关注
Youwen Zhu
Youwen Zhu
Nanjing University of Aeronautics and Astronautics
在 imi.kyushu-u.ac.jp 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Secure and controllable k-NN query over encrypted cloud data with key confidentiality
Y Zhu, Z Huang, T Takagi
Journal of Parallel and Distributed Computing 89, 1-12, 2016
922016
Secure k-NN computation on encrypted cloud data without sharing key with query users
Y Zhu, R Xu, T Takagi
Proceedings of the 2013 international workshop on Security in cloud …, 2013
872013
On the soundness and security of privacy-preserving SVM for outsourcing data classification
X Li, Y Zhu, J Wang, Z Liu, Y Liu, M Zhang
IEEE Transactions on Dependable and Secure Computing 15 (5), 906-912, 2017
792017
Joint distribution estimation and naïve bayes classification under local differential privacy
Q Xue, Y Zhu, J Wang
IEEE transactions on emerging topics in computing 9 (4), 2053-2063, 2019
752019
Metaverse: Security and privacy concerns
R Zhao, Y Zhang, Y Zhu, R Lan, Z Hua
Journal of Metaverse 3 (2), 93-99, 2023
712023
Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner
L Zhou, Y Zhu, A Castiglione
Computers & Security 69, 84-96, 2017
642017
Privacy-assured FogCS: Chaotic compressive sensing for secure industrial big image data processing in fog computing
Y Zhang, P Wang, H Huang, Y Zhu, D Xiao, Y Xiang
IEEE Transactions on Industrial Informatics 17 (5), 3401-3411, 2020
592020
Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks
J Wang, Y Zhu
Journal of Network and Computer Applications 161, 102660, 2020
562020
Highly efficient privacy preserving location-based services with enhanced one-round blind filter
X Li, Y Zhu, J Wang
IEEE Transactions on Emerging Topics in Computing 9 (4), 1803-1814, 2019
562019
Secure multi-label data classification in cloud by additionally homomorphic encryption
Y Liu, Y Luo, Y Zhu, Y Liu, X Li
Information Sciences 468, 89-102, 2018
392018
Efficient and secure multi-dimensional geometric range query over encrypted data in cloud
X Li, Y Zhu, J Wang, J Zhang
Journal of Parallel and Distributed Computing 131, 44-54, 2019
302019
An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation
J Wang, Y Zhu, S Maqbool
Digital Communications and Networks 7 (1), 140-150, 2021
282021
Mean estimation over numeric data with personalized local differential privacy
Q Xue, Y Zhu, J Wang
Frontiers of Computer Science 16, 1-10, 2022
272022
Efficiently and securely harnessing cloud to solve linear regression and other matrix operations
L Zhou, Y Zhu, KKR Choo
Future Generation Computer Systems 81, 404-413, 2018
272018
Parallel implementations of LEA, revisited
H Seo, T Park, S Heo, G Seo, B Bae, Z Hu, L Zhou, Y Nogami, Y Zhu, ...
Information Security Applications: 17th International Workshop, WISA 2016 …, 2017
262017
Three new approaches to privacy-preserving add to multiply protocol and its application
Y Zhu, L Huang, W Yang, D Li, Y Luo, F Dong
2009 Second International Workshop on Knowledge Discovery and Data Mining …, 2009
262009
Improved collusion‐resisting secure nearest neighbor query over encrypted data in cloud
Y Zhu, Y Zhang, X Li, H Yan, J Li
Concurrency and Computation: Practice and Experience 31 (21), e4681, 2019
252019
分布式计算环境下的动态可信度评估模型
朱友文, 黄刘生, 陈国良, 杨威
计算机学报 34 (001), 55-64, 2011
252011
Efficient Encrypted Data Comparison through a Hybrid Method.
XX Li, YW Zhu, J Wang
Journal of Information Science & Engineering 33 (4), 2017
242017
DDRM: A continual frequency estimation mechanism with local differential privacy
Q Xue, Q Ye, H Hu, Y Zhu, J Wang
IEEE Transactions on Knowledge and Data Engineering 35 (7), 6784-6797, 2022
232022
系统目前无法执行此操作,请稍后再试。
文章 1–20