Youwen Zhu
中文版 Associate
Professor, Ph.D College of
Computer Science and Technology, Nanjing
University of Aeronautics and Astronautics Office:
29 Jiangjun Road, Nanjing 211106, China Email: zhuyouwen@gmail.com
zhuyw@nuaa.edu.cn |
Currently, I am an associate
professor with the College of Computer
Science and Technology, Nanjing
University of Aeronautics and Astronautics, China. From August
2012 to July 2014, as a JSPS
postdoctoral fellow, I worked at Prof.
Tsuyoshi Takagi's group, Institute of Mathematics for Industry in Kyushu University, Fukuoka, Japan. The
fellowship is supported by JSPS (Japan
Society of the Promotion of Science) project of Japan. Before
that, I received my B.A. in science communication in 2007 and PhD degree in
computer science in 2012, respectively, both from University of Science and Technology of China
(USTC). I am interested in the area of
applied cryptography and network security, secure outsourcing and privacy
preservation in cloud computing and distributed computation etc. |
Publications (The
author with * is corresponding author) 2018 [1] Lu Zhou, Youwen Zhu*, Kim-Kwang Raymond Choo.
Efficiently and Securely Harness Cloud to Solve
Linear Regression and Other Matrix Operations, Future Generation Computer Systems, vol. 81, 2018, pp: 404-413. (CCF
C) 2017 [2]
Xingxin Li, Youwen
Zhu*, Jian Wang, Zhe Liu, Yining Liu, Mingwu Zhang. “On the Soundness and Security of Privacy-Preserving
SVM for Outsourcing Data Classification”, IEEE Transactions on Dependable and Secure Computing (IEEE TDSC),
Accepted, 2017, DOI: 10.1109/TDSC.2017.2682244.( CCF A) [3]
Xingxin
Li, Youwen Zhu*,
Jian Wang. Efficient Encrypted Data Comparison Through a
hybrid method. Journal of Information Science and Engineering,
33(4): 953-964, 2017. (CACR C) [4]
Lu Zhou, Youwen
Zhu*, Aniello Castiglione. Efficient k-NN Query over Encrypted
Data in Cloud with Limited Key-disclosure and Offline Data Owner. Computers & Security (Elsevier Journal), vol. 69, pp: 84-96,
2017, DOI: 10.1016/j.cose.2016.11.013. (CCF
B) [5] Xinshu Ma, Youwen Zhu*, Xingxin Li. An efficient and secure ridge regression
outsourcing scheme in wearable devices. Computers & Electrical Engineering (Elsevier Journal), vol. 63,
2017, pp: 246-256. [6]
Youwen Zhu, Xingxin Li, Jian Wang, Yining Liu, Zhiguo Qu. Practical Secure Naïve Bayesian Classification Over
Encrypted Big Data in Cloud.
International Journal of Foundations of Computer Science, 28(6): 683-703,
2017. (SCI) [7] Qiao Xue, Youwen Zhu*, Jian Wang,
Xingxin Li. Distributed Set Intersection and Union with Local Differential
Privacy. The 23rd IEEE International Conference on Parallel and Distributed
Systems (ICPADS), 2017, pp: 198-205. (CCF C) [8] Yang Liu, Xingxin Li, Youwen Zhu*, Jian Wang,
Zhe Liu. Secure Multi-label Classification over Encrypted Data in Cloud. The
11th International Conference on Provable Security (Provsec), 2017, pp:
57-73. (CACR C) 2016 [9]
Youwen Zhu, Zhiqiu Huang, Tsuyoshi Takagi. “Secure and Controllable k-NN Query over Encrypted
Cloud Data with Key Confidentiality”, Journal of Parallel and Distributed Computing,
vol. 89, Mar. 2016, pp.1-12, DOI: 10.1016/j.jpdc.2015.11.004.(CCF B) [10]
Youwen Zhu, Zhikuan Wang, Yue
Zhang. Secure k-NN Query on Encrypted Cloud Data with
Limited Key-disclosure and Offline Data Owner. Proc. of the 20th Pacific Asia
Conference on Knowledge Discovery and Data Mining (PAKDD), Auckland, New
Zealand, April 19-22, 2016, PP: 401-414. (CCF C) [11]
Youwen Zhu, Zhikuan Wang, Jian
Wang. Collusion-Resisting Secure Nearest
Neighbor Query over Encrypted Data in Cloud, Revisited.
24th IEEE/ACM International Symposium on Quality of Service
(IWQoS), June 20-21, 2016, PP: 1-6. (CCF B) [12]
Youwen Zhu, Zhikuan Wang, Cheng
Qian, Jian Wang. On
Efficiently Harnessing Cloud to Securely Solve Linear Regression and Other
Matrix Operations. 24th IEEE/ACM
International Symposium on Quality of Service (IWQoS), June 20-21, 2016. (CCF
B) [13]
Xingxin Li, Youwen
Zhu*, Jian Wang. Secure Naïve Bayesian Classification over Encrypted
Data in Cloud. The 10th International
Conference on Provable Security (ProvSec 2016), LNCS 10005, pp. 130-150, 2016. 2015 [14]
Youwen Zhu, Zhiqiu Huang,
Liusheng Huang, Tsuyoshi Takagi. “On the
Security of A Privacy-Preserving Product Calculation Scheme”, IEEE
Transactions on Dependable and Secure Computing (IEEE TDSC), 2015, DOI:
10.1109/TDSC.2014.2345404. (CCF
A) [15]
Youwen Zhu, Zhikuan Wang, Bilal
Hassan, Yue Zhang, Jian Wang, Cheng Qian.
