Yitao Duan

According to our database1, Yitao Duan authored at least 29 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SwapTalk: Audio-Driven Talking Face Generation with One-Shot Customization in Latent Space.
CoRR, 2024

A Paradigm Shift: The Future of Machine Translation Lies with Large Language Models.
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024

2022
Semantically Consistent Data Augmentation for Neural Machine Translation via Conditional Masked Language Model.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

2021
Retrieval-Based Factorization Machines for CTR Prediction.
Proceedings of the Web Information Systems Engineering - WISE 2021, 2021

An End-to-End Speech Accent Recognition Method Based on Hybrid CTC/Attention Transformer ASR.
Proceedings of the IEEE International Conference on Acoustics, 2021

2020
Octopus: Privacy-Preserving Collaborative Evaluation of Loan Stacking.
CoRR, 2020

2019
No Place to Hide: Catching Fraudulent Entities in Tensors.
Proceedings of the World Wide Web Conference, 2019

Breaking the Data Barrier: Towards Robust Speech Translation via Adversarial Stability Training.
Proceedings of the 16th International Conference on Spoken Language Translation, 2019

2018
PrivPy: Enabling Scalable and General Privacy-Preserving Computation.
CoRR, 2018

Do Not Pull My Data for Resale: Protecting Data Providers Using Data Retrieval Pattern Analysis.
Proceedings of the 41st International ACM SIGIR Conference on Research & Development in Information Retrieval, 2018

Youdao's Winning Solution to the NLPCC-2018 Task 2 Challenge: A Neural Machine Translation Approach to Chinese Grammatical Error Correction.
Proceedings of the Natural Language Processing and Chinese Computing, 2018

2017
PEM: A Practical Differentially Private System for Large-Scale Cross-Institutional Data Mining.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017

2015
E-Commerce Item Recommendation Based on Field-aware Factorization Machine.
Proceedings of the 2015 International ACM Recommender Systems Challenge, 2015

2014
Distributed Key Generation for Encrypted Deduplication: Achieving the Strongest Privacy.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014

Practical Distributed Privacy-Preserving Data Analysis at Large Scale.
Proceedings of the Large-Scale Data Analytics, 2014

2013
Distributed Key Generation for Secure Encrypted Deduplication.
IACR Cryptol. ePrint Arch., 2013

2010
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users.
Proceedings of the 19th USENIX Security Symposium, 2010

2009
How to deal with malicious users in privacy-preserving distributed data mining.
Stat. Anal. Data Min., 2009

Privacy without noise.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining.
Proceedings of the SIAM International Conference on Data Mining, 2008

2007
Practical private computation of vector addition-based functions.
Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, 2007

Scalable Secure Bidirectional Group Communication.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Efficient Privacy-Preserving Association Rule Mining: P4P Style.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007

2006
From Commodity to Value: A Privacy-Preserving e-Business Architecture.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006

Zero-knowledge test of vector equivalence granulation of user data with privacy.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack.
Proceedings of the Topics in Cryptology, 2006

2005
Privacy Preserving Link Analysis on Dynamic Weighted Graph.
Comput. Math. Organ. Theory, 2005

2004
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

2002
Brocade: Landmark Routing on Overlay Networks.
Proceedings of the Peer-to-Peer Systems, First International Workshop, 2002


  Loading...