关注
Shumiao Wang
Shumiao Wang
在 google.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Binary codes embedding for fast image tagging with incomplete labels
Q Wang, B Shen, S Wang, L Li, L Si
Computer Vision–ECCV 2014: 13th European Conference, Zurich, Switzerland …, 2014
632014
Secure and private outsourcing of shape-based feature extraction
S Wang, M Nassar, M Atallah, Q Malluhi
Information and Communications Security: 15th International Conference …, 2013
412013
Secure Collaboration In Engineering Systems Design
S Wang, S Bhandari, M Atallah, JH Panchal, K Ramani
International Design Engineering Technical Conferences & Computers and …, 2014
132014
Private Outsourcing of Matrix Multiplication over Closed Semi-rings.
MJ Atallah, KB Frikken, S Wang
SECRYPT, 136-144, 2012
92012
Secure and private outsourcing to untrusted cloud servers
S Wang, M Atallah
Proceedings of the 14th Annual Information Security Symposium, 1, 2013
22013
A Scheme for Collaboratively Processing Nearest Neighbor Queries in Oblivious Storage
KB Frikken, S Wang, MJ Atallah
EAI Endorsed Transactions on Collaborative Computing 1 (2), 2014
2014
系统目前无法执行此操作,请稍后再试。
文章 1–6