Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
My Subscriptions
Browse Content
Resources
All
Your New Research Discovery Platform
My Subscriptions
Browse Content
Resources
All
Advanced Search
Browse more than 981k articles on advanced computing topics
Magazines
Journals
Video Library
Conference Proceedings
Remote Access
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media
Prakash L. Kharvi
IEEE Security & Privacy, July-Aug. 2024
Popular
The File That Contained the Keys Has Been Removed: An Empirical Analysis of Secret Leaks in Cloud Buckets and Responsible Disclosure O...
Soufian El Yadmani
, +2 more
2025 IEEE Symposium on Security and Privacy (SP), 2025
Popular
Therac-25 Accidents: We Keep on Learning From Them
Natalia Silvis-Cividjian
Computer, Dec. 2024
Popular
Latest Articles
Pervasive Sensing to Correlate Vehicle Driving Behavior With City-Scale Traffic Dynamics
Full-text access may be available. Sign in or learn about subscription options.
by
Debasree Das
,
Shameek Bhattacharjee
,
Sandip Chakraborty
,
Bivas Mitra
,
Sajal K. Das
Breaking the Edge: Enabling Efficient Neural Network Inference on Integrated Edge Devices
Full-text access may be available. Sign in or learn about subscription options.
by
Feng Zhang
,
Chenyang Zhang
,
Jiawei Guan
,
Qiangjun Zhou
,
Kuangyu Chen
,
Xiao Zhang
,
Bingsheng He
,
Jidong Zhai
,
Xiaoyong Du
Toward Privacy-Respecting Service Robots
Full-text access may be available. Sign in or learn about subscription options.
by
Delphine Reinhardt
,
Archan Misra
Big Baggy Shorts: Recovering Data From Canada’s Telidon System
Freely available from IEEE.
by
John Durno
,
John Aycock
,
Alexandra Tenney
Advanced Defect Analysis with Self-supervised Pre-training and Knowledge Distillation
Full-text access may be available. Sign in or learn about subscription options.
by
Jing-Ming Guo
,
Lun-Da Yuan
,
Cian Huang
,
Yi-Chong Zeng
Impossibility Results for Post-Compromise Security in Real-World Communication Systems
Freely available from IEEE.
by
Cas Cremers
,
Niklas Medinger
,
Aurora Naska
Ultra-Fast Private Set Intersection from Efficient Oblivious Key-Value Stores
Full-text access may be available. Sign in or learn about subscription options.
by
Guowei Ling
,
Peng Tang
,
Fei Tang
,
Shifeng Sun
,
Shouling Ji
,
Weidong Qiu
Synthetic Privacy-Preserving Trajectories with Semantic-aware Dummies for Location-Based Services
Full-text access may be available. Sign in or learn about subscription options.
by
Haojun Huang
,
Hao Sun
,
Weimin Wu
,
Chen Wang
,
Wuwu Liu
,
Wang Miao
,
Geyong Min
Exploring the Privacy Protection Capabilities of Chinese Large Language Models
Full-text access may be available. Sign in or learn about subscription options.
by
Yuqi Yang
,
Xiaowen Huang
,
Jitao Sang
Follow-Me AI: Energy-Efficient User Interaction With Smart Environments
Freely available from IEEE.
by
Alaa Saleh
,
Praveen Kumar Donta
,
Roberto Morabito
,
Naser Hossein Motlagh
,
Sasu Tarkoma
,
Lauri Lovén
Trending
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media
Prakash L. Kharvi
The File That Contained the Keys Has Been Removed: An Empirical Analysis of Secret Leaks in Cloud Buckets and Responsible Disclosure Outcomes
Soufian El Yadmani
, +2 more
Therac-25 Accidents: We Keep on Learning From Them
Natalia Silvis-Cividjian
TSQP: Safeguarding Real-Time Inference for Quantization Neural Networks on Edge Devices
Yu Sun
, +4 more
Understanding the Efficacy of Phishing Training in Practice
Grant Ho
, +9 more
Search By Popular Terms
accessibility
ai
autonomous vehicles
big data
blockchain
cyberthreats
cyber-physical systems
hpc / high performance computing / supercomputing
iot
language processing
Libraries and Institutions
Bring top computing research to your institution.
Learn More
Authors
Write academic, technical, and industry research papers in computing.
Learn More
Researchers
Browse our academic journals for the latest in computing research.
Learn More
×
×