Yong Li
Orcid: 0000-0002-6920-0663Affiliations:
- Huawei Technologies Düsseldorf GmbH, Germany
- Ruhr University Bochum, Germany (PhD 2016)
According to our database1,
Yong Li
authored at least 35 papers
between 2013 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Honorific Security: Efficient Two-Party Computation with Offloaded Arbitration and Public Verifiability.
Proceedings of the 22nd International Conference on Security and Cryptography, 2025
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025
Obfuscation for Deep Neural Networks Against Model Extraction: Attack Taxonomy and Defense Optimization.
Proceedings of the Applied Cryptography and Network Security, 2025
2024
ShieldDiff: Suppressing Sexual Content Generation from Diffusion Models through Reinforcement Learning.
CoRR, 2024
Fusion is all you need: Face Fusion for Customized Identity-Preserving Image Synthesis.
CoRR, 2024
Proceedings of the 19th International Joint Conference on Computer Vision, 2024
NodeGuard: A Highly Efficient Two-Party Computation Framework for Training Large-Scale Gradient Boosting Decision Tree.
Proceedings of the IEEE Security and Privacy, 2024
Robust Skin Color Driven Privacy-Preserving Face Recognition Via Function Secret Sharing.
Proceedings of the IEEE International Conference on Image Processing, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Short Paper: PSY: Posterior Sampling Based Privacy Enhancer in Large Language Models.
Proceedings of the Computer Security. ESORICS 2024 International Workshops, 2024
Privacy-Preserving Certificate-Less Authenticated Key Exchange with Key Registration Privacy.
Proceedings of the Information Security and Cryptology - 20th International Conference, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
SiGBDT: Large-Scale Gradient Boosting Decision Tree Training via Function Secret Sharing.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Cryptogr., September, 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023
Proceedings of the Information Security - 26th International Conference, 2023
Proceedings of the Information Security - 26th International Conference, 2023
2022
Security Against Honorific Adversaries: Efficient MPC with Server-aided Public Verifiability.
IACR Cryptol. ePrint Arch., 2022
High-Speed Anonymous Device Authentication Without Asymmetric Cryptography in the Internet-of-Things.
Proceedings of the Ubiquitous Security - Second International Conference, 2022
2021
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2021
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2021
2020
Proceedings of the IoT '20: 10th International Conference on the Internet of Things, 2020
2019
Proceedings of the 9th International Conference on the Internet of Things, 2019
2018
Proceedings of the 8th International Conference on the Internet of Things, 2018
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018
2017
No-Match Attacks and Robust Partnering Definitions: Defining Trivial Attacks for Security Protocols is Not Trivial.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
2014
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013