| Binary codes embedding for fast image tagging with incomplete labels Q Wang, B Shen, S Wang, L Li, L Si European conference on computer vision, 425-439, 2014 | 69 | 2014 |
| Secure and private outsourcing of shape-based feature extraction S Wang, M Nassar, M Atallah, Q Malluhi International conference on information and communications security, 90-99, 2013 | 45 | 2013 |
| Secure Collaboration In Engineering Systems Design S Wang, S Bhandari, M Atallah, JH Panchal, K Ramani International Design Engineering Technical Conferences & Computers and …, 2014 | 17 | 2014 |
| Private outsourcing of matrix multiplication over closed semi-rings. MJ Atallah, KB Frikken, S Wang SECRYPT, 136-144, 2012 | 11 | 2012 |
| Secure and private outsourcing to untrusted cloud servers S Wang, M Atallah Proceedings of the 14th Annual Information Security Symposium, 1, 2013 | 3 | 2013 |
| A Scheme for Collaboratively Processing Nearest Neighbor Queries in Oblivious Storage KB Frikken, S Wang, MJ Atallah EAI Endorsed Transactions on Collaborative Computing 1 (2), 2014 | | 2014 |