default search action
Yitao Duan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c22]Chenyang Lyu, Zefeng Du, Jitao Xu, Yitao Duan, Minghao Wu, Teresa Lynn, Alham Fikri Aji, Derek F. Wong, Longyue Wang:
A Paradigm Shift: The Future of Machine Translation Lies with Large Language Models. LREC/COLING 2024: 1339-1352 - [i6]Zeren Zhang, Haibo Qin, Jiayu Huang, Yixin Li, Hui Lin, Yitao Duan, Jinwen Ma:
SwapTalk: Audio-Driven Talking Face Generation with One-Shot Customization in Latent Space. CoRR abs/2405.05636 (2024) - 2022
- [c21]Qiao Cheng, Jin Huang, Yitao Duan:
Semantically Consistent Data Augmentation for Neural Machine Translation via Conditional Masked Language Model. COLING 2022: 5148-5157 - [i5]Qiao Cheng, Jin Huang, Yitao Duan:
Semantically Consistent Data Augmentation for Neural Machine Translation via Conditional Masked Language Model. CoRR abs/2209.10875 (2022) - 2021
- [c20]Qiang Gao, Haiwei Wu, Yanqing Sun, Yitao Duan:
An End-to-End Speech Accent Recognition Method Based on Hybrid CTC/Attention Transformer ASR. ICASSP 2021: 7253-7257 - [c19]Xu Wang, Yuancai Huang, Xiaokai Zhao, Weinan Zhao, Yu Tang, Yitao Duan:
Retrieval-Based Factorization Machines for CTR Prediction. WISE (2) 2021: 275-288 - 2020
- [i4]Yi Li, Kevin Gao, Yitao Duan, Wei Xu:
Octopus: Privacy-Preserving Collaborative Evaluation of Loan Stacking. CoRR abs/2007.02234 (2020)
2010 – 2019
- 2019
- [c18]Qiao Cheng, Meiyuan Fang, Yaqian Han, Jin Huang, Yitao Duan:
Breaking the Data Barrier: Towards Robust Speech Translation via Adversarial Stability Training. IWSLT 2019 - [c17]Yikun Ban, Xin Liu, Ling Huang, Yitao Duan, Xue Liu, Wei Xu:
No Place to Hide: Catching Fraudulent Entities in Tensors. WWW 2019: 83-93 - [i3]Qiao Cheng, Meiyuan Fang, Yaqian Han, Jin Huang, Yitao Duan:
Breaking the Data Barrier: Towards Robust Speech Translation via Adversarial Stability Training. CoRR abs/1909.11430 (2019) - 2018
- [c16]Kai Fu, Jin Huang, Yitao Duan:
Youdao's Winning Solution to the NLPCC-2018 Task 2 Challenge: A Neural Machine Translation Approach to Chinese Grammatical Error Correction. NLPCC (1) 2018: 341-350 - [c15]Guosai Wang, Shiyang Xiang, Yitao Duan, Ling Huang, Wei Xu:
Do Not Pull My Data for Resale: Protecting Data Providers Using Data Retrieval Pattern Analysis. SIGIR 2018: 1053-1056 - [i2]Yi Li, Yitao Duan, Wei Xu:
PrivPy: Enabling Scalable and General Privacy-Preserving Computation. CoRR abs/1801.10117 (2018) - 2017
- [c14]Yi Li, Yitao Duan, Wei Xu:
PEM: A Practical Differentially Private System for Large-Scale Cross-Institutional Data Mining. ECML/PKDD (2) 2017: 89-105 - 2015
- [c13]Peng Yan, Xiaocong Zhou, Yitao Duan:
E-Commerce Item Recommendation Based on Field-aware Factorization Machine. RecSys Challenge 2015: 2:1-2:4 - 2014
- [c12]Yitao Duan:
Distributed Key Generation for Encrypted Deduplication: Achieving the Strongest Privacy. CCSW 2014: 57-68 - [p1]Yitao Duan, John F. Canny:
Practical Distributed Privacy-Preserving Data Analysis at Large Scale. Large-Scale Data Analytics 2014: 219-252 - 2013
- [i1]Yitao Duan:
Distributed Key Generation for Secure Encrypted Deduplication. IACR Cryptol. ePrint Arch. 2013: 807 (2013) - 2010
- [c11]Yitao Duan, NetEase Youdao, John F. Canny, Justin Z. Zhan:
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users. USENIX Security Symposium 2010: 207-222
2000 – 2009
- 2009
- [j2]Yitao Duan, John F. Canny:
How to deal with malicious users in privacy-preserving distributed data mining. Stat. Anal. Data Min. 2(1): 18-33 (2009) - [c10]Yitao Duan:
Privacy without noise. CIKM 2009: 1517-1520 - 2008
- [c9]Yitao Duan, John F. Canny:
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining. SDM 2008: 265-276 - 2007
- [c8]Yitao Duan, John F. Canny, Justin Z. Zhan:
Efficient Privacy-Preserving Association Rule Mining: P4P Style. CIDM 2007: 654-660 - [c7]Yitao Duan, John F. Canny:
Scalable Secure Bidirectional Group Communication. INFOCOM 2007: 875-883 - [c6]Yitao Duan, John F. Canny:
Practical private computation of vector addition-based functions. PODC 2007: 326-327 - 2006
- [c5]Yitao Duan, John F. Canny:
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack. CT-RSA 2006: 244-261 - [c4]Yitao Duan, John F. Canny:
Zero-knowledge test of vector equivalence granulation of user data with privacy. GrC 2006: 720-725 - [c3]Yitao Duan, John F. Canny:
From Commodity to Value: A Privacy-Preserving e-Business Architecture. ICEBE 2006: 488-495 - 2005
- [j1]Yitao Duan, Jingtao Wang, Matthew Kam, John F. Canny:
Privacy Preserving Link Analysis on Dynamic Weighted Graph. Comput. Math. Organ. Theory 11(2): 141-159 (2005) - 2004
- [c2]Yitao Duan, John F. Canny:
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments. Privacy Enhancing Technologies 2004: 167-185 - 2002
- [c1]Ben Y. Zhao, Yitao Duan, Ling Huang, Anthony D. Joseph, John Kubiatowicz:
Brocade: Landmark Routing on Overlay Networks. IPTPS 2002: 34-44
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-02 20:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint