DSCN1775.JPG

 
朱友文

博士,副教授,硕士生导师

南京航空航天大学计算机科学与技术学院

Email:  zhuyouwen@gmail.com  

  zhuyw@nuaa.edu.cn

欢迎对信息安全与隐私保护研究感兴趣的高年级本科生以及打算报考研究生的同学与我联系,要求积极上进,有一定的编程能力、较好的英语读写能力和数学基础!

主要经历

20146月至今,南京航空航天大学 计算机科学与技术学院,副教授    硕士生导师

20128-20147月,日本九州大学,JSPS博士后(合作教授:高木刚(Tsuyoshi Takagi 教授)

20078-20127月,中国科学技术大学  计算机科学与技术学院,硕博连读(导师:黄刘生 授)

20038-20077月,中国科学技术大学 传播系&计算机系,本科(传播学学士,计算机软件双学士)

主要研究方向:应用密码学,云计算中的数据安全与隐私保护,安全多方计算

[News] 2016.09, 我们的论文“Efficient Encrypted Data Comparison Through a hybrid method”Journal of Information Science and Engineering (Special issue on the Emerging Information Security and Privacy Trends for Smart City)录用,见论文列表[6].

[News] 2016.08, 我们的项目云计算中抗不可信查询者的加密数据kNN查询机制研究获得国家自然科学基金青年项目资助.

[News] 2016.08, 我们的论文“Secure Naïve Bayesian Classification over Encrypted Data in Cloud”the 10th International Conference on Provable Security (ProvSec 2016)录用,见论文列表[5].

[News] 2016.07, 我们的项目基于云平台的社交数据安全kNN查询机制研究获得2016 CCF-腾讯犀牛鸟创意基金资助.

[News] 2016.04, 我们的两篇论文被IEEE/ACM IWQoS 2016接受(CCF B类会议),见论文列表[3],[4].

[News] 2016.02,我们关于云计算中加密数据上安全kNN查询的两篇论文分别被Journal of Parallel and Distributed Computing (CCF B类期刊)PAKDD 2016 (CCF C类会议)录用出版,见论文列表[1],[2].

科研项目

(1) 国家自然科学基金青年项目(61602240)云计算中抗不可信查询者的加密数据kNN查询机制研究2017.1-2019.12,主持;

(2)江苏省自然科学基金青年项目(BK20150760)2015.7-2018.6,主持;

(3) CCF-腾讯犀牛鸟创意基金,2016-2017,主持;(资助率: 22/155=14.1%)

(4) JSPS(日本学术振兴会)科研辅助金(P12045)2012-2014,主持;

(5)南京航空航天大学青年科技创新基金(NS2016094)2016.1-2018.6,主持;

(6)中国博士后科学基金面上资助(2015M571752)2015-2017,主持;

(7)江苏省博士后科研资助计划项目(1402033C)2014-2017,主持;

(8)南京航空航天大学新教师启动基金,2014-2015,主持;

(9)南京航空航天大学理工融合专项基金(NZ2015108),“基于图的若干参数的网络抗毁性研究”,2015-2016,主要参与人.

主要论文列表

2016

[1]     Youwen Zhu, Zhiqiu Huang, Tsuyoshi Takagi. “Secure and Controllable k-NN Query over Encrypted Cloud Data with Key Confidentiality”, Journal of Parallel and Distributed Computing, vol. 89, March 2016, pp.1-12,  DOI: 10.1016/j.jpdc.2015.11.004.SCI期刊,  CCF  B类期刊)

[2]     Youwen Zhu, Zhikuan Wang, Yue Zhang. Secure k-NN Query on Encrypted Cloud Data with Limited Key-disclosure and Offline Data Owner. Proc. of the 20th Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD), Auckland, New Zealand, April 19-22, 2016. (CCF C类会议EI)

[3]     Youwen Zhu, Zhikuan Wang, Jian Wang. Collusion-Resisting Secure Nearest Neighbor Query over Encrypted Data in Cloud, Revisited. The 24th IEEE/ACM International Symposium on Quality of Service (IWQoS), Accepted, 2016. (CCF B类会议)

[4]     Youwen Zhu, Zhikuan Wang, Cheng Qian, Jian Wang. On Efficiently Harnessing Cloud to Securely Solve Linear Regression and Other Matrix Operations. The 24th IEEE/ACM International Symposium on Quality of Service (IWQoS), Accepted as a poster paper, 2016. (CCF B类会议)

[5]     Xingxin Li, Youwen Zhu*, Jian Wang. Secure Naïve Bayesian Classification over Encrypted Data in Cloud. The 10th International Conference on Provable Security (ProvSec 2016), Accepted, 2016. (中国密码学会C类会议)

[6]     Xingxin Li, Youwen Zhu*, Jian Wang. Efficient Encrypted Data Comparison Through a hybrid method. Journal of Information Science and Engineering, Accepted, Sept. 2016. (SCI期刊,  中国密码学会C类期刊)

2015

[7]     Youwen Zhu, Zhiqiu Huang, Liusheng Huang, Tsuyoshi Takagi. “On the Security of A Privacy-Preserving Product Calculation Scheme”, IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2015, DOI: 10.1109/TDSC.2014.2345404. Top SCI期刊,  CCF  A类期刊)

[8]     Youwen Zhu, Zhikuan Wang, Bilal Hassan, Yue Zhang, Jian Wang, Cheng Qian. Fast Secure Scalar Product Protocol with (almost) Optimal Efficiency, Proc. of the 11th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), LNICST 163, Nov. 10-11, 2015, pp: 234-242, DOI: 10.1007/978-3-319-28910-6_21. (CCF C类会议EI)

[9]     Youwen Zhu, Tsuyoshi Takagi. Efficient scalar product protocol and its privacy-preserving application. International Journal of Electronic Security and Digital Forensics, 7(1): 1-19, 2015. (Journal version of [17]EI期刊)

[10] Zhenhua Chen, Shundong Li, Youwen Zhu, Jianhua Yan, Xinli Xu. A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem. Security and Communication Networks, 8(18): 3592-3601, 2015. SCI期刊, CCF C类期刊)

2014

[11] Youwen Zhu, Tsuyoshi Takagi. “Efficient Privacy-preserving Reputation Evaluation in Decentralized Environments”, IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 97(1): 409-412, 2014. SCI期刊)

[12] Youwen Zhu, Tsuyoshi Takagi, Rong Hu. “Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data”, IEICE Transactions on Information and Systems, 97(2): 326-330, 2014. SCI期刊)

[13] Miaomiao Tian, Youwen Zhu, Zhili Chen. “Two Simple Attacks on a Blind Signature Scheme”, International Journal of Network Security, 16(6): 498-500, 2014. EI期刊)

2013

[14] Youwen Zhu, Rui Xu, Tsuyoshi Takagi. “Secure k-NN Query on Encrypted Cloud Database without Key-sharing”, International Journal of Electronic Security and Digital Forensics, 5(3/4): 201-217, 2013. (Journal version of [15]EI期刊)

[15] Youwen Zhu, Rui Xu, Tsuyoshi Takagi. Secure k-NN computation on encrypted cloud data without sharing key with query users. Proc. of international workshop on security in cloud computing (CloudComputing’13) in conjunction with ASIACCS, Hangzhou, China, 2013: 55-60. EI

2010-2012

[16] Youwen Zhu, Liusheng Huang, Wei Yang. Relation of PPAtMP and scalar product protocol and their applications. Proc. of the 15th IEEE symposium on computers and communications (ISCC’10), Riccione, Italy, 2010: 184-189. CCF C类会议EI

[17] Youwen Zhu, Tsuyoshi Takagi, Liusheng Huang. Efficient Secure Primitive for Privacy Preserving Distributed Computations. Proc. of the 7th international workshop on security (IWSEC’12), Fukuoka, Japan, LNCS 7631, 2012: 233-243. EI

[18] Youwen Zhu, Liusheng Huang, Wei Yang, Xing Yuan. Efficient Collusion-Resisting Secure Sum Protocol. Chinese Journal of Electronics, 2011, 20(3): 407-413. SCI期刊)

[19] 朱友文, 黄刘生, 陈国良, 杨威. 分布式计算环境下的动态可信度评估模型. 计算机学报, 2011, 34(1): 55-64. EI期刊)

[20] 朱友文, 黄刘生, 李栋, 杨威. 保护私有信息的文本信息隐藏检测算法. 电子与信息学报, 2011, 33(2): 278-283. EI期刊)

[21] 朱友文, 黄刘生, 杨威, 田苗苗. 高效的抗合谋攻击的数据聚集协议. 通信学报, 2010, 31(9a):223-227. EI期刊)

主要获奖经历

(1) 2016, WISA 2016 (The 17th World Conference on Information Security Applications) Best paper.

(2) 2011, 教育部博士研究生学术新人奖.

发明专利:

1.      朱友文,黄刘生,杨威,陈志立. “基于同态加密系统的文本信息隐藏安全检测方法[发明专利],  2013213日授权,授权号: ZL201010544647.2.

2.     黄刘生,袁星,朱友文. “基于隐私保护信任评估进行网络交易的方法[发明专利],  20141015日授权,授权号: ZL201110432849.2.

教学工作:

信息安全导论,    2016年春

算法设计与分析2015年春   2016年春

密码算法与密码协议,2015年春   2016年春

计算机思维导论2014年秋   2015年秋

学术兼职:

期刊审稿人: IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Knowledge and Data Engineering, Designs Codes and Cryptography, Science China Information Sciences, Computer & Security, Frontier of Computer Science in China, Future Generation Computer Systems, Journal of Supercomputing, Journal of Internet Technology, Journal of Computer Security, Chinese Journal of Electronics, International Journal of Internet Protocol Technology, International Journal of Electronic Security and Digital Forensics, Journal of Information Processing,《电子学报》,《通信学报》等

国际会议的PC / Reviewer / External Reviewer: TrustCom’16, NSS’16, SpaCCS’16, TSP’16, ChinaCom’15, CWBCN’15, ICCCS’15, ASIACRYPT’13, PKC’13, Securecomm’13, IWSEC’14, ISPEC’13, Provsec’13, ACNS’12, ACISP’12, ICICS’12, Securecomm’12, ISC’12, Provsec’12, ARES’12, ...

主要链接:

NTL: http://www.shoup.net/ntl/

CrypTool: https://www.cryptool.org/en

Crypto++ Library: http://www.cryptopp.com/

中国计算机学会: http://www.ccf.org.cn/sites/ccf/

中国密码学会: http://www.cacrnet.org.cn/

CORE: http://www.core.edu.au/

同事/朋友:杨威  关东海   袁伟伟    朱小军    朱旗    章宗长    Krill Morozov

最近更新日期: 201695