Tong Li

Orcid: 0000-0003-3678-8402

Affiliations:
  • Nankai University, College of Cyber Science, Tianjin, China (since 2021)
  • Guangzhou University, School of Computer Science, Guangzhou, China
  • Nankai University, College of Computer and Control Engineering, Tianjin, China (PhD 2017)


According to our database1, Tong Li authored at least 51 papers between 2015 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
EdgeSyn: Privacy-Preserving Data Publishing on Edge Network over Infinite Multimedia Data Stream.
ACM Trans. Multim. Comput. Commun. Appl., August, 2025

Gradient Surgery for Safe LLM Fine-Tuning.
CoRR, August, 2025

BadReasoner: Planting Tunable Overthinking Backdoors into Large Reasoning Models for Fun or Profit.
CoRR, July, 2025

CTRAP: Embedding Collapse Trap to Safeguard Large Language Models from Harmful Fine-Tuning.
CoRR, May, 2025

SMPCache: Towards More Efficient SQL Queries in Multi-Party Collaborative Data Analysis.
IEEE Trans. Knowl. Data Eng., April, 2025

LUNA: Efficient Backward-Private Dynamic Symmetric Searchable Encryption Scheme With Secure Deletion in Encrypted Database.
IEEE Trans. Knowl. Data Eng., April, 2025

Practical Poisoning Attacks against Retrieval-Augmented Generation.
CoRR, April, 2025

Privacy-preserving SQL queries on cross-organisation databases.
Int. J. Comput. Sci. Eng., 2025

Traceback of Poisoning Attacks to Retrieval-Augmented Generation.
Proceedings of the ACM on Web Conference 2025, 2025

Probe before You Talk: Towards Black-box Defense against Backdoor Unalignment for Large Language Models.
Proceedings of the Thirteenth International Conference on Learning Representations, 2025

Prompt-Guided Internal States for Hallucination Detection of Large Language Models.
Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2025

2024
ABSyn: An Accurate Differentially Private Data Synthesis Scheme With Adaptive Selection and Batch Processes.
IEEE Trans. Inf. Forensics Secur., 2024

Poison-Tolerant Collaborative Filtering Against Poisoning Attacks on Recommender Systems.
IEEE Trans. Dependable Secur. Comput., 2024

New approach for efficient malicious multiparty private set intersection.
Inf. Sci., 2024

Shortcut: Making MPC-based Collaborative Analytics Efficient on Dynamic Databases.
IACR Cryptol. ePrint Arch., 2024

Low-cost fuzzing drone control system for configuration errors threatening flight safety in edge terminals.
Comput. Commun., 2024

BadActs: A Universal Backdoor Defense in the Activation Space.
Proceedings of the Findings of the Association for Computational Linguistics, 2024

2023
Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators.
IEEE Trans. Dependable Secur. Comput., 2022

Privacy-Preserving Machine Learning
Springer, ISBN: 978-981-16-9138-6, 2022

2021
NPMML: A Framework for Non-Interactive Privacy-Preserving Multi-Party Machine Learning.
IEEE Trans. Dependable Secur. Comput., 2021

Frequency-Hiding Order-Preserving Encryption with Small Client Storage.
Proc. VLDB Endow., 2021

2020
A training-integrity privacy-preserving federated learning scheme with trusted execution environment.
Inf. Sci., 2020

Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system.
Future Gener. Comput. Syst., 2020

2019
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience.
J. Supercomput., 2019

Secure Deduplication System with Active Key Update and Its Application in IoT.
ACM Trans. Intell. Syst. Technol., 2019

Dynamic pricing with traffic engineering for adaptive video streaming over software-defined content delivery networking.
Multim. Tools Appl., 2019

Publicly verifiable privacy-preserving aggregation and its application in IoT.
J. Netw. Comput. Appl., 2019

A crisis information propagation model based on a competitive relation.
J. Ambient Intell. Humaniz. Comput., 2019

Framework for replica placement over cooperative edge networks.
J. Ambient Intell. Humaniz. Comput., 2019

Communication-efficient outsourced privacy-preserving classification service using trusted processor.
Inf. Sci., 2019

Data security against receiver corruptions: SOA security for receivers from simulatable DEMs.
Inf. Sci., 2019

2018
Anonymous Communication via Anonymous Identity-Based Encryption and Its Application in IoT.
Wirel. Commun. Mob. Comput., 2018

Lightweight Cryptographic Techniques for Automotive Cybersecurity.
Wirel. Commun. Mob. Comput., 2018

GMM and CNN Hybrid Method for Short Utterance Speaker Recognition.
IEEE Trans. Ind. Informatics, 2018

A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things.
Secur. Commun. Networks, 2018

A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT.
Secur. Commun. Networks, 2018

Outsourced privacy-preserving classification service over encrypted data.
J. Netw. Comput. Appl., 2018

Secure data uploading scheme for a smart home system.
Inf. Sci., 2018

Differentially private Naive Bayes learning over multiple data sources.
Inf. Sci., 2018

Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud.
Int. J. Web Grid Serv., 2018

Attribute-based handshake protocol for mobile healthcare social networks.
Future Gener. Comput. Syst., 2018

Verifiable searchable encryption with aggregate keys for data sharing system.
Future Gener. Comput. Syst., 2018

Privacy-preserving machine learning with multiple data providers.
Future Gener. Comput. Syst., 2018

Normal Cloud Model-Based Algorithm for Multi-Attribute Trusted Cloud Service Selection.
IEEE Access, 2018

Harden Tamper-Proofing to Combat MATE Attack.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Privacy-preserving outsourcing of image feature extraction in cloud computing.
Soft Comput., 2017

CDPS: A cryptographic data publishing system.
J. Comput. Syst. Sci., 2017

Multi-key privacy-preserving deep learning in cloud computing.
Future Gener. Comput. Syst., 2017

2016
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Learning-Based Privacy-Preserving Location Sharing.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015


  Loading...