Fast Secure Scalar Product Protocol with (almost)
Optimal Efficiency, Proc. of the 11th EAI International Conference on
Collaborative Computing: Networking, Applications and Worksharing
(CollaborateCom), LNICST 163, Nov. 10-11, 2015, pp: 234-242. (CCF C) [16]
Youwen Zhu, Tsuyoshi Takagi. Efficient scalar product protocol and its privacy-preserving
application. International Journal of Electronic Security and
Digital Forensics, 7(1): 1-19, 2015. [17]
Zhenhua Chen, Shundong Li, Youwen Zhu, Jianhua Yan, Xinli Xu. A cheater identifiable
multi-secret sharing scheme based on the Chinese remainder theorem. Security
and Communication Networks, 8(18): 3592-3601, 2015. (CCF C) 2014 [18]
Youwen Zhu, Tsuyoshi Takagi. “Efficient Privacy-preserving Reputation Evaluation in
Decentralized Environments”, IEICE Transactions on Fundamentals of
Electronics Communications and Computer Sciences, 97(1): 409-412, 2014. [19]
Youwen Zhu, Tsuyoshi Takagi,
Rong Hu. “Security Analysis of Collusion-Resistant Nearest
Neighbor Query Scheme on Encrypted Cloud Data”, IEICE Transactions
on Information and Systems, 97(2): 326-330, 2014. [20]
Miaomiao
Tian, Youwen Zhu, Zhili Chen. “Two
Simple Attacks on a Blind Signature Scheme”, International Journal of Network
Security, 16(6): 498-500, 2014. 2013 [21]
Youwen Zhu, Rui Xu, Tsuyoshi
Takagi. “Secure k-NN Query on Encrypted Cloud Database
without Key-sharing”, International Journal of Electronic Security
and Digital Forensics, 5(3/4): 201-217, 2013. [22]
Youwen Zhu, Rui Xu, Tsuyoshi
Takagi. Secure k-NN computation on encrypted cloud data without sharing key
with query users. Proc. of international workshop on security in cloud
computing (CloudComputing’13) in conjunction with ASIACCS, Hangzhou, China,
2013: 55-60. 2010-2012 [23]
Youwen Zhu, Liusheng Huang, Wei
Yang. Relation of PPAtMP and scalar product protocol and their applications.
Proc. of the 15th IEEE symposium on computers and communications
(ISCC’10), Riccione, Italy, 2010: 184-189. (CCF
C) [24]
Youwen Zhu, Tsuyoshi Takagi,
Liusheng Huang. Efficient Secure Primitive for Privacy Preserving Distributed
Computations. Proc. of the 7th international workshop on security (IWSEC’12),
Fukuoka, Japan, LNCS 7631, 2012: 233-243. [25]
Youwen Zhu, Liusheng Huang, Wei
Yang, Xing Yuan. Efficient Collusion-Resisting
Secure Sum Protocol. Chinese Journal of Electronics, 2011, 20(3):
407-413. [26]
Youwen Zhu, Liusheng Huang,
Guoliang Chen, Wei Yang. Dynamic Trust Evaluation Model under Distributed
Computing Environment. Chinese Journal of Computers, 2011, 34(1): 55-64. (in
Chinese) [27]
Youwen Zhu, Liusheng Huang, Wei
Yang, Miaomiao Tian. Efficient collusion-resisting data aggregation protocol.
Journal on Communications, 2010, 31(9a):223-227. (in Chinese) [28]
Youwen Zhu, Liusheng Huang, Dong
Li, Wei Yang. Privacy-preserving Text Information Hiding Detecting Algorithm.
Journal of Electronics & Information Technology, 2011, 33(2): 278-283.
(in Chinese) |
Awards & Honor (1) 2012, Anhui Province Excellent Graduates, from Education Department
of Anhui Province, China (2) 2011, Scholarship Award for Excellent Doctoral Student, from Ministry
of Education, China |
Patents: ZL201010544647.2, ZL201110432849.2 |
Teaching: Design and Analysis of
Algorithms, S’15 & S’16 Cryptographic
Algorithm and Cryptographic Protocol, S’15 & S’16 An Introduction to
Computational Thinking, F’14 & F’15 |
Professional Activities: Journal
Reviewer:
IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on
Knowledge and Data Engineering, Designs Codes and Cryptography, Science China
Information Sciences, Computer & Security, Frontier of Computer Science
in China, Journal of Supercomputing, Journal of Internet Technology, Journal
of Computer Security, Chinese Journal of Electronics, International Journal
of Internet Protocol Technology, International Journal of Electronic Security
and Digital Forensics, Journal of Information Processing PC /
Reviewer / External Reviewer for International Conferences: SpaCCS’16, TSP’16,
ChinaCom’15, CWBCN’15, ICCCS’15, ASIACRYPT’13, PKC’13, Securecomm’13,
IWSEC’14, ISPEC’13, Provsec’13, ACNS’12, ACISP’12, ICICS’12, Securecomm’12,
ISC’12, Provsec’12, ARES’12, ... |
Links: NTL: http://www.shoup.net/ntl/ CrypTool: https://www.cryptool.org/en Crypto++ Library: http://www.cryptopp.com/ CCF: http://www.ccf.org.cn/sites/ccf/ CACR: http://www.cacrnet.org.cn/ CORE: http://www.core.edu.au/ |
Last update: Feb. 28th, 2018