Youwen Zhu
Youwen Zhu
Nanjing University of Aeronautics and Astronautics
Verified email at imi.kyushu-u.ac.jp - Homepage
Title
Cited by
Cited by
Year
Secure and controllable k-NN query over encrypted cloud data with key confidentiality
Y Zhu, Z Huang, T Takagi
Journal of Parallel and Distributed Computing 89, 1-12, 2016
722016
Secure k-NN computation on encrypted cloud data without sharing key with query users
Y Zhu, R Xu, T Takagi
Proceedings of the 2013 international workshop on Security in cloud …, 2013
612013
On the soundness and security of privacy-preserving SVM for outsourcing data classification
X Li, Y Zhu, J Wang, Z Liu, Y Liu, M Zhang
IEEE Transactions on Dependable and Secure Computing 15 (5), 906-912, 2017
542017
Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner
L Zhou, Y Zhu, A Castiglione
Computers & Security 69, 84-96, 2017
422017
Highly efficient privacy preserving location-based services with enhanced one-round blind filter
X Li, Y Zhu, J Wang
IEEE Transactions on Emerging Topics in Computing, 2019
322019
Joint distribution estimation and naļve bayes classification under local differential privacy
Q Xue, Y Zhu, J Wang
IEEE transactions on emerging topics in computing, 2019
292019
分布式计算环境下的动态可信度评估模型
朱友文, 黄刘生, 陈国良, 杨威
计算机学报 34 (001), 55-64, 2011
252011
Three new approaches to privacy-preserving add to multiply protocol and its application
Y Zhu, L Huang, W Yang, D Li, Y Luo, F Dong
2009 Second International Workshop on Knowledge Discovery and Data Mining …, 2009
252009
Efficiently and securely harnessing cloud to solve linear regression and other matrix operations
L Zhou, Y Zhu, KKR Choo
Future Generation Computer Systems 81, 404-413, 2018
212018
Parallel implementations of LEA, revisited
H Seo, T Park, S Heo, G Seo, B Bae, Z Hu, L Zhou, Y Nogami, Y Zhu, ...
International Workshop on Information Security Applications, 318-330, 2016
202016
Collusion-resisting secure nearest neighbor query over encrypted data in cloud, revisited
Y Zhu, Z Wang, J Wang
2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS), 1-6, 2016
202016
Improved collusion‐resisting secure nearest neighbor query over encrypted data in cloud
Y Zhu, Y Zhang, X Li, H Yan, J Li
Concurrency and Computation: Practice and Experience 31 (21), e4681, 2019
172019
Efficient Encrypted Data Comparison Through a Hybrid Method.
XX Li, YW Zhu, J Wang
Journal of Information Science & Engineering 33 (4), 2017
172017
Security analysis of collusion-resistant nearest neighbor query scheme on encrypted cloud data
Y Zhu, T Takagi, R Hu
IEICE TRANSACTIONS on Information and Systems 97 (2), 326-330, 2014
172014
Secure k-NN query on encrypted cloud database without key-sharing
Y Zhu, R Xu, T Takagi
International Journal of Electronic Security and Digital Forensics 5 (3-4 …, 2013
162013
Dynamic trust evaluation model under distributed computing environment
YW Zhu, LS Huang, GL Chen, W Yang
Jisuanji Xuebao(Chinese Journal of Computers) 34 (1), 55-64, 2011
162011
Detection of synonym-substitution modified articles using context information
Z Yu, L Huang, Z Chen, L Li, X Zhao, Y Zhu
2008 Second International Conference on Future Generation Communication and …, 2008
152008
Privacy-assured FogCS: Chaotic compressive sensing for secure industrial big image data processing in fog computing
Y Zhang, P Wang, H Huang, Y Zhu, D Xiao, Y Xiang
IEEE Transactions on Industrial Informatics 17 (5), 3401-3411, 2020
142020
Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks
J Wang, Y Zhu
Journal of Network and Computer Applications 161, 102660, 2020
142020
Efficient and secure multi-dimensional geometric range query over encrypted data in cloud
X Li, Y Zhu, J Wang, J Zhang
Journal of Parallel and Distributed Computing 131, 44-54, 2019
142019
The system can't perform the operation now. Try again later.
Articles 1–20