Follow
Youwen Zhu
Youwen Zhu
Nanjing University of Aeronautics and Astronautics
Verified email at imi.kyushu-u.ac.jp - Homepage
Title
Cited by
Cited by
Year
Secure and controllable k-NN query over encrypted cloud data with key confidentiality
Y Zhu, Z Huang, T Takagi
Journal of Parallel and Distributed Computing 89, 1-12, 2016
922016
Secure k-NN computation on encrypted cloud data without sharing key with query users
Y Zhu, R Xu, T Takagi
Proceedings of the 2013 international workshop on Security in cloud …, 2013
862013
On the soundness and security of privacy-preserving SVM for outsourcing data classification
X Li, Y Zhu, J Wang, Z Liu, Y Liu, M Zhang
IEEE Transactions on Dependable and Secure Computing 15 (5), 906-912, 2017
772017
Joint distribution estimation and naïve bayes classification under local differential privacy
Q Xue, Y Zhu, J Wang
IEEE transactions on emerging topics in computing 9 (4), 2053-2063, 2019
692019
Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner
L Zhou, Y Zhu, A Castiglione
Computers & Security 69, 84-96, 2017
662017
Metaverse: Security and privacy concerns
Z Ruoyu, Y Zhang, ZHU Youwen, LAN Rushi, HUA Zhongyun
Journal of Metaverse 3 (2), 93-99, 2022
582022
Privacy-assured FogCS: Chaotic compressive sensing for secure industrial big image data processing in fog computing
Y Zhang, P Wang, H Huang, Y Zhu, D Xiao, Y Xiang
IEEE Transactions on Industrial Informatics 17 (5), 3401-3411, 2020
562020
Highly efficient privacy preserving location-based services with enhanced one-round blind filter
X Li, Y Zhu, J Wang
IEEE Transactions on Emerging Topics in Computing 9 (4), 1803-1814, 2019
552019
Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks
J Wang, Y Zhu
Journal of Network and Computer Applications 161, 102660, 2020
532020
Secure multi-label data classification in cloud by additionally homomorphic encryption
Y Liu, Y Luo, Y Zhu, Y Liu, X Li
Information Sciences 468, 89-102, 2018
342018
Efficient and secure multi-dimensional geometric range query over encrypted data in cloud
X Li, Y Zhu, J Wang, J Zhang
Journal of Parallel and Distributed Computing 131, 44-54, 2019
302019
An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation
J Wang, Y Zhu, S Maqbool
Digital Communications and Networks 7 (1), 140-150, 2021
272021
Efficiently and securely harnessing cloud to solve linear regression and other matrix operations
L Zhou, Y Zhu, KKR Choo
Future Generation Computer Systems 81, 404-413, 2018
272018
Parallel implementations of LEA, revisited
H Seo, T Park, S Heo, G Seo, B Bae, Z Hu, L Zhou, Y Nogami, Y Zhu, ...
Information Security Applications: 17th International Workshop, WISA 2016 …, 2017
262017
分布式计算环境下的动态可信度评估模型
朱友文, 黄刘生, 陈国良, 杨威
计算机学报 34 (001), 55-64, 2011
252011
Three new approaches to privacy-preserving add to multiply protocol and its application
Y Zhu, L Huang, W Yang, D Li, Y Luo, F Dong
2009 Second International Workshop on Knowledge Discovery and Data Mining …, 2009
252009
Improved collusion‐resisting secure nearest neighbor query over encrypted data in cloud
Y Zhu, Y Zhang, X Li, H Yan, J Li
Concurrency and Computation: Practice and Experience 31 (21), e4681, 2019
242019
Efficient Encrypted Data Comparison through a Hybrid Method.
XX Li, YW Zhu, J Wang
Journal of Information Science & Engineering 33 (4), 2017
242017
Mean estimation over numeric data with personalized local differential privacy
Q Xue, Y Zhu, J Wang
Frontiers of Computer Science 16, 1-10, 2022
232022
Security analysis of collusion-resistant nearest neighbor query scheme on encrypted cloud data
Y Zhu, T Takagi, R Hu
IEICE TRANSACTIONS on Information and Systems 97 (2), 326-330, 2014
232014
The system can't perform the operation now. Try again later.
Articles 1–20