Follow
Yitao Duan
Yitao Duan
NetEase Youdao
Verified email at rd.netease.com
Title
Cited by
Cited by
Year
Brocade: Landmark routing on overlay networks
BY Zhao, Y Duan, L Huang, AD Joseph, JD Kubiatowicz
Peer-to-Peer Systems: First InternationalWorkshop, IPTPS 2002 Cambridge, MA …, 2002
3442002
Distributed key generation for encrypted deduplication: Achieving the strongest privacy
Y Duan
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing …, 2014
1082014
P4P: practical large-scale privacy-preserving distributed computation robust against malicious users
Y Duan, J Canny, J Zhan
USENIX Security'10, 14, 2010
822010
Protecting user data in ubiquitous computing: Towards trustworthy environments
Y Duan, J Canny
International Workshop on Privacy Enhancing Technologies, 167-185, 2004
542004
Youdao’s winning solution to the nlpcc-2018 task 2 challenge: a neural machine translation approach to chinese grammatical error correction
K Fu, J Huang, Y Duan
CCF International Conference on Natural Language Processing and Chinese …, 2018
522018
Privacy without noise
Y Duan
Proceedings of the 18th ACM conference on Information and knowledge …, 2009
432009
Practical private computation and zero-knowledge tools for privacy-preserving distributed data mining
Y Duan, J Canny
Proceedings of the 2008 SIAM International Conference on Data Mining, 265-276, 2008
272008
Efficient privacy-preserving association rule mining: P4p style
Y Duan, J Canny, J Zhan
2007 IEEE Symposium on Computational Intelligence and Data Mining, 654-660, 2007
252007
Privacy preserving link analysis on dynamic weighted graph
Y Duan, J Wang, M Kam, J Canny
Computational & Mathematical Organization Theory 11, 141-159, 2005
252005
E-commerce item recommendation based on field-aware factorization machine
P Yan, X Zhou, Y Duan
Proceedings of the 2015 international ACM recommender systems challenge, 1-4, 2015
232015
A secure online algorithm for link analysis on weighted graph
Y Duan, J Wang, M Kam, J Canny
Proceedings of the Workshop on Link Analysis, Counterterrorism and Security …, 2005
212005
Large-Scale Data Analytics
A Gkoulalas-Divanis, A Labbi
Springer, 2014
172014
Breaking the data barrier: Towards robust speech translation via adversarial stability training
Q Cheng, M Fang, Y Han, J Huang, Y Duan
arXiv preprint arXiv:1909.11430, 2019
132019
Practical distributed privacy-preserving data analysis at large scale
Y Duan, J Canny
Large-scale data analytics, 219-252, 2014
112014
How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext
Y Duan, J Canny
CT-RSA 2006, 2006
10*2006
Differential privacy for sum queries without external noise
Y Duan
ACM Conference on Information and Knowledge Management (CIKM), 2009
92009
Zero-knowledge test of vector equivalence granulation of user data with privacy.
Y Duan, JF Canny
GrC, 720-725, 2006
82006
How to deal with malicious users in privacy‐preserving distributed data mining
Y Duan, J Canny
Statistical Analysis and Data Mining: The ASA Data Science Journal 2 (1), 18-33, 2009
72009
PrivPy: Enabling scalable and general privacy-preserving machine learning
Y Li, Y Duan, Y Yu, S Zhao, W Xu
arXiv preprint arXiv:1801.10117, 2018
62018
Practical private computation of vector addition-based functions
Y Duan, J Canny
Proceedings of the twenty-sixth annual ACM symposium on Principles of …, 2007
62007
The system can't perform the operation now. Try again later.
Articles 1–20