


default search action
Shen Dong
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j7]Chuangzhi Li
, Tianlei Zang, Buxiang Zhou, Shen Dong, Xiaoshun Zhang:
Residual classifier assisted robust optimization for resilience enhancement of power system against cyber attack. Reliab. Eng. Syst. Saf. 265: 111599 (2026)
[j6]Shen Dong
, Buxiang Zhou
, Tianlei Zang
, Chuangzhi Li
, Huan Luo
, Jiaqi Ruan
, Shi Chen, Xianyong Xiao
:
Post-Disaster Multi-Timescale Coordinated Restoration of Power and Thermal Cyber-Physical System Considering Hot Standby Resources. IEEE Trans. Smart Grid 17(1): 634-649 (2026)- 2025
[j5]Shen Dong
, Buxiang Zhou
, Tianlei Zang
, Huan Luo
, Shi Chen
, Xianyong Xiao
, Jizhong Zhu
:
Communication Topology Robust Coordinated Planning of Power and Thermal Cyber-Physical Systems With Decision-Dependent Uncertain Demand. IEEE Internet Things J. 12(11): 15166-15180 (2025)
[j4]Shen Dong
, Jing Xiao
, Zhen Zhang
, Huawei Li, Liang Liao:
Multiscale Spatial-Spectral Attention Network for Hyperspectral Image Compressed Sensing. IEEE Geosci. Remote. Sens. Lett. 22: 1-5 (2025)
[c12]Pengfei He, Yuping Lin, Shen Dong, Han Xu, Yue Xing, Hui Liu:
Red-Teaming LLM Multi-Agent Systems via Communication Attacks. ACL (Findings) 2025: 6726-6747
[c11]Tianyu Zhang, Shen Dong, Oyku Deniz Kose, Yanning Shen, Yupeng Zhang:
FairZK: A Scalable System to Prove Machine Learning Fairness in Zero-Knowledge. SP 2025: 3460-3478
[i6]Pengfei He, Yupin Lin, Shen Dong, Han Xu, Yue Xing, Hui Liu:
Red-Teaming LLM Multi-Agent Systems via Communication Attacks. CoRR abs/2502.14847 (2025)
[i5]Shen Dong, Shaochen Xu, Pengfei He, Yige Li, Jiliang Tang, Tianming Liu, Hui Liu, Zhen Xiang:
A Practical Memory Injection Attack against LLM Agents. CoRR abs/2503.03704 (2025)
[i4]Tianyu Zhang, Shen Dong, O. Deniz Kose, Yanning Shen, Yupeng Zhang:
FairZK: A Scalable System to Prove Machine Learning Fairness in Zero-Knowledge. CoRR abs/2505.07997 (2025)
[i3]Pengfei He, Yue Xing, Shen Dong, Juanhui Li, Zhenwei Dai, Xianfeng Tang, Hui Liu, Han Xu, Zhen Xiang, Charu C. Aggarwal, Hui Liu:
Comprehensive Vulnerability Analysis is Necessary for Trustworthy LLM-MAS. CoRR abs/2506.01245 (2025)
[i2]Shen Dong, Mingxuan Zhang, Pengfei He, Li Ma, Bhavani Thuraisingham, Hui Liu, Yue Xing:
PEAR: Planner-Executor Agent Robustness Benchmark. CoRR abs/2510.07505 (2025)- 2024
[i1]Shen Dong, Hongrui Cui, Kaiyi Zhang, Kang Yang, Yu Yu:
A Simple Post-Quantum Oblivious Transfer Protocol from Mod-LWR. IACR Cryptol. ePrint Arch. 2024: 1116 (2024)- 2020
[j3]Jiahao Li
, Shen Dong, Erin K. Chiou
, Jie Xu
:
Reciprocity and Its Neurological Correlates in Human-Agent Cooperation. IEEE Trans. Hum. Mach. Syst. 50(5): 384-394 (2020)
2010 – 2019
- 2018
[c10]Sun Qi, Li Minzhi, Shen Dong, Zhou Yu:
Research on Fast Algorithm for General Bistatic SAR Raw Signal. RFID-TA 2018: 1-5- 2011
[c9]Shen Dong, Liguang Sun, Tanghsien Chang, Huapu Lu:
Combined short-term traffic flow forecast model for Beijing Traffic Forecast System. ITSC 2011: 638-643- 2010
[c8]Shen Dong, Xiao Qin, Yi Zhang, Qixin Shi, Bin Ran:
Dynamic network flow modeling based on cell probe data. Intelligent Vehicles Symposium 2010: 1140-1145
2000 – 2009
- 2009
[c7]Liwei Li
, Qiwen Ran, Shen Dong:
Wavelet Time Series ARMA Prediction on Cutting Vibration in Diamond Turning. CAR 2009: 142-146
[c6]Shen Dong, Qixin Shi, Lingge Zhang:
Greenhouse gas emissions reduction of commuting in beijing olympic games. ITSC 2009: 1-6- 2007
[b1]Shen Dong:
Quadrilateral Remeshing and Efficient Surface Parameterization. University of Illinois Urbana-Champaign, USA, 2007
[c5]Shen Dong, Michael Garland:
Iterative Methods for Improving Mesh Parameterizations. Shape Modeling International 2007: 199-210- 2006
[j2]Shen Dong, Peer-Timo Bremer, Michael Garland, Valerio Pascucci
, John C. Hart:
Spectral surface quadrangulation. ACM Trans. Graph. 25(3): 1057-1066 (2006)
[c4]Shen Dong, Fazel Naghdy:
Application of Competitive Clustering to Acquisition of Human Manipulation Skills Acquisition. FUZZ-IEEE 2006: 78-83- 2005
[j1]Shen Dong, Scott Kircher, Michael Garland:
Harmonic functions for quadrilateral remeshing of arbitrary manifolds. Comput. Aided Geom. Des. 22(5): 392-423 (2005)
[c3]Shen Dong, Fazel Naghdy:
Application of Competitive Clustering to Acquisition of Human Manipulation Skills. CIMCA/IAWTIC 2005: 1092-1097
[c2]Shen Dong, Fazel Naghdy:
Manipulation Skills Acquisition and Classification from Haptic Rendered Virtual Environment. CSREA HCI 2005: 103-108
[c1]Shen Dong, Fazel Naghdy:
Manipulation Skills Acquisition through State Classification and Dimension Decrease. ICTAI 2005: 392-396
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-10 00:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







