朱友文

教授,博士

南京航空航天大学计算机科学与技术学院

Email:  zhuyouwen@gmail.com       zhuyw@nuaa.edu.cn

主要经历

20206月至今,南京航空航天大学   计算机科学与技术学院,教授

20146-20206月,南京航空航天大学   计算机科学与技术学院,副教授

20128-20147月,日本九州大学,JSPS博士后

20078-20127月,中国科学技术大学  计算机科学与技术学院,硕博连读

20038-20077月,中国科学技术大学 传播系&计算机系,本科(传播学学士, 计算机软件双学士)

主要研究方向:应用密码学,人工智能中的安全与隐私保护问题(安全多方计算、差分隐私等)

科研项目

(1) 国家自然科学基金,2017.1-2019.12,主持;

(2)江苏省自然科学基金,2015.7-2018.6,主持;

(3) CCF-腾讯犀牛鸟创意基金,2016-2017,主持;(资助率: 22/155=14.1%)

(4) JSPS(日本学术振兴会)科研辅助金,2012-2014,主持;

(5)中国博士后科学基金面上资助,2015-2017,主持;

(6)国家重点研发计划项目“异构身份联盟与监管基础科学问题研究”,2017-2020,参与(核心骨干);

主要论文列表(*的为通信作者)

Preprint(Accepted)

[1]    Qiao Xue, Youwen Zhu*, Jian Wang. Joint Distribution Estimation and Naïve Bayes Classification under Local Differential Privacy. IEEE Transactions on Emerging Topics in Computing, December 2019, DOI: 10.1109/TETC.2019.2959581

[2]    Xingxin Li, Youwen Zhu*, Jian Wang. Highly Efficient Privacy Preserving Location-Based Services with Enhanced One-Round Blind Filter. IEEE Transactions on Emerging Topics in Computing, 2019, DOI: 10.1109/TETC.2019.2926385

[3]    Qiao Xue, Youwen Zhu*, Jian Wang, Xingxin Li, Ji Zhang. Locally differentially private distributed algorithms for set intersection and union. SCIENCE CHINA Information Sciences, 2019, DOI: 10.1007/s11432-018-9899-8   CCF B类期刊)

[4]    Youwen Zhu, Xingxin Li. Privacy-preserving k-means clustering with local synchronization in peer-to-peer networks. Peer-to-Peer Networking and Applications, 2020, DOI: 10.1007/s12083-020-00881-x   CCF C类期刊)

[5]    Qiao Xue, Youwen Zhu*, Jian Wang. Mean Estimation over Numeric Data with Personalized Local Differential Privacy, Frontiers of Computer Science, 2020, DOI: 10.1007/s11704-020-0103-0   CCF C类期刊)

[6]    Yushu Zhang, Ping Wang, Hui Huang, Youwen Zhu*, Di Xiao, Yong Xiang. Privacy-Assured FogCS: Chaotic Compressive Sensing for Secure Industrial Big Image Data Processing in Fog Computing. IEEE Transactions on Industrial Informatics, 2020, DOI: 10.1109/TII.2020.3008914

[7]    Inam ul haq, Jian Wang, Youwen Zhu*, Saad Maqbool. An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation, Digital Communications and Networks, 2020, DOI: 10.1016/j.dcan.2020.05.001

2020

[8]    Yan Jiang, Youwen Zhu*, Jian Wang, Yong Xiang. Efficient authentication protocol with anonymity and key protection for mobile Internet users, Journal of Parallel and Distributed Computing, vol. 137, 2020, pp: 179-191, DOI: 10.1016/j.jpdc.2019.11.010. CCF B类期刊)

[9]    Inam ul haq, Jian Wang, Youwen Zhu*. Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks, Journal of Network and Computer Applications, Volume 161, 1 July 2020, Paper No. 102660 (11pages).

2019

[10] Inam ul haq, Jian Wang*, Youwen Zhu*. An Efficient Authenticated Key Agreement Scheme for Consumer USB Mass Storage Devices Resilient to Unauthorized File Decryption, IEEE Transactions on Consumer Electronics, 65(1): 80-89, 2019.

