Youwen Zhu

Orcid: 0000-0003-4365-9713

According to our database1, Youwen Zhu authored at least 76 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Blockchain-Based Certificateless Conditional Anonymous Authentication for IIoT.
IEEE Syst. J., March, 2024

Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query.
Frontiers Comput. Sci., February, 2024

Heavy Hitter Identification Over Large-Domain Set-Valued Data With Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2024

Frequency Estimation Mechanisms Under ϵδ-Utility-Optimized Local Differential Privacy.
IEEE Trans. Emerg. Top. Comput., 2024

2023
Avalon: A Scalable and Secure Distributed Transaction Ledger Based on Proof-of-Market.
IEEE Trans. Computers, December, 2023

Recording Behaviors of Artificial Intelligence in Blockchains.
IEEE Trans. Artif. Intell., December, 2023

Differential Privacy Data Release Scheme Using Microaggregation With Conditional Feature Selection.
IEEE Internet Things J., October, 2023

Fully distributed identity-based threshold signatures with identifiable aborts.
Frontiers Comput. Sci., October, 2023

FingerChain: Copyrighted Multi-Owner Media Sharing by Introducing Asymmetric Fingerprinting Into Blockchain.
IEEE Trans. Netw. Serv. Manag., September, 2023

DDRM: A Continual Frequency Estimation Mechanism With Local Differential Privacy.
IEEE Trans. Knowl. Data Eng., July, 2023

Shuffle Differential Private Data Aggregation for Random Population.
IEEE Trans. Parallel Distributed Syst., May, 2023

Source-device-independent randomness expansion using quantum random access codes.
Quantum Inf. Process., May, 2023

BPPIR: Blockchain-assisted privacy-preserving similarity image retrieval over multiple clouds.
J. King Saud Univ. Comput. Inf. Sci., January, 2023

RAPP: Reversible Privacy Preservation for Various Face Attributes.
IEEE Trans. Inf. Forensics Secur., 2023

An Anonymous Authenticated Key Agreement Protocol Secure in Partially Trusted Registration Server Scenario for Multi-Server Architectures.
IACR Cryptol. ePrint Arch., 2023

DIVRS: Data integrity verification based on ring signature in cloud storage.
Comput. Secur., 2023

Estimating Location Distribution under Local Differential Privacy.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

2022
DCIV: Decentralized cross-chain data integrity verification with blockchain.
J. King Saud Univ. Comput. Inf. Sci., 2022

Mean estimation over numeric data with personalized local differential privacy.
Frontiers Comput. Sci., 2022

Metaverse: Security and Privacy Concerns.
CoRR, 2022

An Auto-Encoder with Genetic Algorithm for High Dimensional Data: Towards Accurate and Interpretable Outlier Detection.
Algorithms, 2022

2021
Privacy-Assured FogCS: Chaotic Compressive Sensing for Secure Industrial Big Image Data Processing in Fog Computing.
IEEE Trans. Ind. Informatics, 2021

Joint Distribution Estimation and Naïve Bayes Classification Under Local Differential Privacy.
IEEE Trans. Emerg. Top. Comput., 2021

Highly Efficient Privacy Preserving Location-Based Services with Enhanced One-Round Blind Filter.
IEEE Trans. Emerg. Top. Comput., 2021

An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation.
Digit. Commun. Networks, 2021

Locally differentially private distributed algorithms for set intersection and union.
Sci. China Inf. Sci., 2021

Blockchain-Assisted Dynamic Spectrum Sharing in the CBRS Band.
Proceedings of the 10th IEEE/CIC International Conference on Communications in China, 2021

VAGA: Towards Accurate and Interpretable Outlier Detection Based on Variational Auto-Encoder and Genetic Algorithm for High-Dimensional Data.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Cloud-assisted secure biometric identification with sub-linear search efficiency.
Soft Comput., 2020

Privacy-preserving k-means clustering with local synchronization in peer-to-peer networks.
Peer-to-Peer Netw. Appl., 2020

Efficient authentication protocol with anonymity and key protection for mobile Internet users.
J. Parallel Distributed Comput., 2020

Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks.
J. Netw. Comput. Appl., 2020

A survey of authenticated key agreement protocols for multi-server architecture.
J. Inf. Secur. Appl., 2020

