Youwen Zhu
中文版 Professor, Ph.D College of
Computer Science and Technology, Nanjing
University of Aeronautics and Astronautics Office:
29 Jiangjun
Road, Nanjing 211106, China Email: zhuyouwen@gmail.com
zhuyw@nuaa.edu.cn |
Currently, I am a professor with
the College of Computer Science and Technology,
Nanjing University of Aeronautics and Astronautics,
China. From August 2012 to July 2014, as a JSPS postdoctoral fellow,
I worked at Prof.
Tsuyoshi Takagi's group, Institute of Mathematics for Industry in Kyushu University, Fukuoka, Japan. The
fellowship is supported by JSPS (Japan
Society of the Promotion of Science) project of Japan. Before
that, I received my B.A. in science communication in 2007 and PhD degree in
computer science in 2012, respectively, both from University of Science and Technology of China
(USTC). I am interested in the area of applied cryptography and network security,
secure outsourcing and privacy preservation in cloud computing and
distributed computation etc. |
Publications (The
author with * is corresponding author) [1]
Xingyu He, Youwen Zhu*, RongKe Liu, Gaoning Pan,
Changyu Dong. Addressing Sensitivity Distinction in Local Differential
Privacy: A General Utility-Optimized Framework. The 34th USENIX Security
Symposium, 2025. (Accepted) [2]
Youwen Zhu,
Yuanyuan Hong, Qiao Xue*, Xiao Lan, Yushu Zhang, Yong Xiang. LDGI: Location-Discriminative Geo-Indistinguishability for Location
Privacy. IEEE Transactions on Knowledge and Data
Engineering, 2025, Volume: 37, Issue: 3, Pages: 1282-1293. [3]
Youwen Zhu,
Yiran Cao, Qiao Xue*, Qihui Wu, Yushu Zhang. Heavy Hitter Identification over Large-domain Set-valued Data with
Local Differential Privacy. IEEE
Transactions on Information Forensics and Security, 2024, Vol. 19, pp:
414-426. [4]
Shunsheng Zhang, Youwen Zhu*, Ao Zeng.
Collusion-Resilient Privacy-Preserving Database Fingerprinting, IEEE Transactions on Information Forensics and Security, 2024, Vol. 19,
pp: 8306-8321. [5]
Yue Zhang, Youwen
Zhu*, Shaowei Wang, Xiaohua Huang. Mean Estimation of Numerical Data
under (ε, δ)-Utility-optimized Local Differential Privacy. IEEE Transactions on
Information Forensics and Security, 2024, Vol. 19, pp: 9656 - 9669. [6]
Zhiqiang Zhang, Youwen
Zhu*, Jian Wang*, Xiaohui Ding, Yan Jiang. A Verifiable Deletion Protocol for Enhancing Constraints on Public
Clouds, IEEE Internet of Things Journal, 2025, Volume:
12, Issue: 4, Pages: 4499-4509. [7]
Xiqi Kuang, Youwen Zhu*, Rongke Liu, Shunsheng Zhang. Frequency estimation under relaxed
input-discriminative local differential privacy, Information Sciences, 2025, Vol. 718, No. 122351 (22 Pages). [8]
Xinxin Ye, Youwen
Zhu*, Shunsheng Zhang, Hai Deng,
Pengfei Yu. Non-Interactive
K-Mode Clustering of High-Dimensional Categorical Data under Local
Differential Privacy, Information Sciences, 2025, Vol. 718, No. 122417 (21
Pages), DOI: 10.1016/j.ins.2025.122417. [9]
Xinxin Ye, Youwen
Zhu*, Miao Zhang, Hai Deng.
Differential Privacy Data Release Scheme Using
Microaggregation with Conditional Feature Selection, IEEE Internet of Things Journal, 2023, Volume: 10, Issue: 20, Pages:
18302-18314. [10] Yan Jiang, Youwen Zhu*, Jian Wang, Xingxin Li. Fully Distributed Identity-Based Threshold
Signatures with Identifiable Aborts.
Frontiers of Computer Science, 2023, Vol. 17, Issue (5), No. 175813 (17
pages) [11] Yue Zhang, Youwen Zhu*,
Yuqqian Zhou, Jiabin
Yuan. Frequency Estimation Mechanisms under (ε, δ)-Utility-optimized Local
Differential Privacy. IEEE
Transactions on Emerging Topics in Computing, 2024, Volume: 12, Issue: 1,
Pages: 316-327. [12]
Youwen Zhu, Qimeng Song, Yonglong Luo. Differentially Private Top-k Flows Estimation Mechanism in Network
Traffic, IEEE Transactions on Network Science and
Engineering, 2024, Volume: 11, Issue: 3, Pages: 2462-2472. [13] Qiao Xue, Youwen Zhu*, Jian Wang. Joint Distribution Estimation and Naïve Bayes Classification under
Local Differential Privacy. IEEE
Transactions on Emerging Topics in Computing, 2021, Volume: 9, Issue: 4,
Pages: 2053-2063. [14] Xingxin Li, Youwen Zhu*, Jian Wang. Highly Efficient Privacy Preserving Location-Based Services with
Enhanced One-Round Blind Filter. IEEE
Transactions on Emerging Topics in Computing, 2021, Volume: 9, Issue: 4,
Pages: 1803-1814. [15] Yushu Zhang, Ping Wang, Hui Huang, Youwen Zhu*, Di Xiao, Yong Xiang. Privacy-Assured FogCS: Chaotic Compressive Sensing for Secure
Industrial Big Image Data Processing in Fog Computing. IEEE Transactions on Industrial Informatics, Volume 17, Issue 5, 2021,
Pages: 3401-3411. [16] Qiao Xue, Youwen Zhu*, Jian Wang, Xingxin Li, Ji Zhang. Locally differentially private distributed
algorithms for set intersection and union. SCIENCE CHINA Information Sciences, Volume 64, Issue 11, No. 219101,
2021. [17] Yan Jiang, Youwen Zhu*, Jian Wang, Yong Xiang. Efficient authentication protocol with anonymity
and key protection for mobile Internet users, Journal of Parallel and Distributed Computing, vol. 137, 2020, pp:
179-191, DOI: 10.1016/j.jpdc.2019.11.010. [18] Inam ul haq, Jian Wang*,
Youwen Zhu*. An Efficient Authenticated Key Agreement Scheme for Consumer USB Mass
Storage Devices Resilient to Unauthorized File Decryption, IEEE Transactions on
Consumer Electronics, 65(1): 80-89, 2019. [19] Xingxin Li, Youwen Zhu*, Jian Wang, Ji Zhang. Efficient and Secure Multi-Dimensional Geometric
Range Query over Encrypted Data in Cloud, Journal of Parallel and Distributed Computing, vol. 131, 2019, pp:
44-54. [20] Youwen Zhu, Xingxin Li, Jian Wang, Jing Li. Cloud-assisted secure biometric identification with
sub-linear search efficiency, Soft
Computing, 2019, DOI: 10.1007/s00500-019-04401-9. [21] Youwen
Zhu,
Yue Zhang, Xingxin Li, Hongyang
Yan, Jing Li. Improved
collusion-resisting secure nearest neighbor query over encrypted data in
cloud.
Concurrency and Computation Practice and Experience, volume 31, issue 21,
2019, DOI: 10.1002/cpe.4681. [22] Xingxin Li, Youwen Zhu*, Jian Wang, Zhe Liu,
Yining Liu, Mingwu Zhang. On the Soundness and Security of Privacy-Preserving
SVM for Outsourcing Data Classification, IEEE Transactions on Dependable and Secure Computing, 15(5): 906-912,
2018. [23] Lu Zhou, Youwen Zhu*, Kim-Kwang Raymond Choo. Efficiently and Securely Harness Cloud to Solve
Linear Regression and Other Matrix Operations, Future Generation Computer Systems, vol. 81, 2018, pp: 404-413. [24] Yi Liu, Yu Luo, Youwen Zhu*,
Yang Liu, Xingxin Li. Secure multi-label data classification in cloud by
additionally homomorphic encryption. Information Sciences, Vol. 468,
Nov. 2018, pp:89-102. [25] Lu Zhou, Youwen Zhu*, Aniello Castiglione. Efficient k-NN Query over Encrypted
Data in Cloud with Limited Key-disclosure and Offline Data Owner. Computers & Security (Elsevier Journal), vol. 69, pp: 84-96,
2017. [26] Qiao Xue, Youwen Zhu*, Jian Wang,
Xingxin Li. Distributed Set Intersection and Union with Local Differential Privacy. The 23rd IEEE
International Conference on Parallel and Distributed Systems, 2017, pp:
198-205. [27] Youwen Zhu, Zhiqiu Huang, Tsuyoshi Takagi. “Secure and Controllable k-NN Query over Encrypted
Cloud Data with Key Confidentiality”,
Journal of Parallel and Distributed Computing, vol. 89, March 2016,
pp.1-12, DOI:
10.1016/j.jpdc.2015.11.004. [28] Youwen
Zhu, Zhikuan Wang, Yue Zhang. Secure k-NN Query on Encrypted Cloud Data with
Limited Key-disclosure and Offline Data Owner. Proc. of the 20th Pacific Asia
Conference on Knowledge Discovery and Data Mining (PAKDD), Auckland, New
Zealand, April 19-22, 2016, pp: 401-414. [29] Youwen
Zhu, Zhikuan Wang, Jian Wang.
Collusion-Resisting
Secure Nearest Neighbor Query over Encrypted Data in Cloud, Revisited. The 24th
IEEE/ACM International Symposium on Quality of Service (IWQoS),
June 20-21, 2016, pp: 1-6. [30] Youwen
Zhu, Zhiqiu Huang, Liusheng Huang,
Tsuyoshi Takagi. “On the
Security of A Privacy-Preserving Product Calculation
Scheme”, IEEE Transactions on Dependable and Secure Computing,
2015, DOI: 10.1109/TDSC.2014.2345404. |
Awards & Honor (1) 2012, Anhui Province Excellent Graduates, from Education Department
of Anhui Province, China (2) 2011, Scholarship Award for Excellent Doctoral Student, from Ministry
of Education, China |
Professional Activities: Journal
Reviewer:
IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on
Knowledge and Data Engineering, Designs Codes and Cryptography, Science China
Information Sciences, Computer & Security, Frontier of Computer Science
in China, Journal of Supercomputing, Journal of Internet Technology, Journal
of Computer Security, Chinese Journal of Electronics, International Journal
of Internet Protocol Technology, International Journal of Electronic Security
and Digital Forensics, Journal of Information Processing PC / Reviewer
/ External Reviewer for International Conferences: SpaCCS’16, TSP’16, ChinaCom’15,
CWBCN’15, ICCCS’15, ASIACRYPT’13, PKC’13, Securecomm’13, IWSEC’14, ISPEC’13,
Provsec’13, ACNS’12, ACISP’12, ICICS’12, Securecomm’12, ISC’12, Provsec’12,
ARES’12, ... |
Links: NTL: http://www.shoup.net/ntl/ CrypTool: https://www.cryptool.org/en Crypto++ Library: http://www.cryptopp.com/ CCF: http://www.ccf.org.cn/sites/ccf/ CACR: http://www.cacrnet.org.cn/ CORE: http://www.core.edu.au/ |