Youwen Zhu
中文版 Professor, Ph.D College of
Computer Science and Technology, Nanjing
University of Aeronautics and Astronautics Office:
29 Jiangjun
Road, Nanjing 211106, China Email: zhuyouwen@gmail.com
zhuyw@nuaa.edu.cn |
Currently, I am a professor with
the College of Computer Science and Technology,
Nanjing University of Aeronautics and Astronautics,
China. From August 2012 to July 2014, as a JSPS postdoctoral fellow,
I worked at Prof.
Tsuyoshi Takagi's group, Institute of Mathematics for Industry in Kyushu University, Fukuoka, Japan. The
fellowship is supported by JSPS (Japan
Society of the Promotion of Science) project of Japan. Before
that, I received my B.A. in science communication in 2007 and PhD degree in
computer science in 2012, respectively, both from University of Science and Technology of China
(USTC). I am interested in the area of applied cryptography and network security,
secure outsourcing and privacy preservation in cloud computing and
distributed computation etc. |
Publications (The
author with * is corresponding author) [1]
Youwen Zhu, Yiran Cao, Qiao Xue, Qihui
Wu, Yushu Zhang. Heavy Hitter Identification over Large-domain Set-valued Data with
Local Differential Privacy. IEEE
Transactions on Information Forensics and Security, 2024, Vol. 19, pp:
414-426. [2]
Shunsheng Zhang, Youwen Zhu*, Ao Zeng. Collusion-Resilient Privacy-Preserving Database Fingerprinting, IEEE Transactions on Information Forensics and Security, 2024, DOI:
10.1109/TIFS.2024.3455748, ACCEPT. [3]
Yue Zhang, Youwen
Zhu*, Yuqqian Zhou, Jiabin Yuan. Frequency Estimation Mechanisms under (ε, δ)-Utility-optimized Local
Differential Privacy. IEEE
Transactions on Emerging Topics in Computing, 2024, Volume: 12, Issue: 1,
Pages: 316-327. [4]
Youwen Zhu, Qimeng Song, Yonglong Luo. Differentially Private Top-k Flows Estimation Mechanism in Network
Traffic, IEEE Transactions on Network Science and
Engineering, 2024, Volume: 11, Issue: 3, Pages: 2462-2472. [5]
Xiangli Xiao, Yushu Zhang, Youwen Zhu,
Pengfei Hu, Xiaochun Cao. FingerChain:
Copyrighted Multi-Owner Media Sharing by Introducing Asymmetric
Fingerprinting into Blockchain. IEEE Transactions on Network and Service
Management, 2023, DOI: 10.1109/TNSM.2023.3237685 [6]
Yan Jiang, Youwen
Zhu*, Jian Wang, Xingxin Li. Fully
Distributed Identity-Based Threshold Signatures with Identifiable Aborts.
Frontiers of Computer Science, 2022, DOI: 10.1007/s11704-022-2370-4 [7]
Qiao Xue, Qingqing Ye, Haibo
Hu, Youwen Zhu, Jian Wang. DDRM: A Continual
Frequency Estimation Mechanism with Local Differential Privacy, IEEE
Transactions on Knowledge and Data Engineering, 2022, DOI:
10.1109/TKDE.2022.3177721. [8]
Xingxin Li, Youwen Zhu*, Rui Xu, Jian Wang, Yushu Zhang. Indexing
Dynamic Encrypted Database in Cloud for Efficient Secure k-Nearest Neighbor
Query, Frontiers of Computer Science, 2022, DOI:
10.1007/s11704-022-2401-1 [9] Qiao Xue, Youwen
Zhu*, Jian Wang. Mean
Estimation over Numeric Data with Personalized Local Differential Privacy,
Frontiers of Computer Science, 2022, Volume: 16, Issue: 3, No.
163806 (10 pages). [10] Qiao Xue, Youwen Zhu*, Jian Wang. Joint Distribution Estimation and Naïve Bayes Classification under
Local Differential Privacy. IEEE
Transactions on Emerging Topics in Computing, 2021, Volume: 9, Issue: 4,
Pages: 2053-2063. [11] Xingxin Li, Youwen Zhu*, Jian Wang. Highly Efficient Privacy Preserving Location-Based Services with
Enhanced One-Round Blind Filter. IEEE
Transactions on Emerging Topics in Computing, 2021, Volume: 9, Issue: 4,
Pages: 1803-1814. [12] Yushu Zhang, Ping Wang, Hui Huang, Youwen Zhu*, Di Xiao, Yong Xiang. Privacy-Assured FogCS: Chaotic Compressive Sensing for Secure
Industrial Big Image Data Processing in Fog Computing. IEEE Transactions on Industrial Informatics, Volume 17, Issue 5, 2021,
Pages: 3401-3411. [13] Qiao Xue, Youwen Zhu*, Jian Wang, Xingxin Li, Ji Zhang. Locally differentially private distributed
algorithms for set intersection and union. SCIENCE CHINA Information Sciences, Volume 64, Issue 11, No. 219101,
2021. [14] Yan Jiang, Youwen Zhu*, Jian Wang, Yong Xiang. Efficient authentication protocol with anonymity
and key protection for mobile Internet users, Journal of Parallel and Distributed Computing, vol. 137, 2020, pp:
179-191, DOI: 10.1016/j.jpdc.2019.11.010. [15] Inam ul haq, Jian Wang*, Youwen Zhu*. An Efficient Authenticated Key Agreement Scheme for Consumer USB Mass Storage
Devices Resilient to Unauthorized File Decryption, IEEE Transactions on
Consumer Electronics, 65(1): 80-89, 2019. [16] Xingxin Li, Youwen Zhu*, Jian Wang, Ji Zhang. Efficient and Secure Multi-Dimensional Geometric
Range Query over Encrypted Data in Cloud, Journal of Parallel and Distributed Computing, vol. 131, 2019, pp:
44-54. [17] Youwen Zhu, Xingxin
Li, Jian Wang, Jing Li. Cloud-assisted secure biometric identification with
sub-linear search efficiency, Soft
Computing, 2019, DOI: 10.1007/s00500-019-04401-9. [18] Youwen
Zhu,
Yue Zhang, Xingxin Li, Hongyang
Yan, Jing Li. Improved
collusion-resisting secure nearest neighbor query over encrypted data in
cloud.
Concurrency and Computation Practice and Experience, volume 31, issue 21,
2019, DOI: 10.1002/cpe.4681. [19] Xingxin Li, Youwen Zhu*, Jian Wang, Zhe Liu,
Yining Liu, Mingwu Zhang. On the Soundness and Security of Privacy-Preserving
SVM for Outsourcing Data Classification, IEEE Transactions on Dependable and Secure Computing, 15(5): 906-912,
2018. [20] Lu Zhou, Youwen Zhu*, Kim-Kwang Raymond Choo. Efficiently and Securely Harness Cloud to Solve
Linear Regression and Other Matrix Operations, Future Generation Computer Systems, vol. 81, 2018, pp: 404-413. [21] Yi Liu, Yu Luo, Youwen Zhu*,
Yang Liu, Xingxin Li. Secure multi-label data classification in cloud by
additionally homomorphic encryption. Information Sciences, Vol. 468,
Nov. 2018, pp:89-102. [22] Lu Zhou, Youwen Zhu*, Aniello Castiglione. Efficient k-NN Query over Encrypted
Data in Cloud with Limited Key-disclosure and Offline Data Owner. Computers & Security (Elsevier Journal), vol. 69, pp: 84-96,
2017. [23] Youwen Zhu, Xingxin
Li, Jian Wang, Yining Liu, Zhiguo Qu. Practical Secure Naïve Bayesian Classification Over
Encrypted Big Data in Cloud.
International Journal of Foundations of Computer Science, 28(6): 683-703,
2017. [24] Qiao Xue, Youwen Zhu*, Jian Wang,
Xingxin Li. Distributed Set Intersection and Union with Local Differential Privacy. The 23rd IEEE
International Conference on Parallel and Distributed Systems, 2017, pp:
198-205. [25] Youwen Zhu, Zhiqiu
Huang, Tsuyoshi Takagi. “Secure and Controllable k-NN Query over Encrypted
Cloud Data with Key Confidentiality”,
Journal of Parallel and Distributed Computing, vol. 89, March 2016,
pp.1-12, DOI:
10.1016/j.jpdc.2015.11.004. [26] Youwen
Zhu, Zhikuan Wang, Yue Zhang. Secure k-NN Query on Encrypted Cloud Data with
Limited Key-disclosure and Offline Data Owner. Proc. of the 20th Pacific Asia
Conference on Knowledge Discovery and Data Mining (PAKDD), Auckland, New
Zealand, April 19-22, 2016, pp: 401-414. [27] Youwen
Zhu, Zhikuan Wang, Jian Wang.
Collusion-Resisting
Secure Nearest Neighbor Query over Encrypted Data in Cloud, Revisited. The 24th
IEEE/ACM International Symposium on Quality of Service (IWQoS),
June 20-21, 2016, pp: 1-6. [28] Youwen
Zhu, Zhiqiu Huang, Liusheng Huang,
Tsuyoshi Takagi. “On the
Security of A Privacy-Preserving Product Calculation
Scheme”, IEEE Transactions on Dependable and Secure Computing,
2015, DOI: 10.1109/TDSC.2014.2345404. |
Awards & Honor (1) 2012, Anhui Province Excellent Graduates, from Education Department
of Anhui Province, China (2) 2011, Scholarship Award for Excellent Doctoral Student, from Ministry
of Education, China |
Professional Activities: Journal
Reviewer:
IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on
Knowledge and Data Engineering, Designs Codes and Cryptography, Science China
Information Sciences, Computer & Security, Frontier of Computer Science
in China, Journal of Supercomputing, Journal of Internet Technology, Journal
of Computer Security, Chinese Journal of Electronics, International Journal
of Internet Protocol Technology, International Journal of Electronic Security
and Digital Forensics, Journal of Information Processing PC /
Reviewer / External Reviewer for International Conferences: SpaCCS’16, TSP’16,
ChinaCom’15, CWBCN’15, ICCCS’15, ASIACRYPT’13, PKC’13, Securecomm’13,
IWSEC’14, ISPEC’13, Provsec’13, ACNS’12, ACISP’12, ICICS’12, Securecomm’12,
ISC’12, Provsec’12, ARES’12, ... |
Links: NTL: http://www.shoup.net/ntl/ CrypTool: https://www.cryptool.org/en Crypto++ Library: http://www.cryptopp.com/ CCF: http://www.ccf.org.cn/sites/ccf/ CACR: http://www.cacrnet.org.cn/ CORE: http://www.core.edu.au/ |