Guillermo A. Francia III

Orcid: 0000-0001-8088-2653

According to our database1, Guillermo A. Francia III authored at least 52 papers between 2000 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Proactive Disentangled Modeling of Trigger-Object Pairings for Backdoor Defense.
CoRR, August, 2025

Adaptive Additive Parameter Updates of Vision Transformers for Few-Shot Continual Learning.
CoRR, April, 2025

Transductive One-Shot Learning Meet Subspace Decomposition.
CoRR, April, 2025

Visual Adaptive Prompting for Compositional Zero-Shot Learning.
CoRR, February, 2025

Large Language Model can Reduce the Necessity of Using Large Data Samples for Training Models.
Proceedings of the IEEE Conference on Artificial Intelligence, 2025

Privacy-Preserving Self-Supervised Learning for Secure Image Processing: A BYOL-Based Framework for MNIST and Chest X-ray Data.
Proceedings of the 49th IEEE Annual Computers, Software, and Applications Conference, 2025

White-box Fuzzing in the Wild: A Chaos Engineering Module for DevOps Security Education.
Proceedings of the 49th IEEE Annual Computers, Software, and Applications Conference, 2025

Embedding with Large Language Models for Classification of HIPAA Safeguard Compliance Rules.
Proceedings of the 49th IEEE Annual Computers, Software, and Applications Conference, 2025

Vulnerability to Stability: Scalable Large Language Model in Queue-Based Web Service.
Proceedings of the 49th IEEE Annual Computers, Software, and Applications Conference, 2025

2024
Proactive Adversarial Defense: Harnessing Prompt Tuning in Vision-Language Models to Detect Unseen Backdoored Images.
CoRR, 2024

Revolutionizing Payload Inspection: A Self-Supervised Journey to Precision with Few Shots.
CoRR, 2024

Towards Novel Malicious Packet Recognition: A Few-Shot Learning Approach.
Proceedings of the IEEE Military Communications Conference, 2024

Cyber Risk Assessment Approach in Connected Autonomous Vehicles.
Proceedings of the Human-Centered Design, Operation and Evaluation of Mobile Communications, 2024

Architecture Design and Implementation of a Security Threat Data Sharing Platform.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

A Transformer-Based Framework for Payload Malware Detection and Classification.
Proceedings of the IEEE World AI IoT Congress, 2024

Open Platform Infrastructure for Industrial Control Systems Security.
Proceedings of the Second International Conference on Advances in Computing Research, 2024

2021
Assessing Competencies Using Scenario-Based Learning in Cybersecurity.
J. Cybersecur. Priv., September, 2021

The Spatial Analysis of the Malicious Uniform Resource Locators (URLs): 2016 Dataset Case Study.
Inf., 2021

Digital Twins for Industrial Control Systems Security.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

2020
Integrating Blockchain Technology in Healthcare via Active Learning.
Proceedings of the 2020 ACM Southeast Conference, 2020

2018
A Comparative Study of Neural Network Training Algorithms for the Intelligent Security Monitoring of Industrial Control Systems.
Proceedings of the Computer and Network Security Essentials., 2018

2015
A Consensus of Thought in Applying Change Management to Information System Environments.
Int. J. Inf. Syst. Model. Des., 2015

2014
Laboratory projects for embedded and control systems security.
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014

2013
A Formal Framework for Patch Management.
Int. J. Interdiscip. Telecommun. Netw., 2013

Enhance computer networks learning with hands-on mobile device based labware (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

2012
Security fuzzing toolset.
Proceedings of the 50th Annual Southeast Regional Conference, 2012

Wireless vulnerability of SCADA systems.
Proceedings of the 50th Annual Southeast Regional Conference, 2012

2011
Critical infrastructure security curriculum modules.
Proceedings of the 2011 Information Security Curriculum Development Conference, 2011

2009
Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy.
Int. J. Inf. Secur. Priv., 2009

Applied Data Mining in a Scholarship Program.
Proceedings of the 2009 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2009

Security Metrics-Review and Research Directions.
Proceedings of the 2009 International Conference on Security & Management, 2009

2007
An Empirical Study on the Performance of Java/.Net Cryptographic APIs.
Inf. Secur. J. A Glob. Perspect., 2007

An efficient packet loss recovery methodology for video-over-IP.
Proceedings of the Signal and Image Processing (SIP 2007), 2007

Self Adaptive Application Level Fault Tolerance for Parallel and Distributed Computing.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

The design and implementation of an automated security compliance toolkit: a pedagogical exercise.
Proceedings of the 4th Annual Conference on Information Security Curriculum Development, 2007

2006
Digital forensics laboratory projects.
J. Comput. Sci. Coll., 2006

Visualization and management of digital forensics data.
Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, 2006

Steganography obliterator: an attack on the least significant bits.
Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, 2006

2005
Computer forensics laboratory and tools.
J. Comput. Sci. Coll., 2005

Wireless Security Tools.
Proceedings of the 2005 International Conference on Wireless Networks, 2005

Computer Forensic Tools and Techniques.
Proceedings of The 2005 International Conference on Security and Management, 2005

2004
Computer networking laboratory projects.
J. Comput. Sci. Coll., 2004

Wireless networks laboratory projects.
J. Comput. Sci. Coll., 2004

An Intelligent RFID Based Wireless Tools and Asset Tracking System.
Proceedings of the International Conference on Wireless Networks, 2004

Network Performance Measurement Tools.
Proceedings of the International Conference on Communications in Computing, 2004

2003
A Wireless Maintenance Identification System.
Proceedings of the International Conference on Wireless Networks, 2003

A Wireless Sensor Network.
Proceedings of the International Conference on Wireless Networks, 2003

A Performance Comparison of Encryption Algorithms.
Proceedings of the International Conference on Security and Management, 2003

2002
The integration of wireless technologies in a computer networks laboratory.
J. Comput. Sci. Coll., 2002

2001
Embedded systems programming.
J. Comput. Sci. Coll., 2001

2000
Derivation and Visualization of the Binomial Theorem.
Int. J. Comput. Math. Learn., 2000

The design and implementation of a heterogeneous computer networking laboratory.
J. Comput. Sci. Coll., 2000


  Loading...