Tong Li

According to our database1, Tong Li authored at least 18 papers between 2015 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Data security against receiver corruptions: SOA security for receivers from simulatable DEMs.
Inf. Sci., 2019

2018
Lightweight Cryptographic Techniques for Automotive Cybersecurity.
Wireless Communications and Mobile Computing, 2018

GMM and CNN Hybrid Method for Short Utterance Speaker Recognition.
IEEE Trans. Industrial Informatics, 2018

A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things.
Security and Communication Networks, 2018

A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT.
Security and Communication Networks, 2018

Outsourced privacy-preserving classification service over encrypted data.
J. Network and Computer Applications, 2018

Secure data uploading scheme for a smart home system.
Inf. Sci., 2018

Differentially private Naive Bayes learning over multiple data sources.
Inf. Sci., 2018

Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud.
IJWGS, 2018

Attribute-based handshake protocol for mobile healthcare social networks.
Future Generation Comp. Syst., 2018

Verifiable searchable encryption with aggregate keys for data sharing system.
Future Generation Comp. Syst., 2018

Privacy-preserving machine learning with multiple data providers.
Future Generation Comp. Syst., 2018

Normal Cloud Model-Based Algorithm for Multi-Attribute Trusted Cloud Service Selection.
IEEE Access, 2018

2017
Privacy-preserving outsourcing of image feature extraction in cloud computing.
Soft Comput., 2017

CDPS: A cryptographic data publishing system.
J. Comput. Syst. Sci., 2017

Multi-key privacy-preserving deep learning in cloud computing.
Future Generation Comp. Syst., 2017

2016
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Learning-Based Privacy-Preserving Location Sharing.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015


  Loading...