Secure and controllable k-NN query over encrypted cloud data with key confidentiality Y Zhu, Z Huang, T Takagi Journal of Parallel and Distributed Computing 89, 1-12, 2016 | 92 | 2016 |
Secure k-NN computation on encrypted cloud data without sharing key with query users Y Zhu, R Xu, T Takagi Proceedings of the 2013 international workshop on Security in cloud …, 2013 | 87 | 2013 |
On the soundness and security of privacy-preserving SVM for outsourcing data classification X Li, Y Zhu, J Wang, Z Liu, Y Liu, M Zhang IEEE Transactions on Dependable and Secure Computing 15 (5), 906-912, 2017 | 79 | 2017 |
Joint distribution estimation and naïve bayes classification under local differential privacy Q Xue, Y Zhu, J Wang IEEE transactions on emerging topics in computing 9 (4), 2053-2063, 2019 | 75 | 2019 |
Metaverse: Security and privacy concerns R Zhao, Y Zhang, Y Zhu, R Lan, Z Hua Journal of Metaverse 3 (2), 93-99, 2023 | 71 | 2023 |
Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner L Zhou, Y Zhu, A Castiglione Computers & Security 69, 84-96, 2017 | 64 | 2017 |
Privacy-assured FogCS: Chaotic compressive sensing for secure industrial big image data processing in fog computing Y Zhang, P Wang, H Huang, Y Zhu, D Xiao, Y Xiang IEEE Transactions on Industrial Informatics 17 (5), 3401-3411, 2020 | 59 | 2020 |
Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks J Wang, Y Zhu Journal of Network and Computer Applications 161, 102660, 2020 | 56 | 2020 |
Highly efficient privacy preserving location-based services with enhanced one-round blind filter X Li, Y Zhu, J Wang IEEE Transactions on Emerging Topics in Computing 9 (4), 1803-1814, 2019 | 56 | 2019 |
Secure multi-label data classification in cloud by additionally homomorphic encryption Y Liu, Y Luo, Y Zhu, Y Liu, X Li Information Sciences 468, 89-102, 2018 | 39 | 2018 |
Efficient and secure multi-dimensional geometric range query over encrypted data in cloud X Li, Y Zhu, J Wang, J Zhang Journal of Parallel and Distributed Computing 131, 44-54, 2019 | 30 | 2019 |
An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation J Wang, Y Zhu, S Maqbool Digital Communications and Networks 7 (1), 140-150, 2021 | 28 | 2021 |
Mean estimation over numeric data with personalized local differential privacy Q Xue, Y Zhu, J Wang Frontiers of Computer Science 16, 1-10, 2022 | 27 | 2022 |
Efficiently and securely harnessing cloud to solve linear regression and other matrix operations L Zhou, Y Zhu, KKR Choo Future Generation Computer Systems 81, 404-413, 2018 | 27 | 2018 |
Parallel implementations of LEA, revisited H Seo, T Park, S Heo, G Seo, B Bae, Z Hu, L Zhou, Y Nogami, Y Zhu, ... Information Security Applications: 17th International Workshop, WISA 2016 …, 2017 | 26 | 2017 |
Three new approaches to privacy-preserving add to multiply protocol and its application Y Zhu, L Huang, W Yang, D Li, Y Luo, F Dong 2009 Second International Workshop on Knowledge Discovery and Data Mining …, 2009 | 26 | 2009 |
Improved collusion‐resisting secure nearest neighbor query over encrypted data in cloud Y Zhu, Y Zhang, X Li, H Yan, J Li Concurrency and Computation: Practice and Experience 31 (21), e4681, 2019 | 25 | 2019 |
分布式计算环境下的动态可信度评估模型 朱友文, 黄刘生, 陈国良, 杨威 计算机学报 34 (001), 55-64, 2011 | 25 | 2011 |
Efficient Encrypted Data Comparison through a Hybrid Method. XX Li, YW Zhu, J Wang Journal of Information Science & Engineering 33 (4), 2017 | 24 | 2017 |
DDRM: A continual frequency estimation mechanism with local differential privacy Q Xue, Q Ye, H Hu, Y Zhu, J Wang IEEE Transactions on Knowledge and Data Engineering 35 (7), 6784-6797, 2022 | 23 | 2022 |