default search action
Victoria Wang
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i4]Edwin J. Beggs, John V. Tucker, Victoria Wang:
On human-centred security: A new systems model based on modes and mode transitions. CoRR abs/2405.02043 (2024) - 2023
- [j12]Xiyao Liu, Yang Liu, Yuhao Zheng, Ting Yang, Jian Zhang, Victoria Wang, Hui Fang:
Semantics-guided generative diffusion model with a 3DMM model condition for face swapping. Comput. Graph. Forum 42(7) (2023) - 2022
- [j11]Fabio Massacci, Nick Nikiforakis, Ivan Pashchenko, Antonino Sabetta, Victoria Wang:
Introduction to the Special Issue on Vulnerabilities. DTRAP 3(4): 37:1 (2022) - 2021
- [j10]Mark D. Button, Dean Blackbourn, Lisa Sugiura, David Shepherd, Richard Kapend, Victoria Wang:
From feeling like rape to a minor inconvenience: Victims' accounts of the impact of computer misuse crime in the United Kingdom. Telematics Informatics 64: 101675 (2021) - 2020
- [j9]Weijun Lin, Xinghong Huang, Hui Fang, Victoria Wang, Yining Hua, Jingjie Wang, Haining Yin, Dewei Yi, Laihung Yau:
Blockchain Technology in Current Agricultural Systems: From Techniques to Applications. IEEE Access 8: 143920-143937 (2020) - [j8]Tie Hou, Victoria Wang:
Industrial espionage - A systematic literature review (SLR). Comput. Secur. 98: 102019 (2020) - [j7]Victoria Wang, David Shepherd:
Exploring the extent of openness of open government data - A critique of open government datasets in the UK. Gov. Inf. Q. 37(1) (2020) - [c7]Xiyao Liu, Ziping Ma, Xingbei Guo, Jialu Hou, Gerald Schaefer, Lei Wang, Victoria Wang, Hui Fang:
Camouflage Generative Adversarial Network: Coverless Full-image-to-image Hiding. SMC 2020: 166-172
2010 – 2019
- 2019
- [j6]Mark Warner, Victoria Wang:
Self-censorship in social networking sites (SNSs) - privacy concerns, privacy awareness, perceived vulnerability and information management. J. Inf. Commun. Ethics Soc. 17(4): 375-394 (2019) - [j5]Victoria Wang, David Shepherd, Mark D. Button:
The barriers to the opening of government data in the UK: A view from the bottom. Inf. Polity 24(1): 59-74 (2019) - 2018
- [j4]Hui Fang, Victoria Wang, Motonori Yamaguchi:
Dissecting Deep Learning Networks - Visualizing Mutual Information. Entropy 20(11): 823 (2018) - 2017
- [j3]Victoria Wang, John V. Tucker:
Surveillance and identity: conceptual framework and formal models. J. Cybersecur. 3(3): 145-158 (2017) - [i3]Kenneth Johnson, John V. Tucker, Victoria Wang:
Monitoring and Intervention: Concepts and Formal Models. CoRR abs/1701.07484 (2017) - 2016
- [c6]Kenneth Johnson, John V. Tucker, Victoria Wang:
Theorising Monitoring: Algebraic Models of Web Monitoring in Organisations. WADT 2016: 13-35 - 2014
- [i2]Victoria Wang, John V. Tucker:
On the Role of Identity in Surveillance. CoRR abs/1408.3438 (2014) - [i1]Victoria Wang, John V. Tucker:
Formalising Surveillance and Identity. CoRR abs/1408.3439 (2014) - 2013
- [j2]Victoria Wang, John V. Tucker, Kevin Haines:
Viewing Cybercommunities through the Lens of Modernity: The Case of Second Life. Int. J. Virtual Communities Soc. Netw. 5(1): 75-90 (2013) - 2012
- [c5]Venkatesh Srinivasan, Victoria Wang, Patrick Satarzadeh, Baher Haroun, Marco Corsi:
A 20mW 61dB SNDR (60MHz BW) 1b 3rd-order continuous-time delta-sigma modulator clocked at 6GHz in 45nm CMOS. ISSCC 2012: 158-160 - [c4]Vijay Rentala, Venkatesh Srinivasan, Victoria Wang, Srinath Ramaswamy, Baher Haroun, Marco Corsi:
Low power ADC's for wireless communications. MWSCAS 2012: 694-697 - 2011
- [c3]Sarah Gibson, Victoria Wang, Dejan Markovic:
Effects of quantization on neural spike sorting. ISCAS 2011: 2099-2102 - 2010
- [j1]Thomas M. Chen, Victoria Wang:
Web Filtering and Censoring. Computer 43(3): 94-97 (2010)
2000 – 2009
- 2008
- [c2]Victoria Wang, Dejan Markovic:
Linear analysis of random process variability. ICCAD 2008: 292-296 - [c1]Victoria Wang, Kanak Agarwal, Sani R. Nassif, Kevin J. Nowka, Dejan Markovic:
A Design Model for Random Process Variability. ISQED 2008: 734-737
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 19:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint