Yitao Duan
Yitao Duan
NetEase Youdao
Verifierad e-postadress på rd.netease.com
Citeras av
Citeras av
Brocade: Landmark routing on overlay networks
BY Zhao, Y Duan, L Huang, AD Joseph, JD Kubiatowicz
International Workshop on Peer-to-Peer Systems, 34-44, 2002
P4P: practical large-scale privacy-preserving distributed computation robust against malicious users
Y Duan, J Canny, J Zhan
USENIX Security'10, 14, 2010
Distributed key generation for encrypted deduplication: Achieving the strongest privacy
Y Duan
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing …, 2014
Protecting user data in ubiquitous computing: Towards trustworthy environments
Y Duan, J Canny
International Workshop on Privacy Enhancing Technologies, 167-185, 2004
Privacy without noise
Y Duan
Proceedings of the 18th ACM conference on Information and knowledge …, 2009
Efficient privacy-preserving association rule mining: P4p style
Y Duan, J Canny, J Zhan
2007 IEEE Symposium on Computational Intelligence and Data Mining, 654-660, 2007
Practical private computation and zero-knowledge tools for privacy-preserving distributed data mining
Y Duan, J Canny
Proceedings of the 2008 SIAM International Conference on Data Mining, 265-276, 2008
A secure online algorithm for link analysis on weighted graph
Y Duan, J Wang, M Kam, J Canny
Proceedings of the Workshop on Link Analysis, Counterterrorism and Security …, 2005
Privacy preserving link analysis on dynamic weighted graph
Y Duan, J Wang, M Kam, J Canny
Computational & Mathematical Organization Theory 11 (2), 141-159, 2005
E-commerce item recommendation based on field-aware factorization machine
P Yan, X Zhou, Y Duan
Proceedings of the 2015 International ACM Recommender Systems Challenge, 1-4, 2015
Youdao’s winning solution to the nlpcc-2018 task 2 challenge: a neural machine translation approach to chinese grammatical error correction
K Fu, J Huang, Y Duan
CCF International Conference on Natural Language Processing and Chinese …, 2018
Large-Scale Data Analytics
A Gkoulalas-Divanis, A Labbi
Springer, 2014
Zero-knowledge test of vector equivalence granulation of user data with privacy.
Y Duan, JF Canny
GrC, 720-725, 2006
How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext
Y Duan, J Canny
CT-RSA 2006, 2006
How to deal with malicious users in privacy‐preserving distributed data mining
Y Duan, J Canny
Statistical Analysis and Data Mining: The ASA Data Science Journal 2 (1), 18-33, 2009
Differential privacy for sum queries without external noise
Y Duan
ACM Conference on Information and Knowledge Management (CIKM), 2009
PrivPy: Enabling Scalable and General Privacy-Preserving Machine Learning
Y Li, Y Duan, Y Yu, S Zhao, W Xu
arXiv preprint arXiv:1801.10117, 2018
Practical distributed privacy-preserving data analysis at large scale
Y Duan, J Canny
Large-Scale Data Analytics, 219-252, 2014
Practical private computation of vector addition-based functions
Y Duan, J Canny
Proceedings of the twenty-sixth annual ACM symposium on Principles of …, 2007
Scalable secure bidirectional group communication
Y Duan, J Canny
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20