Tong Li

According to our database1, Tong Li authored at least 20 papers between 2015 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 





Data security against receiver corruptions: SOA security for receivers from simulatable DEMs.
Inf. Sci., 2019

Anonymous Communication via Anonymous Identity-Based Encryption and Its Application in IoT.
Wireless Communications and Mobile Computing, 2018

Lightweight Cryptographic Techniques for Automotive Cybersecurity.
Wireless Communications and Mobile Computing, 2018

GMM and CNN Hybrid Method for Short Utterance Speaker Recognition.
IEEE Trans. Industrial Informatics, 2018

A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things.
Security and Communication Networks, 2018

A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT.
Security and Communication Networks, 2018

Outsourced privacy-preserving classification service over encrypted data.
J. Network and Computer Applications, 2018

Secure data uploading scheme for a smart home system.
Inf. Sci., 2018

Differentially private Naive Bayes learning over multiple data sources.
Inf. Sci., 2018

Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud.
IJWGS, 2018

Attribute-based handshake protocol for mobile healthcare social networks.
Future Generation Comp. Syst., 2018

Verifiable searchable encryption with aggregate keys for data sharing system.
Future Generation Comp. Syst., 2018

Privacy-preserving machine learning with multiple data providers.
Future Generation Comp. Syst., 2018

Normal Cloud Model-Based Algorithm for Multi-Attribute Trusted Cloud Service Selection.
IEEE Access, 2018

Harden Tamper-Proofing to Combat MATE Attack.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Privacy-preserving outsourcing of image feature extraction in cloud computing.
Soft Comput., 2017

CDPS: A cryptographic data publishing system.
J. Comput. Syst. Sci., 2017

Multi-key privacy-preserving deep learning in cloud computing.
Future Generation Comp. Syst., 2017

Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Learning-Based Privacy-Preserving Location Sharing.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015