Penulis: Tong Li

Dukung
Jin Li is currently a professor and the vice dean of the Institute of Artificial Intelligence and Blockchain, Guangzhou University. He received his B.S. (2002) and M.S. (2004) from Southwest University and Sun Yat-sen University, both in Mathematics. He got his Ph.D. degree in information security from Sun Yat-sen University at 2007. His research interests include design of secure protocols in artificial intelligence, cloud computing (secure cloud storage and outsourcing computation), and cryptographic protocols. He served as a senior research associate at Korea Advanced Institute of Technology (Korea) and Illinois Institute of Technology (USA) from 2008 to 2010, respectively. He has published more than 100 papers in international conferences and journals, including IEEE INFOCOM, IEEE TIFS, IEEE TPDS, IEEE TOC, and ESORICS, etc. His work has been cited more than 11000 times at Google Scholar and the H-Index is 40. He served as an associate editor for several international journals, including IEEE Transactions on Dependable and Secure Computing, Information Sciences. He also served as the program chairs in the committee for many international conferences such as CSS 2019, ICA3PP 2018, CSE 2017, IEEE EUC 2017, and ISICA 2015. He received several National Science Foundation of China (NSFC) Grants, including NSFC Outstanding Youth Foundation. Ping Li was born in May 1985 in Baojing Country of Hunan Province. She received her Ph.D. in School of Mathematics at Sun Yat-Sen University in June 2016 (Supervisor Prof. Zheng-An Yao) and joined the Guangzhou University as a postdoctoral fellow from July 2016 to December 2018 (Co-Supervisor Prof. Jin Li). Currently, she works at South China Normal University (Youth Talent). Her research fields are applied cryptography, cloud computing security, and privacy-preserving machine learning. Her current research direction contains cryptographic technologies, storage security and computation security in cloudcomputing, machine learning in securely outsourced computation, etc. She has published or accepted 20 academic papers, including 14 SCI papers and two ESI highly cited papers. She is undertaking the Youth Project of National Natural Science Foundation of China. Zheli Liu received the B.Sc. and M.Sc. degrees in computer science from Jilin University, China, in 2002 and 2005, respectively. He received the Ph.D. degree in computer application from Jilin University in 2009. After a postdoctoral fellowship in Nankai University, he joined the College of Cyber Science of Nankai University in 2011. Currently, he works at Nankai University as an associate professor. His current research interests include applied cryptography and data privacy protection. Xiaofeng Chen received his B.S. and M.S. in Mathematics from Northwest University, China, in 1998 and 2000, respectively. He got his Ph.D. degree in Cryptography from Xidian University in 2003. Currently, he works at Xidian University as a professor. His research interests include applied cryptography and cloud computing security. He has published over 100 research papers in refereed international conferences and journals. His work has been cited more than 4000 times at Google Scholar. He is in the Editorial Board of IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Security and Communication Networks (SCN), and Computing and Informatics (CAI), etc. He has served as the program/general chair or program committee member in over 30 international conferences. Tong Li received his B.S. and M.S. from Taiyuan University of Technology and Beijing University of Technology, in 2011 and 2014, respectively, both in Computer Science & Technology. He got his Ph.D. degree in information security from Nankai University at 2017. After a postdoctoral fellowship in Guangzhou University, he currently is an associate professor in Nankai University. His research interests include applied cryptography and data privacy protection in cloud computing.




10 Ebooks oleh Tong Li

Tong Li: An Approach to Modelling Software Evolution Processes
An Approach to Modelling Software Evolution Processes describes formal software processes that effectively support software evolution. The importance and popularity of software evolution increase as …
PDF
Inggris
€96.29
Tong Li & M. Hashem Pesaran: Essays in Honor of Cheng Hsiao
Including contributions spanning a variety of theoretical and applied topics in econometrics, this volume of Advances in Econometrics is published in honour of Cheng Hsiao.In the first few chapters o …
PDF
Inggris
DRM
€133.84
Tong Li & M. Hashem Pesaran: Essays in Honor of Cheng Hsiao
Including contributions spanning a variety of theoretical and applied topics in econometrics, this volume of Advances in Econometrics is published in honour of Cheng Hsiao.In the first few chapters o …
EPUB
Inggris
DRM
€134.81
Jin Li & Ping Li: Privacy-Preserving Machine Learning
This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In re …
PDF
Inggris
€58.84
Tong Li & Alessandra Mattei: Pharmaceutical Crystals
An important resource that puts the focus on understanding and handling of organic crystals in drug development Since a majority of pharmaceutical solid-state materials are organic crystals, their ha …
PDF
Inggris
DRM
€190.99
Tong Li & Alessandra Mattei: Pharmaceutical Crystals
An important resource that puts the focus on understanding and handling of organic crystals in drug development Since a majority of pharmaceutical solid-state materials are organic crystals, their ha …
EPUB
Inggris
DRM
€190.99
Yulei Wu & Jingguo Ge: AI and Machine Learning for Network and Security Management
AI AND MACHINE LEARNING FOR NETWORK AND SECURITY MANAGEMENT Extensive Resource for Understanding Key Tasks of Network and Security Management AI and Machine Learning for Network and Security Manageme …
PDF
Inggris
DRM
€96.99
Yulei Wu & Jingguo Ge: AI and Machine Learning for Network and Security Management
AI AND MACHINE LEARNING FOR NETWORK AND SECURITY MANAGEMENT Extensive Resource for Understanding Key Tasks of Network and Security Management AI and Machine Learning for Network and Security Manageme …
EPUB
Inggris
DRM
€96.99
Tong Li: Redology Scholars vol I 红学外史上卷
Redology (Hongxue红学) is the field of study devoted to one of the best-known classic Chinese novels, Dream of the Red Chamber  (Honglou Meng 红楼梦). As a documentary literary work, this book d …
EPUB
Cina
DRM
€14.99
Tong Li: Redology Scholars vol II 红学外史下卷
Redology (Hongxue红学) is the field of study devoted to one of the best-known classic Chinese novels, Dream of the Red Chamber  (Honglou Meng 红楼梦). As a documentary literary work, this book d …
EPUB
Cina
DRM
€14.99