Youwen Zhu
Orcid: 0000-0003-4365-9713
According to our database1,
Youwen Zhu
authored at least 83 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Syst. J., March, 2024
Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query.
Frontiers Comput. Sci., February, 2024
IEEE Trans. Netw. Sci. Eng., 2024
Heavy Hitter Identification Over Large-Domain Set-Valued Data With Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Understanding Visual Privacy Protection: A Generalized Framework With an Instance on Facial Privacy.
IEEE Trans. Inf. Forensics Secur., 2024
Frequency Estimation Mechanisms Under ϵδ-Utility-Optimized Local Differential Privacy.
IEEE Trans. Emerg. Top. Comput., 2024
A Consumer-Oriented Image Transformation Scheme With a Secret Key for Privacy Protection.
IEEE Signal Process. Lett., 2024
IEEE Signal Process. Lett., 2024
Efficient online and Non-Interactive Threshold Signatures with Identifiable Aborts for Identity-Based Signatures in the IEEE P1363 Standard.
IACR Cryptol. ePrint Arch., 2024
2023
Avalon: A Scalable and Secure Distributed Transaction Ledger Based on Proof-of-Market.
IEEE Trans. Computers, December, 2023
IEEE Trans. Artif. Intell., December, 2023
Differential Privacy Data Release Scheme Using Microaggregation With Conditional Feature Selection.
IEEE Internet Things J., October, 2023
Frontiers Comput. Sci., October, 2023
FingerChain: Copyrighted Multi-Owner Media Sharing by Introducing Asymmetric Fingerprinting Into Blockchain.
IEEE Trans. Netw. Serv. Manag., September, 2023
IEEE Trans. Knowl. Data Eng., July, 2023
IEEE Trans. Parallel Distributed Syst., May, 2023
Quantum Inf. Process., May, 2023
BPPIR: Blockchain-assisted privacy-preserving similarity image retrieval over multiple clouds.
J. King Saud Univ. Comput. Inf. Sci., January, 2023
IEEE Trans. Inf. Forensics Secur., 2023
An Anonymous Authenticated Key Agreement Protocol Secure in Partially Trusted Registration Server Scenario for Multi-Server Architectures.
IACR Cryptol. ePrint Arch., 2023
Comput. Secur., 2023
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
Proceedings of the 2023 5th International Conference on Blockchain Technology, 2023
2022
J. King Saud Univ. Comput. Inf. Sci., 2022
Frontiers Comput. Sci., 2022
An Auto-Encoder with Genetic Algorithm for High Dimensional Data: Towards Accurate and Interpretable Outlier Detection.
Algorithms, 2022
2021
Privacy-Assured FogCS: Chaotic Compressive Sensing for Secure Industrial Big Image Data Processing in Fog Computing.
IEEE Trans. Ind. Informatics, 2021
Joint Distribution Estimation and Naïve Bayes Classification Under Local Differential Privacy.
IEEE Trans. Emerg. Top. Comput., 2021
Highly Efficient Privacy Preserving Location-Based Services with Enhanced One-Round Blind Filter.
IEEE Trans. Emerg. Top. Comput., 2021
An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation.
Digit. Commun. Networks, 2021
Locally differentially private distributed algorithms for set intersection and union.
Sci. China Inf. Sci., 2021
Proceedings of the 10th IEEE/CIC International Conference on Communications in China, 2021
VAGA: Towards Accurate and Interpretable Outlier Detection Based on Variational Auto-Encoder and Genetic Algorithm for High-Dimensional Data.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
2020
Soft Comput., 2020
Privacy-preserving k-means clustering with local synchronization in peer-to-peer networks.
Peer-to-Peer Netw. Appl., 2020
Efficient authentication protocol with anonymity and key protection for mobile Internet users.
J. Parallel Distributed Comput., 2020
Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks.
J. Netw. Comput. Appl., 2020
J. Inf. Secur. Appl., 2020
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
2019
An Efficient Authenticated Key Agreement Scheme for Consumer USB MSDs Resilient to Unauthorized File Decryption.
IEEE Trans. Consumer Electron., 2019
Efficient and secure multi-dimensional geometric range query over encrypted data in cloud.
J. Parallel Distributed Comput., 2019
Improved collusion-resisting secure nearest neighbor query over encrypted data in cloud.
Concurr. Comput. Pract. Exp., 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
2018
On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification.
IEEE Trans. Dependable Secur. Comput., 2018
FTP: An Approximate Fast Privacy-Preserving Equality Test Protocol for Authentication in Internet of Things.
Secur. Commun. Networks, 2018
Secure multi-label data classification in cloud by additionally homomorphic encryption.
Inf. Sci., 2018
Efficiently and securely harnessing cloud to solve linear regression and other matrix operations.
Future Gener. Comput. Syst., 2018
Proceedings of the Advanced Data Mining and Applications - 14th International Conference, 2018
2017
Int. J. Found. Comput. Sci., 2017
Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner.
Comput. Secur., 2017
Comput. Electr. Eng., 2017
Proceedings of the Provable Security, 2017
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017
2016
Secure and controllable k-NN query over encrypted cloud data with key confidentiality.
J. Parallel Distributed Comput., 2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the Provable Security, 2016
Secure k-NN Query on Encrypted Cloud Data with Limited Key-Disclosure and Offline Data Owner.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2016
Collusion-resisting secure nearest neighbor query over encrypted data in cloud, revisited.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016
On efficiently harnessing cloud to securely solve linear regression and other matrix operations.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016
2015
IEEE Trans. Dependable Secur. Comput., 2015
A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem.
Secur. Commun. Networks, 2015
Int. J. Electron. Secur. Digit. Forensics, 2015
Hamburger attack: A collusion attack against privacy-preserving data aggregation schemes.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015
2014
Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data.
IEICE Trans. Inf. Syst., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
2013
Int. J. Electron. Secur. Digit. Forensics, 2013
Ad Hoc Sens. Wirel. Networks, 2013
Secure k-NN computation on encrypted cloud data without sharing key with query users.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013
2012
Proceedings of the Advances in Information and Computer Security, 2012
2010
J. Networks, 2010
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010
2009
Three New Approaches to Privacy-preserving Add to Multiply Protocol and its Application.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009
2008
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008