Cong Li

Orcid: 0000-0001-6604-0708

Affiliations:
  • Peking University, Beijing, China


According to our database1, Cong Li authored at least 32 papers between 2015 and 2026.

Collaborative distances:

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
PDP-FedKD: Personalized Differential Privacy With Adaptive Budget Selection in Heterogeneous Federated Learning.
IEEE Signal Process. Lett., 2026

2025
Redactable Blockchain From Decentralized Chameleon Hash Functions, Revisited.
IEEE Trans. Computers, June, 2025

Communication Efficient Multiparty Private Set Intersection from Multi-Point Sequential OPRF.
CoRR, June, 2025

Identity-Based Chameleon Hashes in the Standard Model for Mobile Devices.
IEEE Trans. Inf. Forensics Secur., 2025

A lattice-based privacy-preserving decentralized multi-party payment scheme.
Comput. Networks, 2025

Wildcarded Identity-Based Inner Product Encryption Based on SM9.
Proceedings of the Information Security and Cryptology - 21st International Conference, 2025

2024
On the Security of Secure Keyword Search and Data Sharing Mechanism for Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2024

FDP-FL: differentially private federated learning with flexible privacy budget allocation.
Comput. J., 2024

MH-pFLGB: Model Heterogeneous Personalized Federated Learning via Global Bypass for Medical Image Analysis.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2024, 2024

pFLFE: Cross-silo Personalized Federated Learning via Feature Enhancement on Medical Image Segmentation.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2024, 2024

MH-pFLID: Model Heterogeneous personalized Federated Learning via Injection and Distillation for Medical Data Analysis.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

HyPRE: Hybrid Proxy Re-Encryption for Secure Multimedia Data Sharing on Mobile Devices.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

TRLS: A Time Series Representation Learning Framework Via Spectrogram for Medical Signal Processing.
Proceedings of the IEEE International Conference on Acoustics, 2024

Security Equivalence Assessment between Cloud Standards by Mapping of Control Items.
Proceedings of the IEEE International Conference on Acoustics, 2024

Privacy Preserving Federated Learning from Multi-Input Functional Proxy Re-Encryption.
Proceedings of the IEEE International Conference on Acoustics, 2024

2023
SHISRCNet: Super-Resolution and Classification Network for Low-Resolution Breast Cancer Histopathology Image.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023, 2023

NCL: Textual Backdoor Defense Using Noise-Augmented Contrastive Learning.
Proceedings of the IEEE International Conference on Acoustics, 2023

Detecting Malicious Migration on Edge to Prevent Running Data Leakage.
Proceedings of the IEEE International Conference on Acoustics, 2023

A Privacy Preserving Computer-aided Medical Diagnosis Framework with Outsourced Model.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

2022
Hierarchical and non-monotonic key-policy attribute-based encryption and its application.
Inf. Sci., 2022

Efficient Identity-Based Chameleon Hash for Mobile Devices.
Proceedings of the IEEE International Conference on Acoustics, 2022

2021
Large Universe CCA2 CP-ABE With Equality and Validity Test in the Standard Model.
Comput. J., 2021

Identity-Based Chameleon Hash without Random Oracles and Application in the Mobile Internet.
Proceedings of the ICC 2021, 2021

2017
A practical construction for large universe hierarchical attribute-based encryption.
Concurr. Comput. Pract. Exp., 2017

A Secure Virtual Machine Deployment Strategy to Reduce Co-residency in Cloud.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Practical Large Universe Attribute-Set Based Encryption in the Standard Model.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
SeLance: Secure Load Balancing of Virtual Machines in Cloud.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Whispers in the Cloud - A Covert Channel using the Result of Creating a Virtual Machine.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Sift - An Efficient Method for Co-residency Detection on Amazon EC2.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

2015
Ciphertext-Policy Attribute-Based Encryption with User and Authority Accountability.
Proceedings of the Security and Privacy in Communication Networks, 2015

Probing the Scheduling Algorithms in the Cloud Based on OpenStack.
Proceedings of the Cloud Computing and Security - First International Conference, 2015


  Loading...