Brocade: Landmark routing on overlay networks BY Zhao, Y Duan, L Huang, AD Joseph, JD Kubiatowicz Peer-to-Peer Systems: First InternationalWorkshop, IPTPS 2002 Cambridge, MA …, 2002 | 342 | 2002 |
Distributed key generation for encrypted deduplication: Achieving the strongest privacy Y Duan Proceedings of the 6th edition of the ACM Workshop on Cloud Computing …, 2014 | 124 | 2014 |
P4P: practical large-scale privacy-preserving distributed computation robust against malicious users Y Duan, J Canny, J Zhan USENIX Security'10, 14, 2010 | 86 | 2010 |
Youdao’s winning solution to the nlpcc-2018 task 2 challenge: a neural machine translation approach to chinese grammatical error correction K Fu, J Huang, Y Duan CCF International Conference on Natural Language Processing and Chinese …, 2018 | 57 | 2018 |
Protecting user data in ubiquitous computing: Towards trustworthy environments Y Duan, J Canny International Workshop on Privacy Enhancing Technologies, 167-185, 2004 | 57 | 2004 |
Privacy without noise Y Duan Proceedings of the 18th ACM conference on Information and knowledge …, 2009 | 46 | 2009 |
Practical private computation and zero-knowledge tools for privacy-preserving distributed data mining Y Duan, J Canny Proceedings of the 2008 SIAM International Conference on Data Mining, 265-276, 2008 | 27 | 2008 |
E-commerce item recommendation based on field-aware factorization machine P Yan, X Zhou, Y Duan Proceedings of the 2015 international ACM recommender systems challenge, 1-4, 2015 | 26 | 2015 |
Efficient privacy-preserving association rule mining: P4p style Y Duan, J Canny, J Zhan 2007 IEEE Symposium on Computational Intelligence and Data Mining, 654-660, 2007 | 25 | 2007 |
Privacy preserving link analysis on dynamic weighted graph Y Duan, J Wang, M Kam, J Canny Computational & Mathematical Organization Theory 11, 141-159, 2005 | 23 | 2005 |
A secure online algorithm for link analysis on weighted graph Y Duan, J Wang, M Kam, J Canny Proceedings of the Workshop on Link Analysis, Counterterrorism and Security …, 2005 | 21 | 2005 |
Large-Scale Data Analytics A Gkoulalas-Divanis, A Labbi Springer, 2014 | 19 | 2014 |
Practical distributed privacy-preserving data analysis at large scale Y Duan, J Canny Large-scale data analytics, 219-252, 2014 | 19 | 2014 |
Breaking the data barrier: Towards robust speech translation via adversarial stability training Q Cheng, M Fang, Y Han, J Huang, Y Duan arXiv preprint arXiv:1909.11430, 2019 | 16 | 2019 |
How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext Y Duan, J Canny CT-RSA 2006, 2006 | 10* | 2006 |
Semantically consistent data augmentation for neural machine translation via conditional masked language model Q Cheng, J Huang, Y Duan arXiv preprint arXiv:2209.10875, 2022 | 9 | 2022 |
Differential privacy for sum queries without external noise Y Duan ACM Conference on Information and Knowledge Management (CIKM), 2009 | 9 | 2009 |
Zero-knowledge test of vector equivalence granulation of user data with privacy. Y Duan, JF Canny GrC, 720-725, 2006 | 9 | 2006 |
How to deal with malicious users in privacy‐preserving distributed data mining Y Duan, J Canny Statistical Analysis and Data Mining: The ASA Data Science Journal 2 (1), 18-33, 2009 | 8 | 2009 |
A Paradigm Shift: The Future of Machine Translation Lies with Large Language Models C Lyu, Z Du, J Xu, Y Duan, M Wu, T Lynn, AF Aji, DF Wong, S Liu, L Wang arXiv preprint arXiv:2305.01181, 2023 | 7 | 2023 |