Youwen Zhu

According to our database1, Youwen Zhu authored at least 33 papers between 2008 and 2018.

Collaborative distances :
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Efficiently and securely harnessing cloud to solve linear regression and other matrix operations.
Future Generation Comp. Syst., 2018

2017
Efficient Encrypted Data Comparison Through a Hybrid Method.
J. Inf. Sci. Eng., 2017

Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud.
Int. J. Found. Comput. Sci., 2017

Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner.
Computers & Security, 2017

An efficient and secure ridge regression outsourcing scheme in wearable devices.
Computers & Electrical Engineering, 2017

Secure Multi-label Classification over Encrypted Data in Cloud.
Proceedings of the Provable Security, 2017

Distributed Set Intersection and Union with Local Differential Privacy.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

2016
Secure and controllable k-NN query over encrypted cloud data with key confidentiality.
J. Parallel Distrib. Comput., 2016

Parallel Implementations of LEA, Revisited.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Secure Naïve Bayesian Classification over Encrypted Data in Cloud.
Proceedings of the Provable Security, 2016

Secure k-NN Query on Encrypted Cloud Data with Limited Key-Disclosure and Offline Data Owner.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2016

Collusion-resisting secure nearest neighbor query over encrypted data in cloud, revisited.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

On efficiently harnessing cloud to securely solve linear regression and other matrix operations.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

2015
On the Security of A Privacy-Preserving Product Calculation Scheme.
IEEE Trans. Dependable Sec. Comput., 2015

A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem.
Security and Communication Networks, 2015

Efficient scalar product protocol and its privacy-preserving application.
IJESDF, 2015

Hamburger attack: A collusion attack against privacy-preserving data aggregation schemes.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Fast Secure Scalar Product Protocol with (almost) Optimal Efficiency.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

2014
Two Simple Attacks on a Blind Signature Scheme.
I. J. Network Security, 2014

Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data.
IEICE Transactions, 2014

Efficient Privacy-Preserving Reputation Evaluation in Decentralized Environments.
IEICE Transactions, 2014

2013
Secure k-NN query on encrypted cloud database without key-sharing.
IJESDF, 2013

Online Routing and Scheduling in Bandwidth-Limited Delay Tolerant Networks.
Ad Hoc & Sensor Wireless Networks, 2013

Secure k-NN computation on encrypted cloud data without sharing key with query users.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

2012
Privacy-Preserving OLAP for Accurate Answer.
Journal of Circuits, Systems, and Computers, 2012

Efficient Secure Primitive for Privacy Preserving Distributed Computations.
Proceedings of the Advances in Information and Computer Security, 2012

2010
Efficient protocols for point-convex hull inclusion decision problems.
JNW, 2010

Privacy Preserving Aggregate Query of OLAP for Accurate Answers.
JCP, 2010

Relation of PPAtMP and scalar product protocol and their applications.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

2009
Three New Approaches to Privacy-preserving Add to Multiply Protocol and its Application.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

2008
Detection of Synonym-Substitution Modified Articles Using Context Information.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Privacy-Preserving Practical Convex Hulls Protocol.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008

A Practical Three-Dimensional Privacy-Preserving Approximate Convex Hulls Protocol.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008


  Loading...