Efficient Discrete Distribution Estimation Schemes Under Local Differential Privacy.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

A Block-Level RNN Model for Resume Block Classification.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
An Efficient Authenticated Key Agreement Scheme for Consumer USB MSDs Resilient to Unauthorized File Decryption.
IEEE Trans. Consumer Electron., 2019

Efficient and secure multi-dimensional geometric range query over encrypted data in cloud.
J. Parallel Distributed Comput., 2019

Improved collusion-resisting secure nearest neighbor query over encrypted data in cloud.
Concurr. Comput. Pract. Exp., 2019

A Textual Password Entry Method Resistant to Human Shoulder-Surfing Attack.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification.
IEEE Trans. Dependable Secur. Comput., 2018

FTP: An Approximate Fast Privacy-Preserving Equality Test Protocol for Authentication in Internet of Things.
Secur. Commun. Networks, 2018

Secure multi-label data classification in cloud by additionally homomorphic encryption.
Inf. Sci., 2018

Efficiently and securely harnessing cloud to solve linear regression and other matrix operations.
Future Gener. Comput. Syst., 2018

A Genetic Algorithm Based Technique for Outlier Detection with Fast Convergence.
Proceedings of the Advanced Data Mining and Applications - 14th International Conference, 2018

2017
Efficient Encrypted Data Comparison Through a Hybrid Method.
J. Inf. Sci. Eng., 2017

Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud.
Int. J. Found. Comput. Sci., 2017

Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner.
Comput. Secur., 2017

An efficient and secure ridge regression outsourcing scheme in wearable devices.
Comput. Electr. Eng., 2017

Secure Multi-label Classification over Encrypted Data in Cloud.
Proceedings of the Provable Security, 2017

Distributed Set Intersection and Union with Local Differential Privacy.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

2016
Secure and controllable k-NN query over encrypted cloud data with key confidentiality.
J. Parallel Distributed Comput., 2016

Parallel Implementations of LEA, Revisited.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Secure Naïve Bayesian Classification over Encrypted Data in Cloud.
Proceedings of the Provable Security, 2016

Secure k-NN Query on Encrypted Cloud Data with Limited Key-Disclosure and Offline Data Owner.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2016

Collusion-resisting secure nearest neighbor query over encrypted data in cloud, revisited.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

On efficiently harnessing cloud to securely solve linear regression and other matrix operations.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

2015
On the Security of A Privacy-Preserving Product Calculation Scheme.
IEEE Trans. Dependable Secur. Comput., 2015

A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem.
Secur. Commun. Networks, 2015

Efficient scalar product protocol and its privacy-preserving application.
Int. J. Electron. Secur. Digit. Forensics, 2015

Hamburger attack: A collusion attack against privacy-preserving data aggregation schemes.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Fast Secure Scalar Product Protocol with (almost) Optimal Efficiency.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

2014
Two Simple Attacks on a Blind Signature Scheme.
Int. J. Netw. Secur., 2014

Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data.
IEICE Trans. Inf. Syst., 2014

Efficient Privacy-Preserving Reputation Evaluation in Decentralized Environments.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

2013
Secure k-NN query on encrypted cloud database without key-sharing.
Int. J. Electron. Secur. Digit. Forensics, 2013

Online Routing and Scheduling in Bandwidth-Limited Delay Tolerant Networks.
Ad Hoc Sens. Wirel. Networks, 2013

Secure k-NN computation on encrypted cloud data without sharing key with query users.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

2012
Privacy-Preserving OLAP for Accurate Answer.
J. Circuits Syst. Comput., 2012

Efficient Secure Primitive for Privacy Preserving Distributed Computations.
Proceedings of the Advances in Information and Computer Security, 2012

2010
Efficient protocols for point-convex hull inclusion decision problems.
J. Networks, 2010

Privacy Preserving Aggregate Query of OLAP for Accurate Answers.
J. Comput., 2010

Relation of PPAtMP and scalar product protocol and their applications.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

2009
Three New Approaches to Privacy-preserving Add to Multiply Protocol and its Application.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

2008
Detection of Synonym-Substitution Modified Articles Using Context Information.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Privacy-Preserving Practical Convex Hulls Protocol.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008

A Practical Three-Dimensional Privacy-Preserving Approximate Convex Hulls Protocol.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008


  Loading...