[11] Xingxin Li, Youwen Zhu*, Jian Wang, Ji Zhang. Efficient and Secure Multi-Dimensional Geometric Range Query over Encrypted Data in Cloud, Journal of Parallel and Distributed Computing, vol. 131, 2019, pp: 44-54. CCF B类期刊)

[12] Youwen Zhu, Xingxin Li, Jian Wang, Jing Li. Cloud-assisted secure biometric identification with sub-linear search efficiency, Soft Computing, 2019, DOI: 10.1007/s00500-019-04401-9   CCF C类期刊)

[13] Youwen Zhu, Yue Zhang, Xingxin Li, Hongyang Yan, Jing Li. Improved collusion-resisting secure nearest neighbor query over encrypted data in cloud. Concurrency and Computation Practice and Experience, volume 31, issue 21, 2019, DOI: 10.1002/cpe.4681. (CCF  C)

2018

[14] Xingxin Li, Youwen Zhu*, Jian Wang, Zhe Liu, Yining Liu, Mingwu Zhang. On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification, IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 15(5): 906-912, 2018. CCF  A类期刊)

[15] Lu Zhou, Youwen Zhu*, Kim-Kwang Raymond Choo. Efficiently and Securely Harness Cloud to Solve Linear Regression and Other Matrix Operations, Future Generation Computer Systems, vol. 81, 2018, pp: 404-413. (CCF  C)

[16] Yi Liu, Yu Luo, Youwen Zhu*, Yang Liu, Xingxin Li. Secure multi-label data classification in cloud by additionally homomorphic encryption. Information Sciences, Vol. 468, Nov. 2018, pp:89-102. (CCF  B)

2017

[17] Xingxin Li, Youwen Zhu*, Jian Wang. Efficient Encrypted Data Comparison Through a hybrid method. Journal of Information Science and Engineering, 33(4): 953-964, 2017. (中国密码学会C类期刊)

[18] Lu Zhou, Youwen Zhu*, Aniello Castiglione. Efficient k-NN Query over Encrypted Data in Cloud with Limited Key-disclosure and Offline Data Owner. Computers & Security (Elsevier Journal), vol. 69, pp: 84-96, 2017, DOI: 10.1016/j.cose.2016.11.013. (CCF  B类期刊)

[19] Xinshu Ma, Youwen Zhu*, Xingxin Li. An efficient and secure ridge regression outsourcing scheme in wearable devices. Computers & Electrical Engineering (Elsevier Journal), vol. 63, 2017, pp: 246-256.

[20] Youwen Zhu, Xingxin Li, Jian Wang, Yining Liu, Zhiguo Qu. Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud. International Journal of Foundations of Computer Science, 28(6): 683-703, 2017.

[21] Qiao Xue, Youwen Zhu*, Jian Wang, Xingxin Li. Distributed Set Intersection and Union with Local Differential Privacy. The 23rd IEEE International Conference on Parallel and Distributed Systems (ICPADS), 2017, pp: 198-205. (CCF  C类会议)

2016

[22] Youwen Zhu, Zhiqiu Huang, Tsuyoshi Takagi. “Secure and Controllable k-NN Query over Encrypted Cloud Data with Key Confidentiality”, Journal of Parallel and Distributed Computing, vol. 89, March 2016, pp.1-12,  DOI: 10.1016/j.jpdc.2015.11.004.CCF  B类期刊)

[23] Youwen Zhu, Zhikuan Wang, Yue Zhang. Secure k-NN Query on Encrypted Cloud Data with Limited Key-disclosure and Offline Data Owner. Proc. of the 20th Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD), Auckland, New Zealand, April 19-22, 2016, pp: 401-414. (CCF C类会议)

[24] Youwen Zhu, Zhikuan Wang, Jian Wang. Collusion-Resisting Secure Nearest Neighbor Query over Encrypted Data in Cloud, Revisited. The 24th IEEE/ACM International Symposium on Quality of Service (IWQoS), June 20-21, 2016, pp: 1-6. (CCF B类会议)

[25] Youwen Zhu, Zhikuan Wang, Cheng Qian, Jian Wang. On Efficiently Harnessing Cloud to Securely Solve Linear Regression and Other Matrix Operations. The 24th IEEE/ACM International Symposium on Quality of Service (IWQoS), June 20-21, 2016. (CCF B类会议)

[26] Xingxin Li, Youwen Zhu*, Jian Wang. Secure Naïve Bayesian Classification over Encrypted Data in Cloud. The 10th International Conference on Provable Security (ProvSec 2016), LNCS 10005, pp. 130-150, 2016. (中国密码学会C类会议)

2015

[27] Youwen Zhu, Zhiqiu Huang, Liusheng Huang, Tsuyoshi Takagi. “On the Security of A Privacy-Preserving Product Calculation Scheme”, IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2015, DOI: 10.1109/TDSC.2014.2345404. CCF  A类期刊)

[28] Youwen Zhu, Zhikuan Wang, Bilal Hassan, Yue Zhang, Jian Wang, Cheng Qian. Fast Secure Scalar Product Protocol with (almost) Optimal Efficiency, Proc. of the 11th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), LNICST 163, Nov. 10-11, 2015, pp: 234-242. (CCF C类会议)

