仝伟(Tong Wei)

发布者:赵鑫发布时间:2022-05-10浏览次数:63

职位:助理研究员

邮箱:weitong@outlook.com

地址:南京大学计算机科学与技术系大楼716室


个人简介:

I am an assistant researcher in the Dept. Computer Science and Technology, Nanjing University and a member of COSEC group. Before that, I received the B.S., M.S. and Ph.D. degrees from Nanjing University under the supervision of Sheng Zhong, in 2013, 2016, and 2019, respectively. I was a visiting scholar in the College of William and Mary from 2017/12 to 2018/12. 


I am broadly interested in the intersections between security, privacy, and machine learning.  Recently, I focus on the security of intelligent systems,  the robustness of privacy-enhancing mechanisms, and differentially private ML.


部分论文:

1、Wei Tong, Chang Xia, Jingyu Hua, Qun Li and Sheng Zhong. Practical Location Privacy Attacks and Defense on Point-of-interest Aggregates. IEEE International Conference on Distributed Computing (ICDCS 2021)

2、Wei Tong, Bingbing Jiang, Fengyuan Xu, Qun Li and Sheng Zhong. Privacy-Preserving Data Integrity Verification in Mobile Edge Computing. In Proceedings of the 39th IEEE International Conference on Distributed Computing (ICDCS’19), 2019

3、Jingyu Hua, Wei Tong, Fengyuan Xu, Sheng Zhong. A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries. IEEE Transactions on Information Forensics & Security, 2017, Accepted.

4、Wei Tong, Jingyu Hua, Sheng Zhong. A Jointly Differentially Private Scheduling Protocol for Ridesharing Services. IEEE Transactions on Information Forensics & Security, 2017.

5、Yuan Zhang, Wei Tong, Sheng Zhong. On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for k-anonymity Location Privacy, IEEE Transactions on Information Forensics & Security, 2016.

6、Wei Tong, Sheng Zhong. A Unified Resource Allocation Framework for Defending against Pollution Attacks in Wireless Network Coding Systems. IEEE Transactions on Information Forensics & Security, 2016.