Fan Wu

Orcid: 0000-0003-2797-4692

Affiliations:
  • Tuskegee University, Department of Computer Science, AL, USA
  • Worcester Polytechnic Institute (WPI), Worcester, MA, USA (PhD 2008)


According to our database1, Fan Wu authored at least 71 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Applying Pre-trained Multilingual BERT in Embeddings for Improved Malicious Prompt Injection Attacks Detection.
CoRR, 2024

Student Perceptions of Authentic Learning to Learn White-box Testing.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

Scaffolding Minority High School Students' Computer Science Learning: Culturally Relevant Summer Camp.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

Enhancing HIPAA Compliance in AI-driven mHealth Devices Security and Privacy.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

Authentic Learning on DevOps Security with Labware: Git Hooks To Facilitate Automated Security Static Analysis.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

Fine-Tuned Variational Quantum Classifiers for Cyber Attacks Detection Based on Parameterized Quantum Circuits and Optimizers.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

Mitigating Insecure Outputs in Large Language Models(LLMs): A Practical Educational Module.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

Quantum Adversarial Attacks: Developing Quantum FGSM Algorithm.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

Uncovering the Interpretation of Large Language Models.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

Authentic Learning Approach for Data Poisoning Vulnerability in LLMs.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

Evaluating LSTM Time Series Prediction Performance on Benchmark CPUs and GPUs in Cloud Environments.
Proceedings of the 2024 ACM Southeast Conference, 2024

2023
Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python.
CoRR, 2023

Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms.
CoRR, 2023

Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection.
CoRR, 2023

Authentic Learning on Machine Learning for Cybersecurity.
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 2, 2023

Practitioner Perceptions of Ansible Test Smells.
Proceedings of the 20th International Conference on Software Architecture, 2023

Quality Assurance for Infrastructure Orchestrators: Emerging Results from Ansible.
Proceedings of the 20th International Conference on Software Architecture, 2023

Ranking Cellular Internet Card User VIP Values Based on Graph Clustering with Usage Data.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

A Plugin for Kotlin based Android Apps to Detect Security Breaches through Dataflow.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Security Risk and Attacks in AI: A Survey of Security and Privacy.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Authentic Learning Approach for Artificial Intelligence Systems Security and Privacy.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data.
Proceedings of the IEEE International Conference on Big Data, 2023

Quantum Cryptography for Enhanced Network Security: A Comprehensive Survey of Research, Developments, and Future Directions.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Experimental Validation of Speech Improvement-Based Stratified Adaptive Finite-Time Saturation Control of Omnidirectional Service Robot.
IEEE Trans. Syst. Man Cybern. Syst., 2022

Development of Blockchain-based e-Voting System: Requirements, Design and Security Perspective.
Proceedings of the IEEE International Conference on Trust, 2022

Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

Can We use Authentic Learning to Educate Students about Secure Infrastructure as Code Development?
Proceedings of the ITiCSE 2022: Innovation and Technology in Computer Science Education, Dublin, Ireland, July 8, 2022

Investigating Novel Approaches to Defend Software Supply Chain Attacks.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022

Towards Automation for MLOps: An Exploratory Study of Bot Usage in Deep Learning Libraries.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Systematic Analysis of Deep Learning Model for Vulnerable Code Detection.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Scalable Machine Learning Using PySpark.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Shifting Left for Machine Learning: An Empirical Study of Security Weaknesses in Supervised Learning-based Projects.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

A Novel Machine Learning Based Framework for Bridge Condition Analysis.
Proceedings of the IEEE International Conference on Big Data, 2022

Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware: Neural Network Algorithms for Network Denial of Service (DOS) Detection.
Proceedings of the IEEE International Conference on Big Data, 2022

Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Finger vein recognition system with template protection based on convolutional neural network.
Knowl. Based Syst., 2021

Recurrent Neural Network With Fractional Learning-Based Fixed-Time Formation Tracking Constrained Control for a Group of Quadrotors.
IEEE Access, 2021

Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Colab Cloud Based Portable and Shareable Hands-on Labware for Machine Learning to Cybersecurity.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Malware Detection and Prevention using Artificial Intelligence Techniques.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
An Adaptive DE Algorithm Based Fuzzy Logic Anti-swing Controller for Overhead Crane Systems.
Int. J. Fuzzy Syst., 2020

Fuzzy Adaptive Finite-Time Cooperative Control With Input Saturation for Nonlinear Multiagent Systems and its Application.
IEEE Access, 2020

Case Study-based Portable Hands-on Labware for Machine Learning in Cybersecurity.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

Information Assurance and Security Education on Undergraduate Computing Degree Programs.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

Denial of Service (DoS) Attack Detection: Performance Comparison of Supervised Machine Learning Algorithms.
Proceedings of the IEEE Intl Conf on Dependable, 2020

Enhancing Proactive Control Mobile and Web Software Security Education with Hands-on Labware.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

2019
A Deep Belief Networks Based Prediction Method for Identification of Disease-Associated Non-coding SNPs in Human Genome.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Protecting Data in Android External Data Storage.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

DroidPatrol: A Static Analysis Plugin For Secure Mobile Software Development.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Hands-on File Inclusion Vulnerablity and Proactive Control for Secure Software Development.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Experiential Learning: Case Study-Based Portable Hands-on Regression Labware for Cyber Fraud Prediction.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Secure Mobile Software Development with Vulnerability Detectors in Static Code Analysis.
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018

Authentic Learning Secure Software Development (SSD) in Computing Education.
Proceedings of the IEEE Frontiers in Education Conference, 2018

Benchmark Requirements for Assessing Software Security Vulnerability Testing Tools.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Broadening Secure Mobile Software Development (SMSD) Through Curriculum Development (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

Labware for Secure Mobile Software Development (SMSD) Education.
Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education, 2017

Learning database security with hands-on mobile labs.
Proceedings of the 2017 IEEE Frontiers in Education Conference, 2017

2015
Energy-Accuracy Trade-off in Wireless Sensor Network Localization.
Int. J. Handheld Comput. Res., 2015

2012
Imperceptible Simplification on Mobile Displays.
Int. J. Handheld Comput. Res., 2012

2010
On Balancing Energy Consumption, Rendering Speed, and Image Quality on Mobile Devices.
Int. J. Handheld Comput. Res., 2010

An Efficient Acceleration of Symmetric Key Cryptography Using General Purpose Graphics Processing Unit.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

High Performance Symmetric Decryption Algorithm on General Purpose Graphics Processing Unit.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2010

2009
Unequal Error Protection (UEP) for Wavelet-Based Wireless 3D Mesh Transmission.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

Yield and Reliability Enhancement for VLSI Design.
Proceedings of the 2009 International Conference on Computer Design, 2009

2008
Adaptive CPU Scheduling to Conserve Energy in Real-Time Mobile Graphics Applications.
Proceedings of the Advances in Visual Computing, 4th International Symposium, 2008

Dynamic correction of color appearance on mobile displays.
Proceedings of the Graphics Interface 2008 Conference, 2008

2007
Pareto-Based Perceptual Metric for Imperceptible Simplification on Mobile Displays.
Proceedings of the 28th Annual Conference of the European Association for Computer Graphics, 2007

2006
Multiresolution Graphics on Ubiquitous Displays Using Wavelets.
Int. J. Virtual Real., 2006

Unequal error protection for wavelet-based wireless mesh transmission.
Proceedings of the International Conference on Computer Graphics and Interactive Techniques, 2006

2005
Estimating Mobile Memory Requirements and Rendering Time for Remote Execution of the Graphics Pipeline.
Proceedings of the 26th Annual Conference of the European Association for Computer Graphics, 2005


  Loading...