Yitao Duan, Ph.D. - Publications
Affiliations: | 2007 | University of California, Berkeley, Berkeley, CA, United States |
Area:
Human-Computer Interaction (HCI); Artificial Intelligence (AI); Control, Intelligent Systems, and Robotics (CIR); Graphics (GR); Security (SEC)Year | Citation | Score | |||
---|---|---|---|---|---|
2014 | Duan Y. Distributed key generation for encrypted deduplication: Achieving the strongest privacy Proceedings of the Acm Conference On Computer and Communications Security. 2014: 57-68. DOI: 10.1145/2664168.2664169 | 0.341 | |||
2013 | Duan Y, Canny J. Practical distributed privacy-preserving data analysis at large scale Large-Scale Data Analytics. 219-252. DOI: 10.1007/978-1-4614-9242-9_8 | 0.651 | |||
2009 | Duan Y. Privacy without noise International Conference On Information and Knowledge Management, Proceedings. 1517-1520. DOI: 10.1145/1645953.1646160 | 0.367 | |||
2009 | Duan Y, Canny J. How to deal with malicious users in privacy-preserving distributed data mining Statistical Analysis and Data Mining. 2: 18-33. DOI: 10.1002/Sam.V2:1 | 0.67 | |||
2007 | Duan Y, Canny J. Brief announcement: Practical private computation of vector addition-based functions Proceedings of the Annual Acm Symposium On Principles of Distributed Computing. 326-327. DOI: 10.1145/1281100.1281155 | 0.645 | |||
2007 | Duan Y, Canny J. Scalable secure bidirectional group communication Proceedings - Ieee Infocom. 875-883. DOI: 10.1109/INFCOM.2007.107 | 0.519 | |||
2007 | Duan Y, Canny J, Zhan J. Efficient privacy-preserving association rule mining: P4P style Proceedings of the 2007 Ieee Symposium On Computational Intelligence and Data Mining, Cidm 2007. 654-660. DOI: 10.1109/CIDM.2007.368938 | 0.612 | |||
2006 | Duan Y, Canny J. From commodity to value: A privacy-preserving e-business architecture Proceedings - Ieee International Conference On E-Business Engineering, Icebe 2006. 487-495. DOI: 10.1109/ICEBE.2006.53 | 0.491 | |||
2006 | Duan Y, Canny J. How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext attack Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3960: 244-261. DOI: 10.1007/11605805_16 | 0.522 | |||
2005 | Duan Y, Wang J, Kam M, Canny J. Privacy preserving link analysis on dynamic weighted graph Computational and Mathematical Organization Theory. 11: 141-159. DOI: 10.1007/S10588-005-3941-2 | 0.531 | |||
Show low-probability matches. |