Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
My Subscriptions
Browse Content
Resources
All
Your New Research Discovery Platform
My Subscriptions
Browse Content
Resources
All
Advanced Search
Browse more than 966k articles on advanced computing topics
Magazines
Journals
Video Library
Conference Proceedings
Remote Access
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media
Prakash L. Kharvi
IEEE Security & Privacy, July-Aug. 2024
Popular
The Path to Autonomous Cyberdefense
Sean Oesch
, +6 more
IEEE Security & Privacy, Jan.-Feb. 2025
Popular
The History of Unigraphics, 1974–2001
Paul O. Sicking
, +2 more
IEEE Annals of the History of Computing, Oct.-Dec. 2024
Popular
Latest Articles
Understanding and Characterizing Communication Characteristics for Distributed Transformer Models
Full-text access may be available. Sign in or learn about subscription options.
by
Quentin Anthony
,
Benjamin Michalowicz
,
Jacob Hatef
,
Lang Xu
,
Mustafa Abduljabbar
,
Aamir Shafi
,
Hari Subramoni
,
Dhabaleswar K. DK Panda
MoCo: Fuzzing Deep Learning Libraries via Assembling Code
Full-text access may be available. Sign in or learn about subscription options.
by
Pin Ji
,
Yang Feng
,
Duo Wu
,
Lingyue Yan
,
Penglin Chen
,
Jia Liu
,
Zhihong Zhao
Puss in Boots: Formalizing Arm’s Virtual Memory System Architecture
Full-text access may be available. Sign in or learn about subscription options.
by
Jade Alglave
,
Richard Grisenthwaite
,
Artem Khyzha
,
Luc Maranget
,
Nikos Nikoleris
Hyper-IIoT: A Smart Contract-inspired Access Control Scheme for Resource-constrained Industrial Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
by
Dun Li
,
Hongzhi Li
,
Noel Crespi
,
Roberto Minerva
,
Ming Li
,
Wei Liang
,
Kuan-Ching Li
ByteTuning: Watermark Tuning for RoCEv2
Full-text access may be available. Sign in or learn about subscription options.
by
Lizhuang Tan
,
Zhuo Jiang
,
Kefei Liu
,
Haoran Wei
,
Pengfei Huo
,
Huiling Shi
,
Wei Zhang
,
Wei Su
DiffI2I: Efficient Diffusion Model for Image-to-Image Translation
Full-text access may be available. Sign in or learn about subscription options.
by
Bin Xia
,
Yulun Zhang
,
Shiyin Wang
,
Yitong Wang
,
Xinglong Wu
,
Yapeng Tian
,
Wenming Yang
,
Radu Timotfe
,
Luc Van Gool
In-situ data extraction for pathway analysis in an idealized atmosphere configuration of E3SM
Full-text access may be available. Sign in or learn about subscription options.
by
Andrew Steyer
,
Luca Bertagna
,
Graham Harper
,
Jerry Watkins
,
Irina Tezaur
,
Diana Bull
Heterogeneous Social Event Detection via Hyperbolic Graph Representations
Full-text access may be available. Sign in or learn about subscription options.
by
Zitai Qiu
,
Jia Wu
,
Jian Yang
,
Xing Su
,
Charu Aggarwal
“It’s time. Time for digital security.”: An End User Study on Actionable Security and Privacy Advice
Full-text access may be available. Sign in or learn about subscription options.
by
Anna Lena Rotthaler
,
Harshini Sri Ramulu
,
Lucy Simko
,
Sascha Fahl
,
Yasemin Acar
Node-Wise Hardware Trojan Detection Based on Graph Learning
Freely available from IEEE.
by
Kento Hasegawa
,
Kazuki Yamashita
,
Seira Hidano
,
Kazuhide Fukushima
,
Kazuo Hashimoto
,
Nozomu Togawa
Trending
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media
Prakash L. Kharvi
The Path to Autonomous Cyberdefense
Sean Oesch
, +6 more
The History of Unigraphics, 1974–2001
Paul O. Sicking
, +2 more
The Rise of Cybercrime and Cyber-Threat Intelligence: Perspectives and Challenges From Law Enforcement
Giuseppe Cascavilla
CausalFormer: An Interpretable Transformer for Temporal Causal Discovery
Lingbai Kong
, +5 more
Search By Popular Terms
accessibility
ai
autonomous vehicles
big data
blockchain
cyberthreats
cyber-physical systems
hpc / high performance computing / supercomputing
iot
language processing
Libraries and Institutions
Bring top computing research to your institution.
Learn More
Authors
Write academic, technical, and industry research papers in computing.
Learn More
Researchers
Browse our academic journals for the latest in computing research.
Learn More