Tong Li
Orcid: 0000-0003-3678-8402Affiliations:
- Guangzhou University, School of Computer Science, China
- Nankai University, College of Computer and Control Engineering, Tianjin, China (PhD 2017)
According to our database1,
Tong Li
authored at least 43 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
ABSyn: An Accurate Differentially Private Data Synthesis Scheme With Adaptive Selection and Batch Processes.
IEEE Trans. Inf. Forensics Secur., 2024
Poison-Tolerant Collaborative Filtering Against Poisoning Attacks on Recommender Systems.
IEEE Trans. Dependable Secur. Comput., 2024
Inf. Sci., 2024
IACR Cryptol. ePrint Arch., 2024
CoRR, 2024
Low-cost fuzzing drone control system for configuration errors threatening flight safety in edge terminals.
Comput. Commun., 2024
Proceedings of the Findings of the Association for Computational Linguistics, 2024
2023
Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm.
Proceedings of the Artificial Intelligence Security and Privacy, 2023
2022
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators.
IEEE Trans. Dependable Secur. Comput., 2022
Building blocks of sharding blockchain systems: Concepts, approaches, and open problems.
Comput. Sci. Rev., 2022
2021
NPMML: A Framework for Non-Interactive Privacy-Preserving Multi-Party Machine Learning.
IEEE Trans. Dependable Secur. Comput., 2021
Proc. VLDB Endow., 2021
Redactable Transactions in Consortium Blockchain: Controlled by Multi-authority CP-ABE.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
A training-integrity privacy-preserving federated learning scheme with trusted execution environment.
Inf. Sci., 2020
Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system.
Future Gener. Comput. Syst., 2020
2019
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience.
J. Supercomput., 2019
ACM Trans. Intell. Syst. Technol., 2019
Dynamic pricing with traffic engineering for adaptive video streaming over software-defined content delivery networking.
Multim. Tools Appl., 2019
J. Netw. Comput. Appl., 2019
J. Ambient Intell. Humaniz. Comput., 2019
J. Ambient Intell. Humaniz. Comput., 2019
Communication-efficient outsourced privacy-preserving classification service using trusted processor.
Inf. Sci., 2019
Data security against receiver corruptions: SOA security for receivers from simulatable DEMs.
Inf. Sci., 2019
2018
Anonymous Communication via Anonymous Identity-Based Encryption and Its Application in IoT.
Wirel. Commun. Mob. Comput., 2018
Wirel. Commun. Mob. Comput., 2018
IEEE Trans. Ind. Informatics, 2018
A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things.
Secur. Commun. Networks, 2018
A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT.
Secur. Commun. Networks, 2018
J. Netw. Comput. Appl., 2018
Inf. Sci., 2018
Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud.
Int. J. Web Grid Serv., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Normal Cloud Model-Based Algorithm for Multi-Attribute Trusted Cloud Service Selection.
IEEE Access, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
Soft Comput., 2017
Future Gener. Comput. Syst., 2017
2016
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Proceedings of the Computational Intelligence and Intelligent Systems, 2015