网站管理学校官网返回学院首页
骨干教师:朱友文



 

 

朱友文,博士,现任南京航空航天大学教授,信息安全专业主任,入选南京航空航天大学长空之星项目。兼任江苏省密码学会理事、江苏省计算机学会区块链专委会委员、江苏省人工智能学会数据挖掘与应用专委会委员、TrustCom等国际会议程序委员会成员。国家自然科学基金、航空基金等项目涵评专家。20076月本科毕业于中国科学技术大学传播系,获文学学士和计算机软件双学士学位;20127月博士毕业于中国科学技术大学计算机学院,获信息安全专业工学博士学位。20128月,获得日本学术振兴会(JSPS)资助,作为JSPS外国人特别研究员(博后)进入日本九州大学工业数学研究所进行数据安全和隐私保护的研究工作。20146月,加入南京航空航天大学,任职副教授。20206月,任南京航空航天大学教授。主要研究方向包括区块链、应用密码学、人工智能安全和隐私保护、电磁频谱安全等。以第一作者/通信作者在IEEE汇刊获CCF-A/B类期刊/国际会议上发表学术论文近40篇,授权发明专利3项,研究成果获得广西自然科学奖1项、中国电子学会自然科学奖1项。近年来,主持/参与国家级项目6项,省部级和其他课题近20项,包括主持国家自然科学基金项目1项、日本学术振兴会科研辅助金1项、国家重点研发计划子课题4项。

 

 

教育和工作经历

2020.6至今    南京航空航天大学,计算机学院,教授

2014.7-2020.6  南京航空航天大学,计算机学院,副教授

2012.8-2014.7  九州大学(日本),工业数学研究所,JSPS博后(合作导师:Tsuyoshi Takagi

2007.8-2012.7  中国科学技术大学,计算机学院,博士

2003.8-2007.6  中国科学技术大学,传播学系,学士(计算机软件双学士)

 

研究方向  

区块链、应用密码学、人工智能安全和隐私保护、电磁频谱安全等

 

主要科研项目

1. 国家重点研发计划“云计算与大数据”重点专项项目“联盟链监管关键技术”, 2020.11-2023.10,子课题负责人;

2、国家自然科学基金青年项目,2017.1-2019.12,主持;

2、国家重点研发计划项目异构身份联盟与监管基础科学问题研究2017.7-2020.12,子课题负责人;

3CCF-腾讯犀牛鸟创意基金,2016.9-2017.8,主持;(资助率: 22/155=14.1%)

4JSPS(日本学术振兴会)科研辅助金,2012.8-2014.7,主持;

 

主要获奖与荣誉

1、广西自然科学二等奖,2020

2、中国电子学会自然科学二等奖,2020

32020年入选南京航空航天大学“长空之星”

 

第一作者/通信作者部分论文列表(带*的为通信作者)

[1] Xingxin Li, Youwen Zhu*, Jian Wang. Highly Efficient Privacy Preserving Location-Based Services with Enhanced One-Round Blind Filter. IEEE Transactions on Emerging Topics in Computing, 2020, DOI: 10.1109/TETC.2019.2926385

[2] Qiao Xue, Youwen Zhu*, Jian Wang. Joint Distribution Estimation and Naïve Bayes Classification under Local Differential Privacy. IEEE Transactions on Emerging Topics in Computing, December 2019, DOI: 10.1109/TETC.2019.2959581

[3] Xingxin Li, Youwen Zhu*, Jian Wang, Zhe Liu, Yining Liu, Mingwu Zhang. On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification, IEEE Transactions on Dependable and Secure Computing (TDSC), 15(5): 906-912, 2018.

[4] Youwen Zhu, Zhiqiu Huang, Liusheng Huang, Tsuyoshi Takagi. “On the Security of A Privacy-Preserving Product Calculation Scheme”, IEEE Transactions on Dependable and Secure Computing (TDSC), 2015, DOI: 10.1109/TDSC.2014.2345404.

[5] Inam ul haq, Jian Wang, Youwen Zhu*. An Efficient Authenticated Key Agreement Scheme for Consumer USB Mass Storage Devices Resilient to Unauthorized File Decryption, IEEE Transactions on Consumer Electronics, 65(1): 80-89, 2019.

[6] Yushu Zhang, Ping Wang, Hui Huang, Youwen Zhu*, Di Xiao, Yong Xiang. Privacy-Assured FogCS: Chaotic Compressive Sensing for Secure Industrial Big Image Data Processing in Fog Computing. IEEE Transactions on Industrial Informatics, 2020, DOI: 10.1109/TII.2020.3008914

[7] Qiao Xue, Youwen Zhu*, Jian Wang, Xingxin Li, Ji Zhang. Locally differentially private distributed algorithms for set intersection and union. SCIENCE CHINA Information Sciences, 2019, DOI: 10.1007/s11432-018-9899-8  

[8] Qiao Xue, Youwen Zhu*, Jian Wang. Mean Estimation over Numeric Data with Personalized Local Differential Privacy, Frontiers of Computer Science, 2020, DOI: 10.1007/s11704-020-0103-0

[9] Youwen Zhu, Xingxin Li. Privacy-preserving k-means clustering with local synchronization in peer-to-peer networks. Peer-to-Peer Networking and Applications, 2020, DOI: 10.1007/s12083-020-00881-x

[10] Yan Jiang, Youwen Zhu*, Jian Wang, Yong Xiang. Efficient authentication protocol with anonymity and key protection for mobile Internet users, Journal of Parallel and Distributed Computing, vol. 137, 2020, pp: 179-191.

