Yong Li

Orcid: 0000-0002-6920-0663

Affiliations:
  • Huawei Technologies Düsseldorf GmbH, Germany
  • Ruhr University Bochum, Germany (PhD 2016)


According to our database1, Yong Li authored at least 35 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Obfuscation for Deep Neural Networks against Model Extraction: Attack Taxonomy and Defense Optimization.
IACR Cryptol. ePrint Arch., 2025

Honorific Security: Efficient Two-Party Computation with Offloaded Arbitration and Public Verifiability.
Proceedings of the 22nd International Conference on Security and Cryptography, 2025

Diffusion-based Identity-Preserving Facial Privacy Protection.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

2024
Exploiting Internal Randomness for Privacy in Vertical Federated Learning.
IACR Cryptol. ePrint Arch., 2024

Protoss Protocol for Tight Optimal Symmetric Security.
IACR Cryptol. ePrint Arch., 2024

NodeGuard: A Highly Efficient Two-Party Computation Framework for Training Large-Scale Gradient Boosting Decision Tree.
IACR Cryptol. ePrint Arch., 2024

KAN See Your Face.
CoRR, 2024

PSY: Posterior Sampling Based Privacy Enhancer in Large Language Models.
CoRR, 2024

ShieldDiff: Suppressing Sexual Content Generation from Diffusion Models through Reinforcement Learning.
CoRR, 2024

Fusion is all you need: Face Fusion for Customized Identity-Preserving Image Synthesis.
CoRR, 2024

Privacy-Preserving Face Recognition in Hybrid Frequency-Color Domain.
Proceedings of the 19th International Joint Conference on Computer Vision, 2024

Robust Skin Color Driven Privacy-Preserving Face Recognition Via Function Secret Sharing.
Proceedings of the IEEE International Conference on Image Processing, 2024

Short Paper: PSY: Posterior Sampling Based Privacy Enhancer in Large Language Models.
Proceedings of the Computer Security. ESORICS 2024 International Workshops, 2024

Privacy-Preserving Certificate-Less Authenticated Key Exchange with Key Registration Privacy.
Proceedings of the Information Security and Cryptology - 20th International Conference, 2024

SiGBDT: Large-Scale Gradient Boosting Decision Tree Training via Function Secret Sharing.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Practical Certificate-Less Infrastructure with Application in TLS.
Cryptogr., September, 2023

Force: Making 4PC > 4 × PC in Privacy Preserving Machine Learning on GPU.
IACR Cryptol. ePrint Arch., 2023

Force: Highly Efficient Four-Party Privacy-Preserving Machine Learning on GPU.
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023

Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography.
Proceedings of the Information Security - 26th International Conference, 2023

On the Privacy-Preserving Infrastructure for Authenticated Key Exchange.
Proceedings of the Information Security - 26th International Conference, 2023

2022
Security Against Honorific Adversaries: Efficient MPC with Server-aided Public Verifiability.
IACR Cryptol. ePrint Arch., 2022

High-Speed Anonymous Device Authentication Without Asymmetric Cryptography in the Internet-of-Things.
Proceedings of the Ubiquitous Security - Second International Conference, 2022

2021
Flexible Group Non-interactive Key Exchange in the Standard Model.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2021

Perfect Anonymous Authentication and Secure Communication in Internet-of-Things.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2021

2020
Non-interactive certificate update protocol for efficient authentication in IoT.
Future Gener. Comput. Syst., 2020

Lightweight key management system for inter-node communication in IoT.
Proceedings of the IoT '20: 10th International Conference on the Internet of Things, 2020

2018
Flexible certificate revocation list for efficient authentication in IoT.
Proceedings of the 8th International Conference on the Internet of Things, 2018

2017
Secure Deduplication of Encrypted Data: Refined Model and New Constructions.
IACR Cryptol. ePrint Arch., 2017

No-Match Attacks and Robust Partnering Definitions - Defining Trivial Attacks for Security Protocols is Not Trivial.
IACR Cryptol. ePrint Arch., 2017

2016
Design and analysis of cryptographic protocols.
PhD thesis, 2016

2015
On the Impossibility of Tight Cryptographic Reductions.
IACR Cryptol. ePrint Arch., 2015

2014
On the Security of the Pre-Shared Key Ciphersuites of TLS.
IACR Cryptol. ePrint Arch., 2014

Tightly-Secure Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2014

New Modular Compilers for Authenticated Key Exchange.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Strongly Secure One-round Group Authenticated Key Exchange in the Standard Model.
IACR Cryptol. ePrint Arch., 2013


  Loading...