Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
My Subscriptions
Browse Content
Resources
All
Your New Research Discovery Platform
My Subscriptions
Browse Content
Resources
All
Advanced Search
Browse more than 966k articles on advanced computing topics
Magazines
Journals
Video Library
Conference Proceedings
Remote Access
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media
Prakash L. Kharvi
IEEE Security & Privacy, July-Aug. 2024
Popular
JavaScript: Designing a Language in 10 Days
Charles Severance
Computer, Feb. 2012
Popular
What Is the Blockchain?
Massimo Di Pierro
Computing in Science & Engineering, September/October 2017
Popular
Latest Articles
Synapse: Synergizing Approximate STT-MRAM and CNN Features for Energy-Efficient Accelerators
Full-text access may be available. Sign in or learn about subscription options.
by
Pouya Toutounchian
,
Shaahin Hessabi
Building and Sustaining a Community Resource for Best Practices in Scientific Software: The Story of BSSw.io
Freely available from IEEE.
by
Rinku Gupta
,
David E. Bernholdt
,
Roscoe A. Bartlett
,
Patricia A. Grubel
,
Michael A. Heroux
,
Lois Curfman McInnes
,
Mark C. Miller
,
Kasia Salim
,
Jean Shuler
,
Deborah Stevens
,
Gregory R. Watson
,
Paul R. Wolfenbarger
Potential of Zero-Touch Network Management in Industry 5.0: A Future Prospect
Full-text access may be available. Sign in or learn about subscription options.
by
Abhishek Hazra
,
Alakesh Kalita
,
Mohan Gurusamy
,
Dipak Kumar Sah
BCIM: Constant-Time and High-Throughput Block-Cipher-In-Memory With Massively-Parallel Bit-Serial Execution
Full-text access may be available. Sign in or learn about subscription options.
by
Andrew Dervay
,
Wenfeng Zhao
“It’s time. Time for digital security.”: An End User Study on Actionable Security and Privacy Advice
Full-text access may be available. Sign in or learn about subscription options.
by
Anna Lena Rotthaler
,
Harshini Sri Ramulu
,
Lucy Simko
,
Sascha Fahl
,
Yasemin Acar
SPAM: Streamlined Prefetcher-Aware Multi-Threaded Cache Covert-Channel Attack
Full-text access may be available. Sign in or learn about subscription options.
by
E. Kritheesh
,
Biswabandan Panda
Bridging the Gender Gap in Computing: Insights From Latin America With a Focus on Brazil
Full-text access may be available. Sign in or learn about subscription options.
by
Alice Rangel de Paiva Abreu
,
Luis Felipe Coimbra Costa
,
Yuri Oliveira de Lima
,
Luciana Maria Azevedo Nascimento
,
Carlos Eduardo Barbosa
MUDDLE: Multi-Modal Dynamic Detector Loopback Evaluator to Expose Trojans in Zero-Trust PCB Systems
Full-text access may be available. Sign in or learn about subscription options.
by
Prashanth Krishnamurthy
,
Hammond Pearce
,
Virinchi Roy Surabhi
,
Joshua Trujillo
,
Ramesh Karri
,
Farshad Khorrami
Presence of IBM Data Processing Equipment in Latin America, 1920s-1980s, and Insights for Historians
Full-text access may be available. Sign in or learn about subscription options.
by
James W. Cortada
Multiclass Unlearning for Image Classification via Weight Filtering
Full-text access may be available. Sign in or learn about subscription options.
by
Samuele Poppi
,
Sara Sarto
,
Marcella Cornia
,
Lorenzo Baraldi
,
Rita Cucchiara
Trending
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media
Prakash L. Kharvi
JavaScript: Designing a Language in 10 Days
Charles Severance
What Is the Blockchain?
Massimo Di Pierro
zk-AuthFeed: Protecting Data Feed to Smart Contracts With Authenticated Zero Knowledge Proof
Zhiguo Wan
, +2 more
InfoGCN++: Learning Representation by Predicting the Future for Online Skeleton-Based Action Recognition
Seunggeun Chi
, +3 more
Search By Popular Terms
accessibility
ai
autonomous vehicles
big data
blockchain
cyberthreats
cyber-physical systems
hpc / high performance computing / supercomputing
iot
language processing
Libraries and Institutions
Bring top computing research to your institution.
Learn More
Authors
Write academic, technical, and industry research papers in computing.
Learn More
Researchers
Browse our academic journals for the latest in computing research.
Learn More