Youwen Zhu                                         中文版

Professor,  Ph.D

College of Computer Science and Technology,

Nanjing University of Aeronautics and Astronautics

Office:  29 Jiangjun Road, Nanjing 211106, China

Email:   zhuyouwen@gmail.com          zhuyw@nuaa.edu.cn

Currently, I am a professor with the College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, China. From August 2012 to July 2014, as a JSPS postdoctoral fellow, I worked at Prof. Tsuyoshi Takagi's group, Institute of Mathematics for Industry in Kyushu University, Fukuoka, Japan. The fellowship is supported by JSPS (Japan Society of the Promotion of Science) project of Japan. Before that, I received my B.A. in science communication in 2007 and PhD degree in computer science in 2012, respectively, both from University of Science and Technology of China (USTC).

I am interested in the area of applied cryptography and network security, secure outsourcing and privacy preservation in cloud computing and distributed computation etc.

Publications (The author with * is corresponding author)

[1]    Yue Zhang, Youwen Zhu*, Yuqqian Zhou, Jiabin Yuan. Frequency Estimation Mechanisms under (ε, δ)-Utility-optimized Local Differential Privacy. IEEE Transactions on Emerging Topics in Computing, 2023, DOI: 10.1109/TETC.2023.3238839

[2]    Xiangli Xiao, Yushu Zhang, Youwen Zhu, Pengfei Hu, Xiaochun Cao. FingerChain: Copyrighted Multi-Owner Media Sharing by Introducing Asymmetric Fingerprinting into Blockchain. IEEE Transactions on Network and Service Management, 2023, DOI: 10.1109/TNSM.2023.3237685

[3]    Yan Jiang, Youwen Zhu*, Jian Wang, Xingxin Li. Fully Distributed Identity-Based Threshold Signatures with Identifiable Aborts. Frontiers of Computer Science, 2022, DOI: 10.1007/s11704-022-2370-4

[4]    Qiao Xue, Qingqing Ye, Haibo Hu, Youwen Zhu, Jian Wang. DDRM: A Continual Frequency Estimation Mechanism with Local Differential Privacy, IEEE Transactions on Knowledge and Data Engineering, 2022, DOI: 10.1109/TKDE.2022.3177721.

[5]    Xingxin Li, Youwen Zhu*, Rui Xu, Jian Wang, Yushu Zhang. Indexing Dynamic Encrypted Database in Cloud for Efficient Secure k-Nearest Neighbor Query, Frontiers of Computer Science, 2022, DOI: 10.1007/s11704-022-2401-1

[6] Qiao Xue, Youwen Zhu*, Jian Wang. Mean Estimation over Numeric Data with Personalized Local Differential Privacy, Frontiers of Computer Science, 2022,  Volume: 16, Issue: 3, No. 163806 (10 pages).

[7]    Qiao Xue, Youwen Zhu*, Jian Wang. Joint Distribution Estimation and Naïve Bayes Classification under Local Differential Privacy. IEEE Transactions on Emerging Topics in Computing, 2021, Volume: 9, Issue: 4, Pages: 2053-2063.

[8]    Xingxin Li, Youwen Zhu*, Jian Wang. Highly Efficient Privacy Preserving Location-Based Services with Enhanced One-Round Blind Filter. IEEE Transactions on Emerging Topics in Computing, 2021, Volume: 9, Issue: 4, Pages: 1803-1814.

[9]    Yushu Zhang, Ping Wang, Hui Huang, Youwen Zhu*, Di Xiao, Yong Xiang. Privacy-Assured FogCS: Chaotic Compressive Sensing for Secure Industrial Big Image Data Processing in Fog Computing. IEEE Transactions on Industrial Informatics, Volume 17, Issue 5, 2021, Pages: 3401-3411.

[10] Qiao Xue, Youwen Zhu*, Jian Wang, Xingxin Li, Ji Zhang. Locally differentially private distributed algorithms for set intersection and union. SCIENCE CHINA Information Sciences, Volume 64, Issue 11, No. 219101, 2021.

[11] Yan Jiang, Youwen Zhu*, Jian Wang, Yong Xiang. Efficient authentication protocol with anonymity and key protection for mobile Internet users, Journal of Parallel and Distributed Computing, vol. 137, 2020, pp: 179-191, DOI: 10.1016/j.jpdc.2019.11.010.

[12] Inam ul haq, Jian Wang*, Youwen Zhu*. An Efficient Authenticated Key Agreement Scheme for Consumer USB Mass Storage Devices Resilient to Unauthorized File Decryption, IEEE Transactions on Consumer Electronics, 65(1): 80-89, 2019.

[13] Xingxin Li, Youwen Zhu*, Jian Wang, Ji Zhang. Efficient and Secure Multi-Dimensional Geometric Range Query over Encrypted Data in Cloud, Journal of Parallel and Distributed Computing, vol. 131, 2019, pp: 44-54.

