory Effect of Power Amplifiers Using Temporal Convolutional Network. VTC Fall 2023: 1-6- 2022
[j3]Ziming He
, Fei Tong:
Residual RNN Models With Pruning for Digital Predistortion of RF Power Amplifiers. IEEE Trans. Veh. Technol. 71(9): 9735-9750 (2022)
[c10]Jinfei Wang
, Yi Ma, Na Yi, Rahim Tafazolli
, Fei Tong:
Constellation-Oriented Perturbation for Scalable-Complexity MIMO Nonlinear Precoding. GLOBECOM 2022: 2413-2418- 2021
[c9]Megumi Nakao
, Fei Tong, Mitsuhiro Nakamura
, Tetsuya Matsuda
:
Image-to-Graph Convolutional Network for Deformable Shape Reconstruction from a Single Projection Image. MICCAI (4) 2021: 259-268
[c8]Ziming He
, Fei Tong:
A Novel Time-Of-Arrival Estimation Approach with Channel Frequency Response Reconstruction in OFDM systems. PIMRC 2021: 1085-1090
[c7]Ziming He
, Fei Tong:
Spoofing Attack Detection Approaches based on Indoor Channel Continuity in IEEE 802.11 Wireless Local Area Networks. VTC Fall 2021: 1-6
[i2]Megumi Nakao, Fei Tong, Mitsuhiro Nakamura, Tetsuya Matsuda:
Image-to-Graph Convolutional Network for Deformable Shape Reconstruction from a Single Projection Image. CoRR abs/2108.12533 (2021)- 2020
[c6]Toshiharu Sugie, Fei Tong, Brian D. O. Anderson, Zhiyong Sun
:
On global convergence of area-constrained formations of hierarchical multi-agent systems. CDC 2020: 2805-2810
[c5]Fei Tong, Megumi Nakao, Shuqiong Wu
, Mitsuhiro Nakamura
, Tetsuya Matsuda:
X-ray2Shape: Reconstruction of 3D Liver Shape from a Single 2D Projection Image. EMBC 2020: 1608-1611
[i1]Toshiharu Sugie, Fei Tong, Brian D. O. Anderson, Zhiyong Sun
:
On global convergence of area-constrained formations of hierarchical multi-agent systems. CoRR abs/2009.03048 (2020)
2010 – 2019
- 2018
[j2]Hua Chen
, Shen Xu, Lulu Chu, Fei Tong, Lei Chen:
Finite-Time Switching Control of Nonholonomic Mobile Robots for Moving Target Tracking Based on Polar Coordinates. Complex. 2018: 7360643:1-7360643:9 (2018)- 2017
[j1]Fei Tong, Zheng Yan
:
A hybrid approach of mobile malware detection in Android. J. Parallel Distributed Comput. 103: 22-31 (2017)
[c4]Lin Li, Fei Tong, Rustam Stolkin, Jinwen Hu, Feng Yang:
Joint sparse learning for classification ensemble. ICCA 2017: 1043-1048- 2014
[c3]Tianli Dang, Zheng Yan
, Fei Tong, Weidong Zhang, Peng Zhang:
Implementation of a Trust-Behavior Based Reputation System for Mobile Applications. BWCCA 2014: 221-228
2000 – 2009
- 2005
[c2]Yufeng Chao, Fei Tong:
The problems in the implementation of e-government administration, the analysis and strategies. ICEC 2005: 529-531
[c1]Fei Tong, Xiaohui Zhou, Siqing Liu:
The value chain of mobile e-payment. ICEC 2005: 880-882
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-15 23:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







