default search action
Tong Li 0011
Person information
- affiliation: Guangzhou University, School of Computer Science, China
- affiliation (PhD 2017): Nankai University, College of Computer and Control Engineering, Tianjin, China
Other persons with the same name
- Tong Li — disambiguation page
- Tong Li 0001 — Beijing University of Technology, China (and 2 more)
- Tong Li 0002 — PLA Engineering Academy of Armored Forces, Beijing
- Tong Li 0003 — Lenovo (and 2 more)
- Tong Li 0004 — Yunnan University, School of Software, Kunming, China
- Tong Li 0005 — University of Iowa, Department of Mathematics, Iowa City, IA, USA
- Tong Li 0006 — Beijing Institute of Technology, Civil Aviation Management Institute of China, Beijing, China
- Tong Li 0007 — Shenzhen University, China
- Tong Li 0008 — Queensland University of Technology, Brisbane, QLD, Australia (and 1 more)
- Tong Li 0009 — Zhejiang University, Department of Mechanical Engineering, Hangzhou, China
- Tong Li 0010 — Harbin Institute of Technology, Department of Information Engineering, China
- Tong Li 0012 — University of Chinese Academy of Sciences, School of Engineering Science, Beijing, China
- Tong Li 0013 — University of Helsinki, Finland (and 2 more)
- Tong Li 0014 — Renmin University of China, Beijing, China (and 2 more)
- Tong Li 0015 — De Montfort University, Leicester, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Zhiwei Chang, Hanfeng Zhang, Yan Jia, Sihan Xu, Tong Li, Zheli Liu:
Low-cost fuzzing drone control system for configuration errors threatening flight safety in edge terminals. Comput. Commun. 220: 138-148 (2024) - [j33]Siyi Lv, Yu Wei, Jingyu Jia, Xinhao Li, Tong Li, Zheli Liu, Xiaofeng Chen, Liang Guo:
New approach for efficient malicious multiparty private set intersection. Inf. Sci. 678: 120995 (2024) - [j32]Thar Baker, Tong Li, Jingyu Jia, Baolei Zhang, Chang Tan, Albert Y. Zomaya:
Poison-Tolerant Collaborative Filtering Against Poisoning Attacks on Recommender Systems. IEEE Trans. Dependable Secur. Comput. 21(5): 4589-4599 (2024) - [j31]Jingyu Jia, Xinhao Li, Tong Li, Zhewei Liu, Chang Tan, Siyi Lv, Liang Guo, Changyu Dong, Zheli Liu:
ABSyn: An Accurate Differentially Private Data Synthesis Scheme With Adaptive Selection and Batch Processes. IEEE Trans. Inf. Forensics Secur. 19: 8338-8352 (2024) - [c6]Biao Yi, Sishuo Chen, Yiming Li, Tong Li, Baolei Zhang, Zheli Liu:
BadActs: A Universal Backdoor Defense in the Activation Space. ACL (Findings) 2024: 5339-5352 - [i3]Biao Yi, Sishuo Chen, Yiming Li, Tong Li, Baolei Zhang, Zheli Liu:
BadActs: A Universal Backdoor Defense in the Activation Space. CoRR abs/2405.11227 (2024) - [i2]Peizhao Zhou, Xiaojie Guo, Pinzhi Chen, Tong Li, Siyi Lv, Zheli Liu:
Shortcut: Making MPC-based Collaborative Analytics Efficient on Dynamic Databases. IACR Cryptol. ePrint Arch. 2024: 1433 (2024) - 2023
- [c5]Zhiwei Chang, Hanfeng Zhang, Yue Yang, Yan Jia, Sihan Xu, Tong Li, Zheli Liu:
Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm. AIS&P (1) 2023: 499-512 - 2022
- [b1]Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li:
Privacy-Preserving Machine Learning. Springer 2022, ISBN 978-981-16-9138-6, pp. 1-88 - [j30]Yizhong Liu, Jianwei Liu, Marcos Antonio Vaz Salles, Zongyang Zhang, Tong Li, Bin Hu, Fritz Henglein, Rongxing Lu:
Building blocks of sharding blockchain systems: Concepts, approaches, and open problems. Comput. Sci. Rev. 46: 100513 (2022) - [j29]Jin Li, Heng Ye, Tong Li, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu:
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators. IEEE Trans. Dependable Secur. Comput. 19(1): 67-76 (2022) - 2021
- [j28]Dongjie Li, Siyi Lv, Yanyu Huang, Yijing Liu, Tong Li, Zheli Liu, Liang Guo:
Frequency-Hiding Order-Preserving Encryption with Small Client Storage. Proc. VLDB Endow. 14(13): 3295-3307 (2021) - [j27]Tong Li, Jin Li, Xiaofeng Chen, Zheli Liu, Wenjing Lou, Y. Thomas Hou:
NPMML: A Framework for Non-Interactive Privacy-Preserving Multi-Party Machine Learning. IEEE Trans. Dependable Secur. Comput. 18(6): 2969-2982 (2021) - [c4]Zongyang Zhang, Tong Li, Zhuo Wang, Jianwei Liu:
Redactable Transactions in Consortium Blockchain: Controlled by Multi-authority CP-ABE. ACISP 2021: 408-429 - [i1]Yizhong Liu, Jianwei Liu, Marcos Antonio Vaz Salles, Zongyang Zhang, Tong Li, Bin Hu, Fritz Henglein, Rongxing Lu:
Building Blocks of Sharding Blockchain Systems: Concepts, Approaches, and Open Problems. CoRR abs/2102.13364 (2021) - 2020
- [j26]Heng Ye, Jiqiang Liu, Wei Wang, Ping Li, Tong Li, Jin Li:
Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system. Future Gener. Comput. Syst. 108: 1314-1323 (2020) - [j25]Yu Chen, Fang Luo, Tong Li, Tao Xiang, Zheli Liu, Jin Li:
A training-integrity privacy-preserving federated learning scheme with trusted execution environment. Inf. Sci. 522: 69-79 (2020)
2010 – 2019
- 2019
- [j24]Zhengan Huang, Junzuo Lai, Wenbin Chen, Tong Li, Yang Xiang:
Data security against receiver corruptions: SOA security for receivers from simulatable DEMs. Inf. Sci. 471: 201-215 (2019) - [j23]Tong Li, Xuan Li, Xingyi Zhong, Nan Jiang, Chong-zhi Gao:
Communication-efficient outsourced privacy-preserving classification service using trusted processor. Inf. Sci. 505: 473-486 (2019) - [j22]Li Yang, Jiaxue Wang, Chongzhi Gao, Tong Li:
A crisis information propagation model based on a competitive relation. J. Ambient Intell. Humaniz. Comput. 10(8): 2999-3009 (2019) - [j21]Pingting Hao, Liang Hu, Jingyan Jiang, Xilong Che, Tong Li, Kuo Zhao:
Framework for replica placement over cooperative edge networks. J. Ambient Intell. Humaniz. Comput. 10(8): 3011-3021 (2019) - [j20]Tong Li, Chongzhi Gao, Liaoliang Jiang, Witold Pedrycz, Jian Shen:
Publicly verifiable privacy-preserving aggregation and its application in IoT. J. Netw. Comput. Appl. 126: 39-44 (2019) - [j19]Pingting Hao, Liang Hu, Kuo Zhao, Jingyan Jiang, Tong Li, Xilong Che:
Dynamic pricing with traffic engineering for adaptive video streaming over software-defined content delivery networking. Multim. Tools Appl. 78(3): 3471-3492 (2019) - [j18]Jin Li, Tong Li, Zheli Liu, Xiaofeng Chen:
Secure Deduplication System with Active Key Update and Its Application in IoT. ACM Trans. Intell. Syst. Technol. 10(6): 69:1-69:21 (2019) - [j17]Chengyu Hu, Rupeng Yang, Pengtao Liu, Tong Li, Fanyu Kong:
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience. J. Supercomput. 75(6): 3099-3122 (2019) - 2018
- [j16]Yuli Yang, Rui Liu, Yongle Chen, Tong Li, Yi Tang:
Normal Cloud Model-Based Algorithm for Multi-Attribute Trusted Cloud Service Selection. IEEE Access 6: 37644-37652 (2018) - [j15]Zheli Liu, Tong Li, Ping Li, Chunfu Jia, Jin Li:
Verifiable searchable encryption with aggregate keys for data sharing system. Future Gener. Comput. Syst. 78: 778-788 (2018) - [j14]Yi Liu, Hao Wang, Tong Li, Ping Li, Jie Ling:
Attribute-based handshake protocol for mobile healthcare social networks. Future Gener. Comput. Syst. 86: 873-880 (2018) - [j13]Ping Li, Tong Li, Heng Ye, Jin Li, Xiaofeng Chen, Yang Xiang:
Privacy-preserving machine learning with multiple data providers. Future Gener. Comput. Syst. 87: 341-350 (2018) - [j12]Tong Li, Zheli Liu, Chunfu Jia, Zhangjie Fu, Jin Li:
Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud. Int. J. Web Grid Serv. 14(1): 21-43 (2018) - [j11]Tong Li, Jin Li, Zheli Liu, Ping Li, Chunfu Jia:
Differentially private Naive Bayes learning over multiple data sources. Inf. Sci. 444: 89-104 (2018) - [j10]Jian Shen, Chen Wang, Tong Li, Xiaofeng Chen, Xinyi Huang, Zhi-Hui Zhan:
Secure data uploading scheme for a smart home system. Inf. Sci. 453: 186-197 (2018) - [j9]Tong Li, Zhengan Huang, Ping Li, Zheli Liu, Chunfu Jia:
Outsourced privacy-preserving classification service over encrypted data. J. Netw. Comput. Appl. 106: 100-110 (2018) - [j8]Chen Wang, Jian Shen, Qi Liu, Yongjun Ren, Tong Li:
A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things. Secur. Commun. Networks 2018: 3680851:1-3680851:7 (2018) - [j7]Tong Li, Wenbin Chen, Yi Tang, Hongyang Yan:
A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT. Secur. Commun. Networks 2018: 9641273:1-9641273:6 (2018) - [j6]Zheli Liu, Zhendong Wu, Tong Li, Jin Li, Chao Shen:
GMM and CNN Hybrid Method for Short Utterance Speaker Recognition. IEEE Trans. Ind. Informatics 14(7): 3244-3252 (2018) - [j5]Ahmer Khan Jadoon, Licheng Wang, Tong Li, Muhammad Azam Zia:
Lightweight Cryptographic Techniques for Automotive Cybersecurity. Wirel. Commun. Mob. Comput. 2018: 1640167:1-1640167:15 (2018) - [j4]Liaoliang Jiang, Tong Li, Xuan Li, Mohammed Atiquzzaman, Haseeb Ahmad, Xianmin Wang:
Anonymous Communication via Anonymous Identity-Based Encryption and Its Application in IoT. Wirel. Commun. Mob. Comput. 2018: 6809796:1-6809796:8 (2018) - [c3]Zhe Chen, Chunfu Jia, Tongtong Lv, Tong Li:
Harden Tamper-Proofing to Combat MATE Attack. ICA3PP (4) 2018: 98-108 - 2017
- [j3]Ping Li, Jin Li, Zhengan Huang, Tong Li, Chong-Zhi Gao, Siu-Ming Yiu, Kai Chen:
Multi-key privacy-preserving deep learning in cloud computing. Future Gener. Comput. Syst. 74: 76-85 (2017) - [j2]Tong Li, Zheli Liu, Jin Li, Chunfu Jia, Kuan-Ching Li:
CDPS: A cryptographic data publishing system. J. Comput. Syst. Sci. 89: 80-91 (2017) - [j1]Ping Li, Tong Li, Zheng-an Yao, Chun-Ming Tang, Jin Li:
Privacy-preserving outsourcing of image feature extraction in cloud computing. Soft Comput. 21(15): 4349-4359 (2017) - 2016
- [c2]Tong Li, Zheli Liu, Ping Li, Chunfu Jia, Zoe Lin Jiang, Jin Li:
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage. ACISP (2) 2016: 153-169 - 2015
- [c1]Nan Shen, Xuan Chen, Shuang Liang, Jun Yang, Tong Li, Chunfu Jia:
Learning-Based Privacy-Preserving Location Sharing. ISICA 2015: 672-682
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-21 20:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint