Yitao Duan, Ph.D.
Affiliations: | 2007 | University of California, Berkeley, Berkeley, CA, United States |
Area:
Human-Computer Interaction (HCI); Artificial Intelligence (AI); Control, Intelligent Systems, and Robotics (CIR); Graphics (GR); Security (SEC)Google:
"Yitao Duan"Cross-listing: Computer Science Tree
Parents
Sign in to add mentorJohn F. Canny | grad student | 2007 | UC Berkeley | |
(P4P: A practical framework for privacy-preserving distributed computation.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Duan Y. (2014) Distributed key generation for encrypted deduplication: Achieving the strongest privacy Proceedings of the Acm Conference On Computer and Communications Security. 2014: 57-68 |
Duan Y, Canny J. (2013) Practical distributed privacy-preserving data analysis at large scale Large-Scale Data Analytics. 219-252 |
Duan Y. (2009) Privacy without noise International Conference On Information and Knowledge Management, Proceedings. 1517-1520 |
Duan Y, Canny J. (2009) How to deal with malicious users in privacy-preserving distributed data mining Statistical Analysis and Data Mining. 2: 18-33 |
Duan Y, Canny J. (2007) Brief announcement: Practical private computation of vector addition-based functions Proceedings of the Annual Acm Symposium On Principles of Distributed Computing. 326-327 |
Duan Y, Canny J. (2007) Scalable secure bidirectional group communication Proceedings - Ieee Infocom. 875-883 |
Duan Y, Canny J, Zhan J. (2007) Efficient privacy-preserving association rule mining: P4P style Proceedings of the 2007 Ieee Symposium On Computational Intelligence and Data Mining, Cidm 2007. 654-660 |
Duan Y, Canny J. (2006) From commodity to value: A privacy-preserving e-business architecture Proceedings - Ieee International Conference On E-Business Engineering, Icebe 2006. 487-495 |
Duan Y, Canny J. (2006) How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext attack Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3960: 244-261 |
Duan Y, Wang J, Kam M, et al. (2005) Privacy preserving link analysis on dynamic weighted graph Computational and Mathematical Organization Theory. 11: 141-159 |