Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
My Subscriptions
Browse Content
Resources
All
Your New Research Discovery Platform
My Subscriptions
Browse Content
Resources
All
Advanced Search
Browse more than 966k articles on advanced computing topics
Magazines
Journals
Video Library
Conference Proceedings
Remote Access
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media
Prakash L. Kharvi
IEEE Security & Privacy, July-Aug. 2024
Popular
The Path to Autonomous Cyberdefense
Sean Oesch
, +6 more
IEEE Security & Privacy, Jan.-Feb. 2025
Popular
The History of Unigraphics, 1974–2001
Paul O. Sicking
, +2 more
IEEE Annals of the History of Computing, Oct.-Dec. 2024
Popular
Latest Articles
Multitask Transformer for Cross-Corpus Speech Emotion Recognition
Full-text access may be available. Sign in or learn about subscription options.
by
Chung-Soo Ahn
,
Rajib Rana
,
Carlos Busso
,
Jagath C. Rajapakse
A Holistic Approach to Design Understanding Through Concept Explanation
Full-text access may be available. Sign in or learn about subscription options.
by
Hongzhou Fang
,
Yuanfang Cai
,
Ewan Tempero
,
Rick Kazman
,
Yu-Cheng Tu
,
Jason Lefever
,
Ernst Pisch
Blockchain-Empowered Cyber-Secure Federated Learning for Trustworthy Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
by
Ervin Moore
,
Ahmed Imteaj
,
Md Zarif Hossain
,
Shabnam Rezapour
,
M. Hadi Amini
Deep Reinforcement Learning-Based Joint Caching and Routing in AI-Driven Networks
Full-text access may be available. Sign in or learn about subscription options.
by
Meiyi Yang
,
Deyun Gao
,
Weiting Zhang
,
Dong Yang
,
Dusit Niyato
,
Hongke Zhang
,
Victor C. M. Leung
Empower New Code Citizens to Reflect and Communicate on Code Security
Full-text access may be available. Sign in or learn about subscription options.
by
Manuel Maarek
,
Daisy Abbott
,
Olga Chatzifoti
,
Ryan Shah
,
Sheung Chi Chan
,
Hans-Wolfgang Loidl
,
Robert J. Stewart
,
Jamie Iona Ferguson
,
Sandy Louchart
,
Shenando Stals
,
Lynne Baillie
Chained HotStuff Under Performance Attack
Full-text access may be available. Sign in or learn about subscription options.
by
Jianyu Niu
,
Minjie Wang
,
Fangyu Gai
,
Mohammad M. Jalalzai
,
Chen Feng
,
Yinqian Zhang
EEVS: Redeploying Discarded Smartphones for Economic and Ecological Drug Molecules Virtual Screening
Full-text access may be available. Sign in or learn about subscription options.
by
Ming Ling
,
Chuanzhao Zhang
,
Shidi Tang
,
Ruiqi Chen
,
Yanxiang Zhu
Software-Defined Number Formats for High-Speed Belief Propagation
Full-text access may be available. Sign in or learn about subscription options.
by
Amir Sabbagh Molahosseini
,
JunKyu Lee
,
Hans Vandierendonck
HeROsim: An Allocation and Scheduling Simulator for Evaluating Serverless Orchestration Policies
Full-text access may be available. Sign in or learn about subscription options.
by
Vincent Lannurien
,
Laurent d’Orazio
,
Olivier Barais
,
Stéphane Paquelet
,
Jalil Boukhobza
CARL: Cost-optimized Online Container Placement on VMs using Adversarial Reinforcement Learning
Full-text access may be available. Sign in or learn about subscription options.
by
Prathamesh Saraf Vinayak
,
Saswat Subhajyoti Mallick
,
Lakshmi Jagarlamudi
,
Anirban Chakraborty
,
Yogesh Simmhan
Trending
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media
Prakash L. Kharvi
The Path to Autonomous Cyberdefense
Sean Oesch
, +6 more
The History of Unigraphics, 1974–2001
Paul O. Sicking
, +2 more
The Rise of Cybercrime and Cyber-Threat Intelligence: Perspectives and Challenges From Law Enforcement
Giuseppe Cascavilla
CausalFormer: An Interpretable Transformer for Temporal Causal Discovery
Lingbai Kong
, +5 more
Search By Popular Terms
accessibility
ai
autonomous vehicles
big data
blockchain
cyberthreats
cyber-physical systems
hpc / high performance computing / supercomputing
iot
language processing
Libraries and Institutions
Bring top computing research to your institution.
Learn More
Authors
Write academic, technical, and industry research papers in computing.
Learn More
Researchers
Browse our academic journals for the latest in computing research.
Learn More