Yitao Duan, Ph.D.

Affiliations: 
2007 University of California, Berkeley, Berkeley, CA, United States 
Area:
Human-Computer Interaction (HCI); Artificial Intelligence (AI); Control, Intelligent Systems, and Robotics (CIR); Graphics (GR); Security (SEC)
Google:
"Yitao Duan"
Cross-listing: Computer Science Tree

Parents

Sign in to add mentor
John F. Canny grad student 2007 UC Berkeley
 (P4P: A practical framework for privacy-preserving distributed computation.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Duan Y. (2014) Distributed key generation for encrypted deduplication: Achieving the strongest privacy Proceedings of the Acm Conference On Computer and Communications Security. 2014: 57-68
Duan Y, Canny J. (2013) Practical distributed privacy-preserving data analysis at large scale Large-Scale Data Analytics. 219-252
Duan Y. (2009) Privacy without noise International Conference On Information and Knowledge Management, Proceedings. 1517-1520
Duan Y, Canny J. (2009) How to deal with malicious users in privacy-preserving distributed data mining Statistical Analysis and Data Mining. 2: 18-33
Duan Y, Canny J. (2007) Brief announcement: Practical private computation of vector addition-based functions Proceedings of the Annual Acm Symposium On Principles of Distributed Computing. 326-327
Duan Y, Canny J. (2007) Scalable secure bidirectional group communication Proceedings - Ieee Infocom. 875-883
Duan Y, Canny J, Zhan J. (2007) Efficient privacy-preserving association rule mining: P4P style Proceedings of the 2007 Ieee Symposium On Computational Intelligence and Data Mining, Cidm 2007. 654-660
Duan Y, Canny J. (2006) From commodity to value: A privacy-preserving e-business architecture Proceedings - Ieee International Conference On E-Business Engineering, Icebe 2006. 487-495
Duan Y, Canny J. (2006) How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext attack Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3960: 244-261
Duan Y, Wang J, Kam M, et al. (2005) Privacy preserving link analysis on dynamic weighted graph Computational and Mathematical Organization Theory. 11: 141-159
See more...