[11] Inam ul haq, Jian Wang, Youwen Zhu*. Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks, Journal of Network and Computer Applications, Volume 161, 2020, No. 102660.

[12] Xingxin Li, Youwen Zhu*, Jian Wang, Ji Zhang. Efficient and Secure Multi-Dimensional Geometric Range Query over Encrypted Data in Cloud, Journal of Parallel and Distributed Computing, vol. 131, 2019, pp: 44-54.

[13] Lu Zhou, Youwen Zhu*, Kim-Kwang Raymond Choo. Efficiently and Securely Harness Cloud to Solve Linear Regression and Other Matrix Operations, Future Generation Computer Systems, vol. 81, 2018, pp: 404-413.

[14] Yi Liu, Yu Luo, Youwen Zhu*, Yang Liu, Xingxin Li. Secure multi-label data classification in cloud by additionally homomorphic encryption. Information Sciences, Vol. 468, Nov. 2018, pp:89-102

[15] Xingxin Li, Youwen Zhu*, Jian Wang. Efficient Encrypted Data Comparison Through a hybrid method. Journal of Information Science and Engineering, 33(4): 953-964, 2017.

[16] Lu Zhou, Youwen Zhu*, Aniello Castiglione. Efficient k-NN Query over Encrypted Data in Cloud with Limited Key-disclosure and Offline Data Owner. Computers & Security (Elsevier Journal), vol. 69, pp: 84-96, 2017, DOI: 10.1016/j.cose.2016.11.013.

[17] Youwen Zhu, Zhiqiu Huang, Tsuyoshi Takagi. “Secure and Controllable k-NN Query over Encrypted Cloud Data with Key Confidentiality”, Journal of Parallel and Distributed Computing, vol. 89, March 2016, pp.1-12,  DOI: 10.1016/j.jpdc.2015.11.004.

[18] Qiao Xue, Youwen Zhu*, Jian Wang, Xingxin Li. Distributed Set Intersection and Union with Local Differential Privacy. The 23rd IEEE International Conference on Parallel and Distributed Systems, 2017, pp: 198-205.

[19] Youwen Zhu, Zhikuan Wang, Yue Zhang. Secure k-NN Query on Encrypted Cloud Data with Limited Key-disclosure and Offline Data Owner. Proc. of the 20th Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD), Auckland, New Zealand, April 19-22, 2016, pp: 401-414.

[20] Youwen Zhu, Zhikuan Wang, Jian Wang. Collusion-Resisting Secure Nearest Neighbor Query over Encrypted Data in Cloud, Revisited. The 24th IEEE/ACM International Symposium on Quality of Service (IWQoS), June 20-21, 2016, pp: 1-6.

[21] Youwen Zhu, Zhikuan Wang, Cheng Qian, Jian Wang. On Efficiently Harnessing Cloud to Securely Solve Linear Regression and Other Matrix Operations. The 24th IEEE/ACM International Symposium on Quality of Service (IWQoS), June 20-21, 2016, DOI: DOI: 10.1109/IWQoS.2016.7590402.

[22] Xingxin Li, Youwen Zhu*, Jian Wang. Secure Naïve Bayesian Classification over Encrypted Data in Cloud. The 10th International Conference on Provable Security (ProvSec 2016), LNCS 10005, pp. 130-150, 2016.

[23] Youwen Zhu, Tsuyoshi Takagi. “Efficient Privacy-preserving Reputation Evaluation in Decentralized Environments”, IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 97(1): 409-412, 2014.

[24] Youwen Zhu, Tsuyoshi Takagi, Rong Hu. “Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data”, IEICE Transactions on Information and Systems, 97(2): 326-330, 2014.

[25] Youwen Zhu, Liusheng Huang, Wei Yang. Relation of PPAtMP and scalar product protocol and their applications. Proc. of the 15th IEEE symposium on computers and communications, Riccione, Italy, 2010: 184-189.

[26] Youwen Zhu, Tsuyoshi Takagi, Liusheng Huang. Efficient Secure Primitive for Privacy Preserving Distributed Computations. Proc. of the 7th international workshop on security (IWSEC), Fukuoka, Japan, LNCS 7631, 2012: 233-243.

[27] 朱友文, 黄刘生, 陈国良, 杨威. 分布式计算环境下的动态可信度评估模型. 计算机学报, 2011, 34(1): 55-64.

[28] 朱友文, 黄刘生, 李栋, 杨威. 保护私有信息的文本信息隐藏检测算法. 电子与信息学报, 2011, 33(2): 278-283.

[29] 朱友文, 黄刘生, 杨威, 田苗苗. 高效的抗合谋攻击的数据聚集协议. 通信学报, 2010, 31(9a):223-227.

[30] 鲁迁迁, 朱友文,蒋炎. 无须重注册的单向通信动态口令认证, 网络与信息安全学报,2020, 6(3): 99-107.

 

 

主要学术兼职

1)江苏省密码学会理事,江苏省计算机学会区块链专委会委员,江苏省人工智能学会数据挖掘与应用专委会委员。

2)期刊审稿人: IEEE Transactions on Computer, IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Knowledge and Data Engineering, IEEE Transactions on Industrial Informatics, Designs Codes and Cryptography, Science China Information Sciences, Computer & Security, Frontier of Computer Science in China, Future Generation Computer Systems, Journal of Supercomputing, Journal of Internet Technology, Journal of Computer Security, Chinese Journal of Electronics, International Journal of Internet Protocol Technology, International Journal of Electronic Security and Digital Forensics, Journal of Information Processing,《软件学报》,《计算机研究与发展》,《电子学报》,《通信学报》等。

3)国际会议程序委员会委员:IEEE TrustcomSpaCCSITIAHISTSPICCCS等。