2010-2014

[29] Youwen Zhu, Tsuyoshi Takagi. “Efficient Privacy-preserving Reputation Evaluation in Decentralized Environments”, IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 97(1): 409-412, 2014. SCI期刊)

[30] Youwen Zhu, Tsuyoshi Takagi, Rong Hu. “Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data”, IEICE Transactions on Information and Systems, 97(2): 326-330, 2014. SCI期刊)

[31] Youwen Zhu, Rui Xu, Tsuyoshi Takagi. Secure k-NN computation on encrypted cloud data without sharing key with query users. Proc. of international workshop on security in cloud computing (CloudComputing’13) in conjunction with ASIACCS, Hangzhou, China, 2013: 55-60. EI

[32] Youwen Zhu, Liusheng Huang, Wei Yang. Relation of PPAtMP and scalar product protocol and their applications. Proc. of the 15th IEEE symposium on computers and communications (ISCC’10), Riccione, Italy, 2010: 184-189. CCF C类会议EI

[33] Youwen Zhu, Tsuyoshi Takagi, Liusheng Huang. Efficient Secure Primitive for Privacy Preserving Distributed Computations. Proc. of the 7th international workshop on security (IWSEC’12), Fukuoka, Japan, LNCS 7631, 2012: 233-243. EI

[34] Youwen Zhu, Liusheng Huang, Wei Yang, Xing Yuan. Efficient Collusion-Resisting Secure Sum Protocol. Chinese Journal of Electronics, 2011, 20(3): 407-413. SCI期刊)

[35] 朱友文, 黄刘生, 陈国良, 杨威. 分布式计算环境下的动态可信度评估模型. 计算机学报, 2011, 34(1): 55-64. EI期刊)

[36] 朱友文, 黄刘生, 李栋, 杨威. 保护私有信息的文本信息隐藏检测算法. 电子与信息学报, 2011, 33(2): 278-283. EI期刊)

[37] 朱友文, 黄刘生, 杨威, 田苗苗. 高效的抗合谋攻击的数据聚集协议. 通信学报, 2010, 31(9a):223-227. EI期刊)

主要获奖经历

2011, 教育部博士研究生学术新人奖.

发明专利:

1.     朱友文, 陈舒荻. 一种抗肩窥的智能手机上安全口令输入方法. 发明专利, 申请号:201810991623.8,申请时间:20188月。

2.     朱友文, 陈舒荻. 一种抗摄像攻击的数字口令输入方法. 发明专利, 申请号:201810535074.3,申请时间:20185月。

3.     朱友文, 鲁迁迁. 一种无需重注册并支持离线认证的动态口令认证方法. 发明专利, 申请号:201811298431.5,申请时间:201810月。

4.     朱友文, 王健一, 王箭, 庄锦城. 基于云计算平台的Paillier加密方法. 发明专利,申请号:CN201711320566.2, 申请日期:1212日。

5.     朱友文,黄刘生,杨威,陈志立. “基于同态加密系统的文本信息隐藏安全检测方法,发明专利,  2013213日授权,授权号: ZL201010544647.2.

6.     吴吉斌,朱友文,王箭. 一种垂直分布数据集上的隐私保护skyline查询方法. 发明专利,申请号:201711381091.8,申请日期:20171220日。

7.     刘洋,王箭,朱友文. 一种基于ML-kNN的保护隐私的多标记分类方法. 发明专利, 申请号:201711325129.X

8.    黄刘生,袁星,朱友文. “基于隐私保护信任评估进行网络交易的方法[发明专利],  20141015日授权,授权号: ZL201110432849.2.

教学工作:

信息安全导论,2016年春

算法设计与分析2015- 2020年春

密码算法与密码协议,2015-2017年春

计算机思维导论2014-2015年秋

学术兼职:

期刊审稿人: IEEE Transactions on Computer, IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Knowledge and Data Engineering, IEEE Transactions on Industrial Informatics, Designs Codes and Cryptography, Science China Information Sciences, Computer & Security, Frontier of Computer Science in China, Future Generation Computer Systems, Journal of Supercomputing, Journal of Internet Technology, Journal of Computer Security, Chinese Journal of Electronics, International Journal of Internet Protocol Technology, International Journal of Electronic Security and Digital Forensics, Journal of Information Processing,《电子学报》,《通信学报》等

主要链接:

NTL: http://www.shoup.net/ntl/

CrypTool: https://www.cryptool.org/en

Crypto++ Library: http://www.cryptopp.com/

中国计算机学会: http://www.ccf.org.cn/sites/ccf/

中国密码学会: http://www.cacrnet.org.cn/

CORE: http://www.core.edu.au/

最近更新日期: 2020713