Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
My Subscriptions
Browse Content
Resources
All
Your New Research Discovery Platform
My Subscriptions
Browse Content
Resources
All
Advanced Search
Browse more than 981k articles on advanced computing topics
Magazines
Journals
Video Library
Conference Proceedings
Remote Access
Contextual Integrity, Explained: A More Usable Privacy Definition
Nathan Malkin
IEEE Security & Privacy, Jan.-Feb. 2023
Popular
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media
Prakash L. Kharvi
IEEE Security & Privacy, July-Aug. 2024
Popular
Quality of Low-Code/No-Code Development Platforms Through the Lens of ISO 25010:2023
Bilal Naqvi
, +3 more
Computer, March 2025
Popular
Latest Articles
Large-Scale Package Deliveries With Unmanned Aerial Vehicles Using Collective Learning
Freely available from IEEE.
by
Arun Narayanan
,
Evangelos Pournaras
,
Pedro H. J. Nardelli
A Primal-Dual Box-Constrained QP Pressure Poisson Solver With Topology-Aware Geometry-Inspired Aggregation AMG
Full-text access may be available. Sign in or learn about subscription options.
by
Tetsuya Takahashi
,
Christopher Batty
Reducing Paging and Exit Overheads in Intel SGX for Oblivious Conjunctive Keyword Search
Full-text access may be available. Sign in or learn about subscription options.
by
Qin Jiang
,
Saiyu Qi
,
Xu Yang
,
Yong Qi
,
Jianfeng Wang
,
Youshui Lu
,
Bochao An
,
Ee-Chien Chang
CuckooAttack: Towards Practical Backdoor Attack against Automatic Speech Recognition Systems
Full-text access may be available. Sign in or learn about subscription options.
by
Bowen Li
,
Yunjie Ge
,
Zheng Fang
,
Tao Wang
,
Lingchen Zhao
,
Quan Lu
,
Ning Jiang
,
Qian Wang
One-Spike SNN: Single-Spike Phase Coding With Base Manipulation for ANN-to-SNN Conversion Loss Minimization
Full-text access may be available. Sign in or learn about subscription options.
by
Sangwoo Hwang
,
Jaeha Kung
Detecting Compiler Error Recovery Defects via Program Mutation Exploration
Full-text access may be available. Sign in or learn about subscription options.
by
Yixuan Tang
,
Jingxuan Zhang
,
Xiaochen Li
,
Zhiqiu Huang
,
He Jiang
LogDLR: Unsupervised Cross-System Log Anomaly Detection Through Domain-Invariant Latent Representation
Full-text access may be available. Sign in or learn about subscription options.
by
Junwei Zhou
,
Shaowen Ying
,
Shulan Wang
,
Dongdong Zhao
,
Jianwen Xiang
,
Kaitai Liang
,
Peng Liu
Loci: Federated Continual Learning of Heterogeneous Tasks at Edge
Full-text access may be available. Sign in or learn about subscription options.
by
Yaxin Luopan
,
Rui Han
,
Qinglong Zhang
,
Xiaojiang Zuo
,
Chi Harold Liu
,
Guoren Wang
,
Lydia Y. Chen
TCAD Based Study of String Current Variability in 3D NAND Flash Memory
Full-text access may be available. Sign in or learn about subscription options.
by
Mrinmoy Mahapatra
,
Prathamesh Ganesh Kekarjawlekar
,
Akshay K.
Legal Aspects for Software Developers Interested in Generative AI Applications
Full-text access may be available. Sign in or learn about subscription options.
by
Steffen Herbold
,
Brian Valerius
,
Anamaria Mojica-Hanke
,
Isabella Lex
,
Joel Mittel
Trending
Contextual Integrity, Explained: A More Usable Privacy Definition
Nathan Malkin
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media
Prakash L. Kharvi
Quality of Low-Code/No-Code Development Platforms Through the Lens of ISO 25010:2023
Bilal Naqvi
, +3 more
LLM-Powered Low-Code/No-Code Data Analytics in Education and Workforce Development
Chen Zhong
, +2 more
Medical Education Metaverses (MedEd Metaverses): Opportunities, Use Case, and Guidelines
Yosra Magdi Mekki
, +3 more
Search By Popular Terms
accessibility
ai
autonomous vehicles
big data
blockchain
cyberthreats
cyber-physical systems
hpc / high performance computing / supercomputing
iot
language processing
Libraries and Institutions
Bring top computing research to your institution.
Learn More
Authors
Write academic, technical, and industry research papers in computing.
Learn More
Researchers
Browse our academic journals for the latest in computing research.
Learn More