default search action
Youwen Zhu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j56]Xingxin Li, Youwen Zhu, Rui Xu, Jian Wang, Yushu Zhang:
Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query. Frontiers Comput. Sci. 18(1): 181803 (2024) - [j55]Xinchao Wang, Wei Wang, Cheng Huang, Ping Cao, Youwen Zhu, Qihui Wu:
Blockchain-Based Certificateless Conditional Anonymous Authentication for IIoT. IEEE Syst. J. 18(1): 656-667 (2024) - [j54]Junhao Ji, Ruoyu Zhao, Tao Wang, Youwen Zhu:
Utility-Enhanced Image Obfuscation With Block Differential Privacy. IEEE Signal Process. Lett. 31: 2135-2139 (2024) - [j53]Ruoyu Zhao, Wenying Wen, Youwen Zhu, Rushi Lan:
A Consumer-Oriented Image Transformation Scheme With a Secret Key for Privacy Protection. IEEE Signal Process. Lett. 31: 2280-2284 (2024) - [j52]Yue Zhang, Youwen Zhu, Yuqian Zhou, Jiabin Yuan:
Frequency Estimation Mechanisms Under ϵδ-Utility-Optimized Local Differential Privacy. IEEE Trans. Emerg. Top. Comput. 12(1): 316-327 (2024) - [j51]Youwen Zhu, Yiran Cao, Qiao Xue, Qihui Wu, Yushu Zhang:
Heavy Hitter Identification Over Large-Domain Set-Valued Data With Local Differential Privacy. IEEE Trans. Inf. Forensics Secur. 19: 414-426 (2024) - [j50]Yushu Zhang, Junhao Ji, Wenying Wen, Youwen Zhu, Zhihua Xia, Jian Weng:
Understanding Visual Privacy Protection: A Generalized Framework With an Instance on Facial Privacy. IEEE Trans. Inf. Forensics Secur. 19: 5046-5059 (2024) - [j49]Shunsheng Zhang, Youwen Zhu, Ao Zeng:
Collusion-Resilient Privacy-Preserving Database Fingerprinting. IEEE Trans. Inf. Forensics Secur. 19: 8306-8321 (2024) - [j48]Youwen Zhu, Qimeng Song, Yonglong Luo:
Differentially Private Top-$k$ Flows Estimation Mechanism in Network Traffic. IEEE Trans. Netw. Sci. Eng. 11(3): 2462-2472 (2024) - [i3]Yan Jiang, Youwen Zhu, Jian Wang, Yudi Zhang:
Efficient online and Non-Interactive Threshold Signatures with Identifiable Aborts for Identity-Based Signatures in the IEEE P1363 Standard. IACR Cryptol. ePrint Arch. 2024: 1333 (2024) - 2023
- [j47]Miao Tian, Yushu Zhang, Youwen Zhu, Liangmin Wang, Yong Xiang:
DIVRS: Data integrity verification based on ring signature in cloud storage. Comput. Secur. 124: 103002 (2023) - [j46]Yan Jiang, Youwen Zhu, Jian Wang, Xingxin Li:
Fully distributed identity-based threshold signatures with identifiable aborts. Frontiers Comput. Sci. 17(5): 175813 (2023) - [j45]Xinxin Ye, Youwen Zhu, Miao Zhang, Hai Deng:
Differential Privacy Data Release Scheme Using Microaggregation With Conditional Feature Selection. IEEE Internet Things J. 10(20): 18302-18314 (2023) - [j44]Miao Tian, Yushu Zhang, Youwen Zhu, Wei Wang, Qihui Wu, Yong Xiang:
BPPIR: Blockchain-assisted privacy-preserving similarity image retrieval over multiple clouds. J. King Saud Univ. Comput. Inf. Sci. 35(1): 324-334 (2023) - [j43]Yuqian Zhou, Qian-Kun Yao, Ya-Qi Dong, Dan Li, Youwen Zhu:
Source-device-independent randomness expansion using quantum random access codes. Quantum Inf. Process. 22(5): 214 (2023) - [j42]Yushu Zhang, Jiahao Zhao, Jiajia Jiang, Youwen Zhu, Liangmin Wang, Yong Xiang:
Recording Behaviors of Artificial Intelligence in Blockchains. IEEE Trans. Artif. Intell. 4(6): 1437-1448 (2023) - [j41]Weilin Chen, Wei Yang, Lide Xue, Bingren Chen, Youwen Zhu, Liusheng Huang:
Avalon: A Scalable and Secure Distributed Transaction Ledger Based on Proof-of-Market. IEEE Trans. Computers 72(12): 3576-3589 (2023) - [j40]Yushu Zhang, Tao Wang, Ruoyu Zhao, Wenying Wen, Youwen Zhu:
RAPP: Reversible Privacy Preservation for Various Face Attributes. IEEE Trans. Inf. Forensics Secur. 18: 3074-3087 (2023) - [j39]Qiao Xue, Qingqing Ye, Haibo Hu, Youwen Zhu, Jian Wang:
DDRM: A Continual Frequency Estimation Mechanism With Local Differential Privacy. IEEE Trans. Knowl. Data Eng. 35(7): 6784-6797 (2023) - [j38]Xiangli Xiao, Yushu Zhang, Youwen Zhu, Pengfei Hu, Xiaochun Cao:
FingerChain: Copyrighted Multi-Owner Media Sharing by Introducing Asymmetric Fingerprinting Into Blockchain. IEEE Trans. Netw. Serv. Manag. 20(3): 2869-2885 (2023) - [j37]Shaowei Wang, Xuandi Luo, Yuqiu Qian, Youwen Zhu, Kongyang Chen, Qi Chen, Bangzhou Xin, Wei Yang:
Shuffle Differential Private Data Aggregation for Random Population. IEEE Trans. Parallel Distributed Syst. 34(5): 1667-1681 (2023) - [c24]Shibo Dai, Youwen Zhu:
Traceable high-dimensional data publishing based on Alliance Chain. ICBCT 2023: 1-7 - [c23]Yuanyuan Hong, Youwen Zhu, Wei Wang:
Estimating Location Distribution under Local Differential Privacy. ICCC 2023: 1-6 - [i2]Inam ul Haq, Jian Wang, Youwen Zhu, Sheharyar Nasir:
An Anonymous Authenticated Key Agreement Protocol Secure in Partially Trusted Registration Server Scenario for Multi-Server Architectures. IACR Cryptol. ePrint Arch. 2023: 1193 (2023) - 2022
- [j36]Jiamu Li, Ji Zhang, Mohamed Jaward Bah, Jian Wang, Youwen Zhu, Gaoming Yang, Lingling Li, Kexin Zhang:
An Auto-Encoder with Genetic Algorithm for High Dimensional Data: Towards Accurate and Interpretable Outlier Detection. Algorithms 15(11): 429 (2022) - [j35]Qiao Xue, Youwen Zhu, Jian Wang:
Mean estimation over numeric data with personalized local differential privacy. Frontiers Comput. Sci. 16(3): 163806 (2022) - [j34]Jiajia Jiang, Yushu Zhang, Youwen Zhu, Xuewen Dong, Liangmin Wang, Yong Xiang:
DCIV: Decentralized cross-chain data integrity verification with blockchain. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 7988-7999 (2022) - [i1]Ruoyu Zhao, Yushu Zhang, Youwen Zhu, Rushi Lan, Zhongyun Hua:
Metaverse: Security and Privacy Concerns. CoRR abs/2203.03854 (2022) - 2021
- [j33]Qiao Xue, Youwen Zhu, Jian Wang, Xingxin Li, Ji Zhang:
Locally differentially private distributed algorithms for set intersection and union. Sci. China Inf. Sci. 64(11) (2021) - [j32]Inam ul Haq, Jian Wang, Youwen Zhu, Saad Maqbool:
An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation. Digit. Commun. Networks 7(1): 140-150 (2021) - [j31]Xingxin Li, Youwen Zhu, Jian Wang:
Highly Efficient Privacy Preserving Location-Based Services with Enhanced One-Round Blind Filter. IEEE Trans. Emerg. Top. Comput. 9(4): 1803-1814 (2021) - [j30]Qiao Xue, Youwen Zhu, Jian Wang:
