Tong Li
Orcid: 0000-0003-3678-8402Affiliations:
- Nankai University, College of Cyber Science, Tianjin, China (since 2021)
- Guangzhou University, School of Computer Science, Guangzhou, China
- Nankai University, College of Computer and Control Engineering, Tianjin, China (PhD 2017)
According to our database1,
Tong Li
authored at least 51 papers
between 2015 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
EdgeSyn: Privacy-Preserving Data Publishing on Edge Network over Infinite Multimedia Data Stream.
ACM Trans. Multim. Comput. Commun. Appl., August, 2025
BadReasoner: Planting Tunable Overthinking Backdoors into Large Reasoning Models for Fun or Profit.
CoRR, July, 2025
CTRAP: Embedding Collapse Trap to Safeguard Large Language Models from Harmful Fine-Tuning.
CoRR, May, 2025
SMPCache: Towards More Efficient SQL Queries in Multi-Party Collaborative Data Analysis.
IEEE Trans. Knowl. Data Eng., April, 2025
LUNA: Efficient Backward-Private Dynamic Symmetric Searchable Encryption Scheme With Secure Deletion in Encrypted Database.
IEEE Trans. Knowl. Data Eng., April, 2025
CoRR, April, 2025
Int. J. Comput. Sci. Eng., 2025
Proceedings of the ACM on Web Conference 2025, 2025
Probe before You Talk: Towards Black-box Defense against Backdoor Unalignment for Large Language Models.
Proceedings of the Thirteenth International Conference on Learning Representations, 2025
Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2025
2024
ABSyn: An Accurate Differentially Private Data Synthesis Scheme With Adaptive Selection and Batch Processes.
IEEE Trans. Inf. Forensics Secur., 2024
Poison-Tolerant Collaborative Filtering Against Poisoning Attacks on Recommender Systems.
IEEE Trans. Dependable Secur. Comput., 2024
Inf. Sci., 2024
IACR Cryptol. ePrint Arch., 2024
Low-cost fuzzing drone control system for configuration errors threatening flight safety in edge terminals.
Comput. Commun., 2024
Proceedings of the Findings of the Association for Computational Linguistics, 2024
2023
Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm.
Proceedings of the Artificial Intelligence Security and Privacy, 2023
2022
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators.
IEEE Trans. Dependable Secur. Comput., 2022
2021
NPMML: A Framework for Non-Interactive Privacy-Preserving Multi-Party Machine Learning.
IEEE Trans. Dependable Secur. Comput., 2021
Proc. VLDB Endow., 2021
2020
A training-integrity privacy-preserving federated learning scheme with trusted execution environment.
Inf. Sci., 2020
Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system.
Future Gener. Comput. Syst., 2020
2019
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience.
J. Supercomput., 2019
ACM Trans. Intell. Syst. Technol., 2019
Dynamic pricing with traffic engineering for adaptive video streaming over software-defined content delivery networking.
Multim. Tools Appl., 2019
J. Netw. Comput. Appl., 2019
J. Ambient Intell. Humaniz. Comput., 2019
J. Ambient Intell. Humaniz. Comput., 2019
Communication-efficient outsourced privacy-preserving classification service using trusted processor.
Inf. Sci., 2019
Data security against receiver corruptions: SOA security for receivers from simulatable DEMs.
Inf. Sci., 2019
2018
Anonymous Communication via Anonymous Identity-Based Encryption and Its Application in IoT.
Wirel. Commun. Mob. Comput., 2018
Wirel. Commun. Mob. Comput., 2018
IEEE Trans. Ind. Informatics, 2018
A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things.
Secur. Commun. Networks, 2018
A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT.
Secur. Commun. Networks, 2018
J. Netw. Comput. Appl., 2018
Inf. Sci., 2018
Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud.
Int. J. Web Grid Serv., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Normal Cloud Model-Based Algorithm for Multi-Attribute Trusted Cloud Service Selection.
IEEE Access, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
Soft Comput., 2017
Future Gener. Comput. Syst., 2017
2016
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Proceedings of the Computational Intelligence and Intelligent Systems, 2015