Brocade: Landmark routing on overlay networks BY Zhao, Y Duan, L Huang, AD Joseph, JD Kubiatowicz International Workshop on Peer-to-Peer Systems, 34-44, 2002 | 332 | 2002 |
P4P: practical large-scale privacy-preserving distributed computation robust against malicious users Y Duan, J Canny, J Zhan USENIX Security'10, 14, 2010 | 74 | 2010 |
Distributed key generation for encrypted deduplication: Achieving the strongest privacy Y Duan Proceedings of the 6th edition of the ACM Workshop on Cloud Computing …, 2014 | 65 | 2014 |
Protecting user data in ubiquitous computing: Towards trustworthy environments Y Duan, J Canny International Workshop on Privacy Enhancing Technologies, 167-185, 2004 | 46 | 2004 |
Privacy without noise Y Duan Proceedings of the 18th ACM conference on Information and knowledge …, 2009 | 32 | 2009 |
Efficient privacy-preserving association rule mining: P4p style Y Duan, J Canny, J Zhan 2007 IEEE Symposium on Computational Intelligence and Data Mining, 654-660, 2007 | 24 | 2007 |
Practical private computation and zero-knowledge tools for privacy-preserving distributed data mining Y Duan, J Canny Proceedings of the 2008 SIAM International Conference on Data Mining, 265-276, 2008 | 23 | 2008 |
A secure online algorithm for link analysis on weighted graph Y Duan, J Wang, M Kam, J Canny Proceedings of the Workshop on Link Analysis, Counterterrorism and Security …, 2005 | 21 | 2005 |
Youdao’s winning solution to the nlpcc-2018 task 2 challenge: a neural machine translation approach to chinese grammatical error correction K Fu, J Huang, Y Duan CCF International Conference on Natural Language Processing and Chinese …, 2018 | 17 | 2018 |
Privacy preserving link analysis on dynamic weighted graph Y Duan, J Wang, M Kam, J Canny Computational & Mathematical Organization Theory 11 (2), 141-159, 2005 | 17 | 2005 |
E-commerce item recommendation based on field-aware factorization machine P Yan, X Zhou, Y Duan Proceedings of the 2015 International ACM Recommender Systems Challenge, 1-4, 2015 | 15 | 2015 |
Large-Scale Data Analytics A Gkoulalas-Divanis, A Labbi Springer, 2014 | 13 | 2014 |
Zero-knowledge test of vector equivalence granulation of user data with privacy. Y Duan, JF Canny GrC, 720-725, 2006 | 8 | 2006 |
How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext Y Duan, J Canny CT-RSA 2006, 2006 | 8* | 2006 |
Practical distributed privacy-preserving data analysis at large scale Y Duan, J Canny Large-Scale Data Analytics, 219-252, 2014 | 6 | 2014 |
How to deal with malicious users in privacy‐preserving distributed data mining Y Duan, J Canny Statistical Analysis and Data Mining: The ASA Data Science Journal 2 (1), 18-33, 2009 | 6 | 2009 |
Differential privacy for sum queries without external noise Y Duan ACM Conference on Information and Knowledge Management (CIKM), 2009 | 6 | 2009 |
Practical private computation of vector addition-based functions Y Duan, J Canny Proceedings of the twenty-sixth annual ACM symposium on Principles of …, 2007 | 6 | 2007 |
Scalable secure bidirectional group communication Y Duan, J Canny IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 5 | 2007 |
Practical private computation of vector addition-based functions or: Can privacy be for free? JF Canny, Y Duan EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2006-12, 2006 | 5* | 2006 |