Joint Distribution Estimation and Naïve Bayes Classification Under Local Differential Privacy. IEEE Trans. Emerg. Top. Comput. 9(4): 2053-2063 (2021) - [j29]Yushu Zhang, Ping Wang, Hui Huang, Youwen Zhu, Di Xiao, Yong Xiang:
Privacy-Assured FogCS: Chaotic Compressive Sensing for Secure Industrial Big Image Data Processing in Fog Computing. IEEE Trans. Ind. Informatics 17(5): 3401-3411 (2021) - [c22]Jiamu Li, Ji Zhang, Jian Wang, Youwen Zhu, Mohamed Jaward Bah, Gaoming Yang, Yuquan Gan:
VAGA: Towards Accurate and Interpretable Outlier Detection Based on Variational Auto-Encoder and Genetic Algorithm for High-Dimensional Data. IEEE BigData 2021: 5956-5958 - [c21]Zuguang Li, Wei Wang, Jia Guo, Youwen Zhu, Lu Han, Qihui Wu:
Blockchain-Assisted Dynamic Spectrum Sharing in the CBRS Band. ICCC 2021: 864-869 - 2020
- [j28]Inam ul Haq, Jian Wang, Youwen Zhu, Saad Maqbool:
A survey of authenticated key agreement protocols for multi-server architecture. J. Inf. Secur. Appl. 55: 102639 (2020) - [j27]Inam ul Haq, Jian Wang, Youwen Zhu:
Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks. J. Netw. Comput. Appl. 161: 102660 (2020) - [j26]Yan Jiang, Youwen Zhu, Jian Wang, Yong Xiang:
Efficient authentication protocol with anonymity and key protection for mobile Internet users. J. Parallel Distributed Comput. 137: 179-191 (2020) - [j25]Youwen Zhu, Xingxin Li:
Privacy-preserving k-means clustering with local synchronization in peer-to-peer networks. Peer-to-Peer Netw. Appl. 13(6): 2272-2284 (2020) - [j24]Youwen Zhu, Xingxin Li, Jian Wang, Jing Li:
Cloud-assisted secure biometric identification with sub-linear search efficiency. Soft Comput. 24(8): 5885-5896 (2020) - [c20]Qiqiang Xu, Ji Zhang, Youwen Zhu, Bohan Li, Donghai Guan, Xin Wang:
A Block-Level RNN Model for Resume Block Classification. IEEE BigData 2020: 5855-5857 - [c19]Wenlong Dun, Youwen Zhu:
Efficient Discrete Distribution Estimation Schemes Under Local Differential Privacy. FCS 2020: 508-523
2010 – 2019
- 2019
- [j23]Youwen Zhu, Yue Zhang, Xingxin Li, Hongyang Yan, Jing Li:
Improved collusion-resisting secure nearest neighbor query over encrypted data in cloud. Concurr. Comput. Pract. Exp. 31(21) (2019) - [j22]Xingxin Li, Youwen Zhu, Jian Wang, Ji Zhang:
Efficient and secure multi-dimensional geometric range query over encrypted data in cloud. J. Parallel Distributed Comput. 131: 44-54 (2019) - [j21]Inam ul Haq, Jian Wang, Youwen Zhu:
An Efficient Authenticated Key Agreement Scheme for Consumer USB MSDs Resilient to Unauthorized File Decryption. IEEE Trans. Consumer Electron. 65(1): 80-89 (2019) - [c18]Shudi Chen, Youwen Zhu:
A Textual Password Entry Method Resistant to Human Shoulder-Surfing Attack. CSS (2) 2019: 409-420 - 2018
- [j20]Lu Zhou, Youwen Zhu, Kim-Kwang Raymond Choo:
Efficiently and securely harnessing cloud to solve linear regression and other matrix operations. Future Gener. Comput. Syst. 81: 404-413 (2018) - [j19]Yi Liu, Yu Luo, Youwen Zhu, Yang Liu, Xingxin Li:
Secure multi-label data classification in cloud by additionally homomorphic encryption. Inf. Sci. 468: 89-102 (2018) - [j18]Youwen Zhu, Yue Zhang, Jiabin Yuan, Xianmin Wang:
FTP: An Approximate Fast Privacy-Preserving Equality Test Protocol for Authentication in Internet of Things. Secur. Commun. Networks 2018: 6909703:1-6909703:9 (2018) - [j17]Xingxin Li, Youwen Zhu, Jian Wang, Zhe Liu, Yining Liu, Mingwu Zhang:
On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification. IEEE Trans. Dependable Secur. Comput. 15(5): 906-912 (2018) - [c17]Xiaodong Zhu, Ji Zhang, Zewen Hu, Hongzhou Li, Liang Chang, Youwen Zhu, Jerry Chun-Wei Lin, Yongrui Qin:
A Genetic Algorithm Based Technique for Outlier Detection with Fast Convergence. ADMA 2018: 95-104 - 2017
- [j16]Xinshu Ma, Youwen Zhu, Xingxin Li:
An efficient and secure ridge regression outsourcing scheme in wearable devices. Comput. Electr. Eng. 63: 246-256 (2017) - [j15]Lu Zhou, Youwen Zhu, Aniello Castiglione:
Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner. Comput. Secur. 69: 84-96 (2017) - [j14]Youwen Zhu, Xingxin Li, Jian Wang, Yining Liu, Zhiguo Qu:
Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud. Int. J. Found. Comput. Sci. 28(6): 683-704 (2017) - [j13]Xingxin Li, Youwen Zhu, Jian Wang:
Efficient Encrypted Data Comparison Through a Hybrid Method. J. Inf. Sci. Eng. 33(4): 953-964 (2017) - [c16]Qiao Xue, Youwen Zhu, Jian Wang, Xingxin Li:
Distributed Set Intersection and Union with Local Differential Privacy. ICPADS 2017: 198-205 - [c15]Yang Liu, Xingxin Li, Youwen Zhu, Jian Wang, Zhe Liu:
Secure Multi-label Classification over Encrypted Data in Cloud. ProvSec 2017: 57-73 - 2016
- [j12]Youwen Zhu, Zhiqiu Huang, Tsuyoshi Takagi:
Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J. Parallel Distributed Comput. 89: 1-12 (2016) - [c14]Youwen Zhu, Zhikuan Wang, Cheng Qian, Jian Wang:
On efficiently harnessing cloud to securely solve linear regression and other matrix operations. IWQoS 2016: 1-2 - [c13]Youwen Zhu, Zhikuan Wang, Jian Wang:
Collusion-resisting secure nearest neighbor query over encrypted data in cloud, revisited. IWQoS 2016: 1-6 - [c12]Youwen Zhu, Zhikuan Wang, Yue Zhang:
Secure k-NN Query on Encrypted Cloud Data with Limited Key-Disclosure and Offline Data Owner. PAKDD (2) 2016: 401-414 - [c11]Xingxin Li, Youwen Zhu, Jian Wang:
Secure Naïve Bayesian Classification over Encrypted Data in Cloud. ProvSec 2016: 130-150 - [c10]Hwajeong Seo, Taehwan Park, Shinwook Heo, Gyuwon Seo, Bongjin Bae, Zhi Hu, Lu Zhou, Yasuyuki Nogami, Youwen Zhu, Howon Kim:
Parallel Implementations of LEA, Revisited. WISA 2016: 318-330 - 2015
- [j11]Youwen Zhu, Tsuyoshi Takagi:
Efficient scalar product protocol and its privacy-preserving application. Int. J. Electron. Secur. Digit. Forensics 7(1): 1-19 (2015) - [j10]Zhenhua Chen, Shundong Li, Youwen Zhu, Jianhua Yan, Xinli Xu:
A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem. Secur. Commun. Networks 8(18): 3592-3601 (2015) - [j9]Youwen Zhu, Zhiqiu Huang, Liusheng Huang, Tsuyoshi Takagi:
On the Security of A Privacy-Preserving Product Calculation Scheme. IEEE Trans. Dependable Secur. Comput. 12(3): 373-374 (2015) - [c9]Youwen Zhu, Zhikuan Wang, Bilal Hassan, Yue Zhang, Jian Wang, Cheng Qian:
Fast Secure Scalar Product Protocol with (almost) Optimal Efficiency. CollaborateCom 2015: 234-242 - [c8]Wei Yang, Liusheng Huang, Lu Li, Mingjun Xiao, Xiaorong Lu, Yao Shen, Youwen Zhu:
Hamburger attack: A collusion attack against privacy-preserving data aggregation schemes. IWQoS 2015: 153-158 - 2014
- [j8]Youwen Zhu, Tsuyoshi Takagi:
Efficient Privacy-Preserving Reputation Evaluation in Decentralized Environments. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 409-412 (2014) - [j7]Youwen Zhu, Tsuyoshi Takagi, Rong Hu:
Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data. IEICE Trans. Inf. Syst. 97-D(2): 326-330 (2014) - [j6]Miaomiao Tian, Youwen Zhu, Zhili Chen:
Two Simple Attacks on a Blind Signature Scheme. Int. J. Netw. Secur. 16(6): 498-500 (2014) - 2013
- [j5]Zhen-Guo Yang, Liusheng Huang, Mingjun Xiao, Yindong Zhang, Youwen Zhu:
Online Routing and Scheduling in Bandwidth-Limited Delay Tolerant Networks. Ad Hoc Sens. Wirel. Networks 18(3-4): 311-331 (2013) - [j4]Youwen Zhu, Rui Xu, Tsuyoshi Takagi:
Secure k-NN query on encrypted cloud database without key-sharing. Int. J. Electron. Secur. Digit. Forensics 5(3/4): 201-217 (2013) - [c7]Youwen Zhu, Rui Xu, Tsuyoshi Takagi:
Secure k-NN computation on encrypted cloud data without sharing key with query users. SCC@ASIACCS 2013: 55-60 - 2012
- [j3]Youwen Zhu, Liusheng Huang, Tsuyoshi Takagi, Mingwu Zhang:
Privacy-Preserving OLAP for Accurate Answer. J. Circuits Syst. Comput. 21(1) (2012) - [c6]Youwen Zhu, Tsuyoshi Takagi, Liusheng Huang:
Efficient Secure Primitive for Privacy Preserving Distributed Computations. IWSEC 2012: 233-243 - 2010
- [j2]Youwen Zhu, Liusheng Huang, Wei Yang, Fan Dong:
Privacy Preserving Aggregate Query of OLAP for Accurate Answers. J. Comput. 5(11): 1678-1685 (2010) - [j1]Yun Ye, Liusheng Huang, Wei Yang, Youwen Zhu:
Efficient protocols for point-convex hull inclusion decision problems. J. Networks 5(5): 559-567 (2010) - [c5]Youwen Zhu, Liusheng Huang, Wei Yang:
Relation of PPAtMP and scalar product protocol and their applications. ISCC 2010: 184-189
2000 – 2009
- 2009
- [c4]Youwen Zhu, Liusheng Huang, Wei Yang, Dong Li, Yonglong Luo, Fan Dong:
Three New Approaches to Privacy-preserving Add to Multiply Protocol and its Application. WKDD 2009: 554-558 - 2008
- [c3]Youwen Zhu, Liusheng Huang, Wei Yang, Zhili Chen, Lingjun Li, Zhenshan Yu, Yonglong Luo:
Privacy-Preserving Practical Convex Hulls Protocol. FCST 2008: 10-16 - [c2]Dong Li, Liusheng Huang, Wei Yang, Youwen Zhu, Yonglong Luo, Zhili Chen, Lingjun Li, Yun Ye:
A Practical Three-Dimensional Privacy-Preserving Approximate Convex Hulls Protocol. FCST 2008: 17-23 - [c1]Zhenshan Yu, Liusheng Huang, Zhili Chen, Lingjun Li, Xinxin Zhao, Youwen Zhu:
Detection of Synonym-Substitution Modified Articles Using Context Information. FGCN (1) 2008: 134-139
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-11 17:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint