Yitao Duan
According to our database1,
Yitao Duan
authored at least 29 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
SwapTalk: Audio-Driven Talking Face Generation with One-Shot Customization in Latent Space.
CoRR, 2024
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024
2022
Semantically Consistent Data Augmentation for Neural Machine Translation via Conditional Masked Language Model.
Proceedings of the 29th International Conference on Computational Linguistics, 2022
2021
Proceedings of the Web Information Systems Engineering - WISE 2021, 2021
An End-to-End Speech Accent Recognition Method Based on Hybrid CTC/Attention Transformer ASR.
Proceedings of the IEEE International Conference on Acoustics, 2021
2020
2019
Proceedings of the World Wide Web Conference, 2019
Breaking the Data Barrier: Towards Robust Speech Translation via Adversarial Stability Training.
Proceedings of the 16th International Conference on Spoken Language Translation, 2019
2018
Do Not Pull My Data for Resale: Protecting Data Providers Using Data Retrieval Pattern Analysis.
Proceedings of the 41st International ACM SIGIR Conference on Research & Development in Information Retrieval, 2018
Youdao's Winning Solution to the NLPCC-2018 Task 2 Challenge: A Neural Machine Translation Approach to Chinese Grammatical Error Correction.
Proceedings of the Natural Language Processing and Chinese Computing, 2018
2017
PEM: A Practical Differentially Private System for Large-Scale Cross-Institutional Data Mining.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017
2015
Proceedings of the 2015 International ACM Recommender Systems Challenge, 2015
2014
Distributed Key Generation for Encrypted Deduplication: Achieving the Strongest Privacy.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014
Proceedings of the Large-Scale Data Analytics, 2014
2013
IACR Cryptol. ePrint Arch., 2013
2010
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users.
Proceedings of the 19th USENIX Security Symposium, 2010
2009
Stat. Anal. Data Min., 2009
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009
2008
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining.
Proceedings of the SIAM International Conference on Data Mining, 2008
2007
Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007
2006
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack.
Proceedings of the Topics in Cryptology, 2006
2005
Comput. Math. Organ. Theory, 2005
2004
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004
2002
Proceedings of the Peer-to-Peer Systems, First International Workshop, 2002