Yitao Duan
Yitao Duan
NetEase Youdao
Verified email at rd.netease.com
Title
Cited by
Cited by
Year
Brocade: Landmark routing on overlay networks
BY Zhao, Y Duan, L Huang, AD Joseph, JD Kubiatowicz
International Workshop on Peer-to-Peer Systems, 34-44, 2002
3372002
Distributed key generation for encrypted deduplication: Achieving the strongest privacy
Y Duan
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing …, 2014
792014
P4P: practical large-scale privacy-preserving distributed computation robust against malicious users
Y Duan, J Canny, J Zhan
USENIX Security'10, 14, 2010
772010
Protecting user data in ubiquitous computing: Towards trustworthy environments
Y Duan, J Canny
International Workshop on Privacy Enhancing Technologies, 167-185, 2004
492004
Privacy without noise
Y Duan
Proceedings of the 18th ACM conference on Information and knowledge …, 2009
322009
Practical private computation and zero-knowledge tools for privacy-preserving distributed data mining
Y Duan, J Canny
Proceedings of the 2008 SIAM International Conference on Data Mining, 265-276, 2008
252008
Efficient privacy-preserving association rule mining: P4p style
Y Duan, J Canny, J Zhan
2007 IEEE Symposium on Computational Intelligence and Data Mining, 654-660, 2007
252007
Youdao’s winning solution to the nlpcc-2018 task 2 challenge: a neural machine translation approach to chinese grammatical error correction
K Fu, J Huang, Y Duan
CCF International Conference on Natural Language Processing and Chinese …, 2018
232018
A secure online algorithm for link analysis on weighted graph
Y Duan, J Wang, M Kam, J Canny
Proceedings of the Workshop on Link Analysis, Counterterrorism and Security …, 2005
222005
Privacy preserving link analysis on dynamic weighted graph
Y Duan, J Wang, M Kam, J Canny
Computational & Mathematical Organization Theory 11 (2), 141-159, 2005
202005
E-commerce item recommendation based on field-aware factorization machine
P Yan, X Zhou, Y Duan
Proceedings of the 2015 international ACM recommender systems challenge, 1-4, 2015
182015
Large-Scale Data Analytics
A Gkoulalas-Divanis, A Labbi
Springer, 2014
162014
Breaking the data barrier: Towards robust speech translation via adversarial stability training
Q Cheng, M Fang, Y Han, J Huang, Y Duan
arXiv preprint arXiv:1909.11430, 2019
102019
Practical distributed privacy-preserving data analysis at large scale
Y Duan, J Canny
Large-scale data analytics, 219-252, 2014
92014
Zero-knowledge test of vector equivalence granulation of user data with privacy.
Y Duan, JF Canny
GrC, 720-725, 2006
82006
How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext
Y Duan, J Canny
CT-RSA 2006, 2006
8*2006
How to deal with malicious users in privacy‐preserving distributed data mining
Y Duan, J Canny
Statistical Analysis and Data Mining: The ASA Data Science Journal 2 (1), 18-33, 2009
72009
Differential privacy for sum queries without external noise
Y Duan
ACM Conference on Information and Knowledge Management (CIKM), 2009
72009
Practical private computation of vector addition-based functions
Y Duan, J Canny
Proceedings of the twenty-sixth annual ACM symposium on Principles of …, 2007
62007
Scalable secure bidirectional group communication
Y Duan, J Canny
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
52007
The system can't perform the operation now. Try again later.
Articles 1–20