Victoria Wang

Orcid: 0000-0003-4684-9707

According to our database1, Victoria Wang authored at least 23 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
On human-centred security: A new systems model based on modes and mode transitions.
CoRR, 2024

2023
Semantics-guided generative diffusion model with a 3DMM model condition for face swapping.
Comput. Graph. Forum, October, 2023

2022
Introduction to the Special Issue on Vulnerabilities.
DTRAP, 2022

2021
From feeling like rape to a minor inconvenience: Victims' accounts of the impact of computer misuse crime in the United Kingdom.
Telematics Informatics, 2021

2020
Exploring the extent of openness of open government data - A critique of open government datasets in the UK.
Gov. Inf. Q., 2020

Industrial espionage - A systematic literature review (SLR).
Comput. Secur., 2020

Blockchain Technology in Current Agricultural Systems: From Techniques to Applications.
IEEE Access, 2020

Camouflage Generative Adversarial Network: Coverless Full-image-to-image Hiding.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020

2019
The barriers to the opening of government data in the UK: A view from the bottom.
Inf. Polity, 2019

Self-censorship in social networking sites (SNSs) - privacy concerns, privacy awareness, perceived vulnerability and information management.
J. Inf. Commun. Ethics Soc., 2019

2018
Dissecting Deep Learning Networks - Visualizing Mutual Information.
Entropy, 2018

2017
Surveillance and identity: conceptual framework and formal models.
J. Cybersecur., 2017

Monitoring and Intervention: Concepts and Formal Models.
CoRR, 2017

2016
Theorising Monitoring: Algebraic Models of Web Monitoring in Organisations.
Proceedings of the Recent Trends in Algebraic Development Techniques, 2016

2014
Formalising Surveillance and Identity.
CoRR, 2014

On the Role of Identity in Surveillance.
CoRR, 2014

2013
Viewing Cybercommunities through the Lens of Modernity: The Case of Second Life.
Int. J. Virtual Communities Soc. Netw., 2013

2012
Low power ADC's for wireless communications.
Proceedings of the 55th IEEE International Midwest Symposium on Circuits and Systems, 2012

A 20mW 61dB SNDR (60MHz BW) 1b 3<sup>rd</sup>-order continuous-time delta-sigma modulator clocked at 6GHz in 45nm CMOS.
Proceedings of the 2012 IEEE International Solid-State Circuits Conference, 2012

2011
Effects of quantization on neural spike sorting.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011

2010
Web Filtering and Censoring.
Computer, 2010

2008
A Design Model for Random Process Variability.
Proceedings of the 9th International Symposium on Quality of Electronic Design (ISQED 2008), 2008

Linear analysis of random process variability.
Proceedings of the 2008 International Conference on Computer-Aided Design, 2008


  Loading...