[14] Youwen Zhu, Xingxin Li, Jian Wang, Jing Li. Cloud-assisted secure biometric identification with sub-linear search efficiency, Soft Computing, 2019, DOI: 10.1007/s00500-019-04401-9.

[15] Youwen Zhu, Yue Zhang, Xingxin Li, Hongyang Yan, Jing Li. Improved collusion-resisting secure nearest neighbor query over encrypted data in cloud. Concurrency and Computation Practice and Experience, volume 31, issue 21, 2019, DOI: 10.1002/cpe.4681.

[16] Xingxin Li, Youwen Zhu*, Jian Wang, Zhe Liu, Yining Liu, Mingwu Zhang. On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification, IEEE Transactions on Dependable and Secure Computing, 15(5): 906-912, 2018.

[17] Lu Zhou, Youwen Zhu*, Kim-Kwang Raymond Choo. Efficiently and Securely Harness Cloud to Solve Linear Regression and Other Matrix Operations, Future Generation Computer Systems, vol. 81, 2018, pp: 404-413.

[18] Yi Liu, Yu Luo, Youwen Zhu*, Yang Liu, Xingxin Li. Secure multi-label data classification in cloud by additionally homomorphic encryption. Information Sciences, Vol. 468, Nov. 2018, pp:89-102.

[19] Lu Zhou, Youwen Zhu*, Aniello Castiglione. Efficient k-NN Query over Encrypted Data in Cloud with Limited Key-disclosure and Offline Data Owner. Computers & Security (Elsevier Journal), vol. 69, pp: 84-96, 2017.

[20] Youwen Zhu, Xingxin Li, Jian Wang, Yining Liu, Zhiguo Qu. Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud. International Journal of Foundations of Computer Science, 28(6): 683-703, 2017.

[21] Qiao Xue, Youwen Zhu*, Jian Wang, Xingxin Li. Distributed Set Intersection and Union with Local Differential Privacy. The 23rd IEEE International Conference on Parallel and Distributed Systems, 2017, pp: 198-205.

[22] Youwen Zhu, Zhiqiu Huang, Tsuyoshi Takagi. “Secure and Controllable k-NN Query over Encrypted Cloud Data with Key Confidentiality”, Journal of Parallel and Distributed Computing, vol. 89, March 2016, pp.1-12,  DOI: 10.1016/j.jpdc.2015.11.004.

[23] Youwen Zhu, Zhikuan Wang, Yue Zhang. Secure k-NN Query on Encrypted Cloud Data with Limited Key-disclosure and Offline Data Owner. Proc. of the 20th Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD), Auckland, New Zealand, April 19-22, 2016, pp: 401-414.

[24] Youwen Zhu, Zhikuan Wang, Jian Wang. Collusion-Resisting Secure Nearest Neighbor Query over Encrypted Data in Cloud, Revisited. The 24th IEEE/ACM International Symposium on Quality of Service (IWQoS), June 20-21, 2016, pp: 1-6.

[25] Youwen Zhu, Zhiqiu Huang, Liusheng Huang, Tsuyoshi Takagi. “On the Security of A Privacy-Preserving Product Calculation Scheme”, IEEE Transactions on Dependable and Secure Computing, 2015, DOI: 10.1109/TDSC.2014.2345404.

Awards & Honors

(1) 2012, Anhui Province Excellent Graduates, from Education Department of Anhui Province, China

(2) 2011, Scholarship Award for Excellent Doctoral Student, from Ministry of Education, China

Patents: ZL201010544647.2,  ZL201110432849.2

Teaching:

Design and Analysis of Algorithms, S’15 & S’16

Cryptographic Algorithm and Cryptographic Protocol, S’15 & S’16

An Introduction to Computational Thinking, F’14 & F’15

Professional Activities:

Journal Reviewer: IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Knowledge and Data Engineering, Designs Codes and Cryptography, Science China Information Sciences, Computer & Security, Frontier of Computer Science in China, Journal of Supercomputing, Journal of Internet Technology, Journal of Computer Security, Chinese Journal of Electronics, International Journal of Internet Protocol Technology, International Journal of Electronic Security and Digital Forensics, Journal of Information Processing

PC / Reviewer / External Reviewer for International Conferences: SpaCCS’16, TSP’16, ChinaCom’15, CWBCN’15, ICCCS’15, ASIACRYPT’13, PKC’13, Securecomm’13, IWSEC’14, ISPEC’13, Provsec’13, ACNS’12, ACISP’12, ICICS’12, Securecomm’12, ISC’12, Provsec’12, ARES’12, ...

Links:

NTL: http://www.shoup.net/ntl/

CrypTool: https://www.cryptool.org/en

Crypto++ Library: http://www.cryptopp.com/

CCF: http://www.ccf.org.cn/sites/ccf/

CACR: http://www.cacrnet.org.cn/

CORE: http://www.core.edu.au/