Wang, Frank
460  Ergebnisse:
Personensuche X
?
1

The Many Faces of Robustness: A Critical Analysis of Out-of..:

, In: 2021 IEEE/CVF International Conference on Computer Vision (ICCV),
Hendrycks, Dan ; Basart, Steven ; Mu, Norman... - p. 8320-8329 , 2021
 
?
2

Keynotes:

, In: 2017 UKSim-AMSS 19th International Conference on Computer Modelling & Simulation (UKSim),
Wang, Frank ; Popper, Nikolas ; Qiang Shen. - p. xv-xix , 2017
 
?
3

Cobweb : Practical Remote Attestation Using Contextual G..:

, In: Proceedings of the 2nd Workshop on System Software for Trusted Execution,
Wang, Frank ; Joung, Yuna ; Mickens, James - p. 1-7 , 2017
 
?
4

Novel optoelectronic devices based on planar graphene-nanot..:

, In: 2016 IEEE Nanotechnology Materials and Devices Conference (NMDC),
Wang, Frank - p. 1-1 , 2016
 
?
5

Keynote Speaker I: Computing for Big Science: Gravitational..:

, In: 2016 UKSim-AMSS 18th International Conference on Computer Modelling and Simulation (UKSim),
Wang, Frank - p. 3-3 , 2016
 
?
6

Invited keynotes:

, In: 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA),
Wang, Frank - p. 1-10 , 2016
 
?
7

Keynote Speaker-1: Computer Evolution over the Next Decade:..:

, In: 2015 17th UKSim-AMSS International Conference on Modelling and Simulation (UKSim),
Wang, Frank - p. 3-3 , 2015
 
?
8

Engineering forum/Panel discussion: How will computer educa..:

, In: 2015 10th International Conference on Computer Science & Education (ICCSE),
Wang, Frank ; Weng Yang ; Cui Binyue - p. 1-1 , 2015
 
?
9

StegoTorus : a camouflage proxy for the Tor anonymity sy..:

, In: Proceedings of the 2012 ACM conference on Computer and communications security,
 
?
10

Declarative privacy policy : finite models and attribute..:

, In: Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium,
 
?
11

A wireless biomedical handheld instrument for evidence-base..:

, In: Proceedings of the 2nd Conference on Wireless Health,
Wang, Frank ; Lam, Yeung ; Mehrnia, Alireza... - p. 1-2 , 2011
 
?
 
?
14

Implementing and Evaluating Security Controls for an Object..:

, In: 24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007),
Niu, Zhongying ; Zhou, Ke ; Feng, Dan... - p. None , 2007
 
?
15

An efficient Lyapunov equation-based approach for generatin..:

, In: Proceedings of the 36th annual ACM/IEEE Design Automation Conference,
 
1-15