学校主页
English
学院首页
学院概况
学院简介
院徽释义
学院领导
机构设置
办公指南
年度报告
师资队伍
教授
副教授
讲师
博士生导师
硕士生导师
人才培养
本科生教育
研究生教育
成果展示
学术科研
学术活动
科研团队
党群工作
党建工作
工会工作
团委工作
学生工作
学工动态
规章制度
公示栏
招生就业
学院介绍
就业信息
人才招聘
人才招聘
校友专栏
优秀校友
下载中心
下载中心
师资队伍
教授
副教授
讲师
博士生导师
硕士生导师
讲师
当前位置:
学院首页
>
师资队伍
>
讲师
> 正文
符玥
职位:
讲师
学历:
博士研究生
学科:
计算机科学与技术
研究领域或方向:
数据安全与隐私
邮箱:
fuyuefyu@tyut.edu.cn
职称:
中级
个人简介
主要成果
I received my Ph.D. degree from The Hong Kong Polytechnic University (PolyU) in October 2024 and joined Taiyuan University of Technology (TYUT) as a tenure-track Assistant Professor in July 2025. My research interests include Differential Privacy (high-dimensional/spatiotemporal data processing, Byzantine robustness), Network Security (secure indexing for high-dimensional data; reliability and robustness of distributed systems), and Blockchain (data storage/sharing technologies; proof of useful work algorithms).
I also serve as the Deputy Director of SKLIIS_THETA (Trustworthy Hybrid Encryption and Technology Analytics), a startup research group led by Dr. Rong Du. If you are interested in joining THETA, please contact Dr. Du at durong@tyut.edu.cn. For more information, see her homepage: https://rongdugithub.github.io/durong.github.io//. Feel free to call me by my full name “Fu Yue” during any THETA activities!
For students who wish to join THETA and collaborate with me, especially recent graduates seeking a supervisor, please send a brief proposal explaining why you want to work with me and how my expertise can help, preferably referencing insights from a recent conference paper I co‑authored. Conciseness is always appreciated --- No additional personal details are needed beyond your name, e.g., your grade, graduating institution, or non-academic experience, which I really don't care. Unsolicited emails failing to include the requested information will not be replied.
I am currently exploring interdisciplinary topics at the intersection of statistics, thermodynamics, and economics for learning from noisy data. Candidates with strong mathematics or physics backgrounds who are risk-tolerant and willing to take on ambitious ideas are especially welcome.
JOURNALS:
[1] Y. Fu, Q. Ye, R. Du, and H. Hu. “Secure Bi-attribute Index: Batch Membership Tests over the Non-sensitive Attribute.” Computers & Security, Feb 2025.
[2] Y. Fu, Q. Ye, R. Du, and H. Hu. “Collecting Multi-type and Correlation-Constrained Streaming Sensor Data with Local Differential Privacy.” ACM Transactions on Sensor Networks (TOSN), Sep 2023.
[3] D. Li, R. Du, Y. Fu*, M. Au, “Meta-Key: A Secure Data-Sharing Protocol under Blockchain-Based Decentralized Storage Architecture.” IEEE Networking Letters, Jan 2019.
(* for corresponding author)
[4] R. Du, Q. Ye, Y. Fu, and H. Hu. “Top-k Discovery under Local Differential Privacy: An Adaptive Sampling Approach.” IEEE Transactions on Dependable and Secure Computing (TDSC), Oct 2024.
[5] R. Du, Q. Ye, Y. Fu, and H. Hu. “Distribution Estimation under LDP against Arbitrarily Distributed Attacks.” Submitted to IEEE Transactions on Dependable and Secure Computing
(TDSC).
CONFERENCES
[1] Y. Fu, Q. Ye, R. Du, and H. Hu. “Interactive Trimming against Evasive Online Data Manipulation Attacks: A Game-Theoretic Approach.” In IEEE International Conference on
Data Engineering (ICDE), Netherlands. May 2024.
[2] Y. Fu, M. H. Au, R. Du, H. Hu, and D. Li. “Cloud Password Shield: A Secure Cloud-based Firewall against DDoS on Authentication Servers.” In Proc. of 40th IEEE International
Conference on Distributed Computing Systems (ICDCS’20), Singapore. Jul 2020.
[3] Y. Fu, Q. Ye, R. Du, and H. Hu. “Unified Proof of Work: Delegating and Solving Customized Computationally Bounded Problems in a Privacy-preserving Way.” In The 6th APWeb-WAIM
International Joint Conference on Web and Big Data (APWeb-WAIM), China. Dec 2022.
[4] Y. Fu, S. Sun, D. Li, and P. Liu. “Introduction of Improved Repairing Locality into Secret Sharing Schemes with Perfect Security.” In IEEE International Symposium on Parallel
and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), China. Dec 2017.
[5] R. Du, Q. Ye, Y. Fu, and H. Hu. “Privacy for Free: Leveraging Local Differential Privacy Perturbed Data from Multiple Services.” International Conference on Very Large Data Bases
(VLDB), London Sep 2025.
[6] R. Du, Q. Ye, Y. Fu, and H. Hu. “Leveraging Historical Perturbation for Data Stream Publication under Local Differential Privacy.” In IEEE International Conference on Data Engineering (ICDE), Hong Kong. May 2025.
[7] R. Du, Q. Ye, Y. Fu, H. Hu, J. Li, C. Fang, and J. Shi. “Differential Aggregation against General Colluding Attackers.” In IEEE International Conference on Data Engineering (ICDE), USA. Apr 2023.
[8] R. Du, Q. Ye, Y. Fu, and H. Hu. “Collecting High-Dimensional and Correlation-Constrained Data with Local Differential Privacy.” In Proc. of 18th IEEE International Conference on Sensing, Communication, and Networking (SECON), Virtual. Jul 2021.