What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Youwen Zhu
Google Scholar
17
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Maximizing Area Coverage in Privacy-Preserving Worker Recruitment: A Prior Knowledge-Enhanced Geo-Indistinguishable Approach.
Pengfei Zhang
Xiang Cheng
Zhikun Zhang
Youwen Zhu
Ji Zhang
2025
journals/compsec
PrivRS: Differentially private synthetic data generation via role similarity.
Xinxin Ye
Youwen Zhu
Jie Pan
Miao Zhang
Hai Deng
2025
journals/tifs
GFD: An Effective Defense Against Targeted Poisoning Attacks for Local Differential Privacy Frequency Estimation.
Yuanyuan Wang
Youwen Zhu
Shaowei Wang
Qiao Xue
Jian Wang
2025
conf/icics
Fine-Filter: An Effective Defense Against Poisoning Attacks on Frequency Estimation Under LDP.
Yuxia Zhou
Qiao Xue
Youwen Zhu
2025
conf/uss
Addressing Sensitivity Distinction in Local Differential Privacy: A General Utility-Optimized Framework.
Xingyu He
Youwen Zhu
Rongke Liu
Gaoning Pan
Changyu Dong
2024
journals/tifs
Understanding Visual Privacy Protection: A Generalized Framework With an Instance on Facial Privacy.
Yushu Zhang
Junhao Ji
Wenying Wen
Youwen Zhu
Zhihua Xia
Jian Weng
2024
journals/tifs
Heavy Hitter Identification Over Large-Domain Set-Valued Data With Local Differential Privacy.
Youwen Zhu
Yiran Cao
Qiao Xue
Qihui Wu
Yushu Zhang
2024
journals/tifs
Collusion-Resilient Privacy-Preserving Database Fingerprinting.
Shunsheng Zhang
Youwen Zhu
Ao Zeng
2023
journals/compsec
DIVRS: Data integrity verification based on ring signature in cloud storage.
Miao Tian
Yushu Zhang
Youwen Zhu
Liangmin Wang
Yong Xiang
2023
journals/tifs
RAPP: Reversible Privacy Preservation for Various Face Attributes.
Yushu Zhang
Tao Wang
Ruoyu Zhao
Wenying Wen
Youwen Zhu
2020
journals/istr
A survey of authenticated key agreement protocols for multi-server architecture.
Inam ul Haq
Jian Wang
Youwen Zhu
Saad Maqbool
2017
journals/compsec
Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner.
Lu Zhou
Youwen Zhu
Aniello Castiglione
2017
conf/provsec
Secure Multi-label Classification over Encrypted Data in Cloud.
Yang Liu
Xingxin Li
Youwen Zhu
Jian Wang
Zhe Liu
2016
conf/provsec
Secure Naïve Bayesian Classification over Encrypted Data in Cloud.
Xingxin Li
Youwen Zhu
Jian Wang
2016
conf/wisa
Parallel Implementations of LEA, Revisited.
Hwajeong Seo
Taehwan Park
Shinwook Heo
Gyuwon Seo
Bongjin Bae
Zhi Hu
Lu Zhou
Yasuyuki Nogami
Youwen Zhu
Howon Kim
2013
conf/ccs
Secure k-NN computation on encrypted cloud data without sharing key with query users.
Youwen Zhu
Rui Xu
Tsuyoshi Takagi
2012
conf/iwsec
Efficient Secure Primitive for Privacy Preserving Distributed Computations.
Youwen Zhu
Tsuyoshi Takagi
Liusheng Huang
Coauthors
Aniello Castiglione
(1)
Ao Zeng
(1)
Bongjin Bae
(1)
Changyu Dong
(1)
Gaoning Pan
(1)
Gyuwon Seo
(1)
Hai Deng
(1)
Howon Kim
(1)
Hwajeong Seo
(1)
Inam ul Haq
(1)
Ji Zhang
(1)
Jian Wang
(4)
Jian Weng
(1)
Jie Pan
(1)
Junhao Ji
(1)
Liangmin Wang
(1)
Liusheng Huang
(1)
Lu Zhou
(1)
Lu Zhou
(1)
Miao Tian
(1)
Miao Zhang
(1)
Pengfei Zhang
(1)
Qiao Xue
(3)
Qihui Wu
(1)
Rongke Liu
(1)
Rui Xu
(1)
Ruoyu Zhao
(1)
Saad Maqbool
(1)
Shaowei Wang
(1)
Shinwook Heo
(1)
Shunsheng Zhang
(1)
Taehwan Park
(1)
Tao Wang
(1)
Tsuyoshi Takagi
(2)
Wenying Wen
(2)
Xiang Cheng
(1)
Xingxin Li
(2)
Xingyu He
(1)
Xinxin Ye
(1)
Yang Liu
(1)
Yasuyuki Nogami
(1)
Yiran Cao
(1)
Yong Xiang
(1)
Youwen Zhu
(17)
Yuanyuan Wang
(1)
Yushu Zhang
(4)
Yuxia Zhou
(1)
Zhe Liu
(1)
Zhi Hu
(1)
Zhihua Xia
(1)
Zhikun Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to