Youwen Zhu                                         中文版

Associate Professor,  Ph.D

College of Computer Science and Technology,

Nanjing University of Aeronautics and Astronautics

Office:  29 Jiangjun Road, Nanjing 211106, China

Email:   zhuyouwen@gmail.com          zhuyw@nuaa.edu.cn

Currently, I am an associate professor with the College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, China. From August 2012 to July 2014, as a JSPS postdoctoral fellow, I worked at Prof. Tsuyoshi Takagi's group, Institute of Mathematics for Industry in Kyushu University, Fukuoka, Japan. The fellowship is supported by JSPS (Japan Society of the Promotion of Science) project of Japan. Before that, I received my B.A. in science communication in 2007 and PhD degree in computer science in 2012, respectively, both from University of Science and Technology of China (USTC).

I am interested in the area of applied cryptography and network security, secure outsourcing and privacy preservation in cloud computing and distributed computation etc.

Publications (The author with * is corresponding author)

2018

[1]      Lu Zhou, Youwen Zhu*, Kim-Kwang Raymond Choo. Efficiently and Securely Harness Cloud to Solve Linear Regression and Other Matrix Operations, Future Generation Computer Systems, vol. 81, 2018, pp: 404-413. (CCF  C)

2017

[2]    Xingxin Li, Youwen Zhu*, Jian Wang, Zhe Liu, Yining Liu, Mingwu Zhang. “On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification”, IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Accepted, 2017, DOI: 10.1109/TDSC.2017.2682244. CCF  A

[3]    Xingxin Li, Youwen Zhu*, Jian Wang. Efficient Encrypted Data Comparison Through a hybrid method. Journal of Information Science and Engineering, 33(4): 953-964, 2017. (CACR C)

[4]      Lu Zhou, Youwen Zhu*, Aniello Castiglione. Efficient k-NN Query over Encrypted Data in Cloud with Limited Key-disclosure and Offline Data Owner. Computers & Security (Elsevier Journal), vol. 69, pp: 84-96, 2017, DOI: 10.1016/j.cose.2016.11.013. (CCF  B)

[5]      Xinshu Ma, Youwen Zhu*, Xingxin Li. An efficient and secure ridge regression outsourcing scheme in wearable devices. Computers & Electrical Engineering (Elsevier Journal), vol. 63, 2017, pp: 246-256.

[6]    Youwen Zhu, Xingxin Li, Jian Wang, Yining Liu, Zhiguo Qu. Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud. International Journal of Foundations of Computer Science, 28(6): 683-703, 2017. (SCI)

[7]      Qiao Xue, Youwen Zhu*, Jian Wang, Xingxin Li. Distributed Set Intersection and Union with Local Differential Privacy. The 23rd IEEE International Conference on Parallel and Distributed Systems (ICPADS), 2017, pp: 198-205. (CCF C)

[8]      Yang Liu, Xingxin Li, Youwen Zhu*, Jian Wang, Zhe Liu. Secure Multi-label Classification over Encrypted Data in Cloud. The 11th International Conference on Provable Security (Provsec), 2017, pp: 57-73. (CACR C)

2016

[9]    Youwen Zhu, Zhiqiu Huang, Tsuyoshi Takagi. “Secure and Controllable k-NN Query over Encrypted Cloud Data with Key Confidentiality, Journal of Parallel and Distributed Computing, vol. 89, Mar. 2016, pp.1-12, DOI: 10.1016/j.jpdc.2015.11.004.CCF  B

[10] Youwen Zhu, Zhikuan Wang, Yue Zhang. Secure k-NN Query on Encrypted Cloud Data with Limited Key-disclosure and Offline Data Owner. Proc. of the 20th Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD), Auckland, New Zealand, April 19-22, 2016, PP: 401-414. (CCF C)

[11] Youwen Zhu, Zhikuan Wang, Jian Wang. Collusion-Resisting Secure Nearest Neighbor Query over Encrypted Data in Cloud, Revisited. 24th IEEE/ACM International Symposium on Quality of Service (IWQoS), June 20-21, 2016, PP: 1-6. (CCF B)

[12] Youwen Zhu, Zhikuan Wang, Cheng Qian, Jian Wang. On Efficiently Harnessing Cloud to Securely Solve Linear Regression and Other Matrix Operations. 24th IEEE/ACM International Symposium on Quality of Service (IWQoS), June 20-21, 2016. (CCF B)

[13] Xingxin Li, Youwen Zhu*, Jian Wang. Secure Naïve Bayesian Classification over Encrypted Data in Cloud. The 10th International Conference on Provable Security (ProvSec 2016), LNCS 10005, pp. 130-150, 2016.

2015

[14] Youwen Zhu, Zhiqiu Huang, Liusheng Huang, Tsuyoshi Takagi. “On the Security of A Privacy-Preserving Product Calculation Scheme”, IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2015, DOI: 10.1109/TDSC.2014.2345404. CCF  A

[15] Youwen Zhu, Zhikuan Wang, Bilal Hassan, Yue Zhang, Jian Wang, Cheng Qian. Fast Secure Scalar Product Protocol with (almost) Optimal Efficiency, Proc. of the 11th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), LNICST 163, Nov. 10-11, 2015, pp: 234-242. (CCF C)

[16] Youwen Zhu, Tsuyoshi Takagi. Efficient scalar product protocol and its privacy-preserving application. International Journal of Electronic Security and Digital Forensics, 7(1): 1-19, 2015.

[17] Zhenhua Chen, Shundong Li, Youwen Zhu, Jianhua Yan, Xinli Xu. A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem. Security and Communication Networks, 8(18): 3592-3601, 2015. (CCF C)

2014

[18] Youwen Zhu, Tsuyoshi Takagi. “Efficient Privacy-preserving Reputation Evaluation in Decentralized Environments”, IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 97(1): 409-412, 2014.

[19] Youwen Zhu, Tsuyoshi Takagi, Rong Hu. “Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data”, IEICE Transactions on Information and Systems, 97(2): 326-330, 2014.

[20] Miaomiao Tian, Youwen Zhu, Zhili Chen. “Two Simple Attacks on a Blind Signature Scheme”, International Journal of Network Security, 16(6): 498-500, 2014.

2013

[21] Youwen Zhu, Rui Xu, Tsuyoshi Takagi. “Secure k-NN Query on Encrypted Cloud Database without Key-sharing”, International Journal of Electronic Security and Digital Forensics, 5(3/4): 201-217, 2013.

[22] Youwen Zhu, Rui Xu, Tsuyoshi Takagi. Secure k-NN computation on encrypted cloud data without sharing key with query users. Proc. of international workshop on security in cloud computing (CloudComputing’13) in conjunction with ASIACCS, Hangzhou, China, 2013: 55-60.

2010-2012

[23] Youwen Zhu, Liusheng Huang, Wei Yang. Relation of PPAtMP and scalar product protocol and their applications. Proc. of the 15th IEEE symposium on computers and communications (ISCC’10), Riccione, Italy, 2010: 184-189. CCF  C

[24] Youwen Zhu, Tsuyoshi Takagi, Liusheng Huang. Efficient Secure Primitive for Privacy Preserving Distributed Computations. Proc. of the 7th international workshop on security (IWSEC’12), Fukuoka, Japan, LNCS 7631, 2012: 233-243.

[25] Youwen Zhu, Liusheng Huang, Wei Yang, Xing Yuan. Efficient Collusion-Resisting Secure Sum Protocol. Chinese Journal of Electronics, 2011, 20(3): 407-413.

[26] Youwen Zhu, Liusheng Huang, Guoliang Chen, Wei Yang. Dynamic Trust Evaluation Model under Distributed Computing Environment. Chinese Journal of Computers, 2011, 34(1): 55-64. (in Chinese)

[27] Youwen Zhu, Liusheng Huang, Wei Yang, Miaomiao Tian. Efficient collusion-resisting data aggregation protocol. Journal on Communications, 2010, 31(9a):223-227.  (in Chinese)

[28] Youwen Zhu, Liusheng Huang, Dong Li, Wei Yang. Privacy-preserving Text Information Hiding Detecting Algorithm. Journal of Electronics & Information Technology, 2011, 33(2): 278-283. (in Chinese)

Awards & Honors

(1) 2012, Anhui Province Excellent Graduates, from Education Department of Anhui Province, China

(2) 2011, Scholarship Award for Excellent Doctoral Student, from Ministry of Education, China

Patents: ZL201010544647.2,  ZL201110432849.2

Teaching:

Design and Analysis of Algorithms, S’15 & S’16

Cryptographic Algorithm and Cryptographic Protocol, S’15 & S’16

An Introduction to Computational Thinking, F’14 & F’15

Professional Activities:

Journal Reviewer: IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Knowledge and Data Engineering, Designs Codes and Cryptography, Science China Information Sciences, Computer & Security, Frontier of Computer Science in China, Journal of Supercomputing, Journal of Internet Technology, Journal of Computer Security, Chinese Journal of Electronics, International Journal of Internet Protocol Technology, International Journal of Electronic Security and Digital Forensics, Journal of Information Processing

PC / Reviewer / External Reviewer for International Conferences: SpaCCS’16, TSP’16, ChinaCom’15, CWBCN’15, ICCCS’15, ASIACRYPT’13, PKC’13, Securecomm’13, IWSEC’14, ISPEC’13, Provsec’13, ACNS’12, ACISP’12, ICICS’12, Securecomm’12, ISC’12, Provsec’12, ARES’12, ...

Links:

NTL: http://www.shoup.net/ntl/

CrypTool: https://www.cryptool.org/en

Crypto++ Library: http://www.cryptopp.com/

CCF: http://www.ccf.org.cn/sites/ccf/

CACR: http://www.cacrnet.org.cn/

CORE: http://www.core.edu.au/

Last update: Feb. 28th, 2018