Fan Wu
Orcid: 0000-0003-2797-4692Affiliations:
- Tuskegee University, Department of Computer Science, AL, USA
- Worcester Polytechnic Institute (WPI), Worcester, MA, USA (PhD 2008)
According to our database1,
Fan Wu
authored at least 71 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on tuskegee.edu
-
on orcid.org
On csauthors.net:
Bibliography
2024
Applying Pre-trained Multilingual BERT in Embeddings for Improved Malicious Prompt Injection Attacks Detection.
CoRR, 2024
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024
Scaffolding Minority High School Students' Computer Science Learning: Culturally Relevant Summer Camp.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
Authentic Learning on DevOps Security with Labware: Git Hooks To Facilitate Automated Security Static Analysis.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
Fine-Tuned Variational Quantum Classifiers for Cyber Attacks Detection Based on Parameterized Quantum Circuits and Optimizers.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
Mitigating Insecure Outputs in Large Language Models(LLMs): A Practical Educational Module.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
Evaluating LSTM Time Series Prediction Performance on Benchmark CPUs and GPUs in Cloud Environments.
Proceedings of the 2024 ACM Southeast Conference, 2024
2023
Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python.
CoRR, 2023
Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms.
CoRR, 2023
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection.
CoRR, 2023
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 2, 2023
Proceedings of the 20th International Conference on Software Architecture, 2023
Proceedings of the 20th International Conference on Software Architecture, 2023
Ranking Cellular Internet Card User VIP Values Based on Graph Clustering with Usage Data.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Authentic Learning Approach for Artificial Intelligence Systems Security and Privacy.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data.
Proceedings of the IEEE International Conference on Big Data, 2023
Quantum Cryptography for Enhanced Network Security: A Comprehensive Survey of Research, Developments, and Future Directions.
Proceedings of the IEEE International Conference on Big Data, 2023
2022
Experimental Validation of Speech Improvement-Based Stratified Adaptive Finite-Time Saturation Control of Omnidirectional Service Robot.
IEEE Trans. Syst. Man Cybern. Syst., 2022
Development of Blockchain-based e-Voting System: Requirements, Design and Security Perspective.
Proceedings of the IEEE International Conference on Trust, 2022
Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022
Can We use Authentic Learning to Educate Students about Secure Infrastructure as Code Development?
Proceedings of the ITiCSE 2022: Innovation and Technology in Computer Science Education, Dublin, Ireland, July 8, 2022
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022
Towards Automation for MLOps: An Exploratory Study of Bot Usage in Deep Learning Libraries.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Shifting Left for Machine Learning: An Empirical Study of Security Weaknesses in Supervised Learning-based Projects.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware: Neural Network Algorithms for Network Denial of Service (DOS) Detection.
Proceedings of the IEEE International Conference on Big Data, 2022
Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms.
Proceedings of the IEEE International Conference on Big Data, 2022
2021
Finger vein recognition system with template protection based on convolutional neural network.
Knowl. Based Syst., 2021
Recurrent Neural Network With Fractional Learning-Based Fixed-Time Formation Tracking Constrained Control for a Group of Quadrotors.
IEEE Access, 2021
Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
Colab Cloud Based Portable and Shareable Hands-on Labware for Machine Learning to Cybersecurity.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
2020
An Adaptive DE Algorithm Based Fuzzy Logic Anti-swing Controller for Overhead Crane Systems.
Int. J. Fuzzy Syst., 2020
Fuzzy Adaptive Finite-Time Cooperative Control With Input Saturation for Nonlinear Multiagent Systems and its Application.
IEEE Access, 2020
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020
Information Assurance and Security Education on Undergraduate Computing Degree Programs.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020
Denial of Service (DoS) Attack Detection: Performance Comparison of Supervised Machine Learning Algorithms.
Proceedings of the IEEE Intl Conf on Dependable, 2020
Enhancing Proactive Control Mobile and Web Software Security Education with Hands-on Labware.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
2019
A Deep Belief Networks Based Prediction Method for Identification of Disease-Associated Non-coding SNPs in Human Genome.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Hands-on File Inclusion Vulnerablity and Proactive Control for Secure Software Development.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Experiential Learning: Case Study-Based Portable Hands-on Regression Labware for Cyber Fraud Prediction.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
Secure Mobile Software Development with Vulnerability Detectors in Static Code Analysis.
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018
Proceedings of the IEEE Frontiers in Education Conference, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
2017
Broadening Secure Mobile Software Development (SMSD) Through Curriculum Development (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017
Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education, 2017
Proceedings of the 2017 IEEE Frontiers in Education Conference, 2017
2015
Int. J. Handheld Comput. Res., 2015
2012
2010
On Balancing Energy Consumption, Rendering Speed, and Image Quality on Mobile Devices.
Int. J. Handheld Comput. Res., 2010
An Efficient Acceleration of Symmetric Key Cryptography Using General Purpose Graphics Processing Unit.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010
High Performance Symmetric Decryption Algorithm on General Purpose Graphics Processing Unit.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2010
2009
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009
Yield and Reliability Enhancement for VLSI Design.
Proceedings of the 2009 International Conference on Computer Design, 2009
2008
Adaptive CPU Scheduling to Conserve Energy in Real-Time Mobile Graphics Applications.
Proceedings of the Advances in Visual Computing, 4th International Symposium, 2008
Proceedings of the Graphics Interface 2008 Conference, 2008
2007
Proceedings of the 28th Annual Conference of the European Association for Computer Graphics, 2007
2006
Int. J. Virtual Real., 2006
Proceedings of the International Conference on Computer Graphics and Interactive Techniques, 2006
2005
Estimating Mobile Memory Requirements and Rendering Time for Remote Execution of the Graphics Pipeline.
Proceedings of the 26th Annual Conference of the European Association for Computer Graphics, 2005