Yitao Duan, Ph.D. - Publications

Affiliations: 
2007 University of California, Berkeley, Berkeley, CA, United States 
Area:
Human-Computer Interaction (HCI); Artificial Intelligence (AI); Control, Intelligent Systems, and Robotics (CIR); Graphics (GR); Security (SEC)

10 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2014 Duan Y. Distributed key generation for encrypted deduplication: Achieving the strongest privacy Proceedings of the Acm Conference On Computer and Communications Security. 2014: 57-68. DOI: 10.1145/2664168.2664169  0.341
2013 Duan Y, Canny J. Practical distributed privacy-preserving data analysis at large scale Large-Scale Data Analytics. 219-252. DOI: 10.1007/978-1-4614-9242-9_8  0.651
2009 Duan Y. Privacy without noise International Conference On Information and Knowledge Management, Proceedings. 1517-1520. DOI: 10.1145/1645953.1646160  0.367
2009 Duan Y, Canny J. How to deal with malicious users in privacy-preserving distributed data mining Statistical Analysis and Data Mining. 2: 18-33. DOI: 10.1002/Sam.V2:1  0.67
2007 Duan Y, Canny J. Brief announcement: Practical private computation of vector addition-based functions Proceedings of the Annual Acm Symposium On Principles of Distributed Computing. 326-327. DOI: 10.1145/1281100.1281155  0.645
2007 Duan Y, Canny J. Scalable secure bidirectional group communication Proceedings - Ieee Infocom. 875-883. DOI: 10.1109/INFCOM.2007.107  0.519
2007 Duan Y, Canny J, Zhan J. Efficient privacy-preserving association rule mining: P4P style Proceedings of the 2007 Ieee Symposium On Computational Intelligence and Data Mining, Cidm 2007. 654-660. DOI: 10.1109/CIDM.2007.368938  0.612
2006 Duan Y, Canny J. From commodity to value: A privacy-preserving e-business architecture Proceedings - Ieee International Conference On E-Business Engineering, Icebe 2006. 487-495. DOI: 10.1109/ICEBE.2006.53  0.491
2006 Duan Y, Canny J. How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext attack Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3960: 244-261. DOI: 10.1007/11605805_16  0.522
2005 Duan Y, Wang J, Kam M, Canny J. Privacy preserving link analysis on dynamic weighted graph Computational and Mathematical Organization Theory. 11: 141-159. DOI: 10.1007/S10588-005-3941-2  0.531
Show low-probability matches.