Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
My Subscriptions
Browse Content
Resources
All
Your New Research Discovery Platform
My Subscriptions
Browse Content
Resources
All
Advanced Search
Browse more than 981k articles on advanced computing topics
Magazines
Journals
Video Library
Conference Proceedings
Remote Access
Contextual Integrity, Explained: A More Usable Privacy Definition
Nathan Malkin
IEEE Security & Privacy, Jan.-Feb. 2023
Popular
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media
Prakash L. Kharvi
IEEE Security & Privacy, July-Aug. 2024
Popular
Quality of Low-Code/No-Code Development Platforms Through the Lens of ISO 25010:2023
Bilal Naqvi
, +3 more
Computer, March 2025
Popular
Latest Articles
LogDLR: Unsupervised Cross-System Log Anomaly Detection Through Domain-Invariant Latent Representation
Full-text access may be available. Sign in or learn about subscription options.
by
Junwei Zhou
,
Shaowen Ying
,
Shulan Wang
,
Dongdong Zhao
,
Jianwen Xiang
,
Kaitai Liang
,
Peng Liu
Probabilistic Block Term Decomposition for the Modeling of Higher Order Arrays
Full-text access may be available. Sign in or learn about subscription options.
by
Jesper Løve Hinrich
,
Morten Mørup
Towards A Robust Group-level Emotion Recognition via Uncertainty-Aware Learning
Full-text access may be available. Sign in or learn about subscription options.
by
Qing Zhu
,
Qirong Mao
,
Jialin Zhang
,
Xiaohua Huang
,
Wenming Zheng
ReSup: Reliable Label Noise Suppression for Facial Expression Recognition
Full-text access may be available. Sign in or learn about subscription options.
by
Xiang Zhang
,
Yan Lu
,
Huan Yan
,
Jinyang Huang
,
Yu Gu
,
Yusheng Ji
,
Zhi Liu
,
Bin Liu
DPWatch: a Framework for Hardware-Based Differential Privacy Guarantees
Full-text access may be available. Sign in or learn about subscription options.
by
Pawan Kumar Sanjaya
,
Christina Giannoula
,
Ian Colbert
,
Ihab Amer
,
Mehdi Saeedi
,
Gabor Sines
,
Nandita Vijaykumar
A Semi-Automated Pipeline for the Creation of Virtual Fitting Room Experiences Featuring Motion Capture and Cloth Simulation
Full-text access may be available. Sign in or learn about subscription options.
by
Alberto Cannavò
,
Giacomo Offre
,
Fabrizio Lamberti
Hybrid Causal Feature Selection for Cancer Biomarker Identification From RNA-Seq Data
Full-text access may be available. Sign in or learn about subscription options.
by
Wenwei Xu
,
Hao Zhang
,
Yewei Xia
,
Yixin Ren
,
Jihong Guan
,
Shuigeng Zhou
FairCompass: Operationalizing Fairness in Machine Learning
Full-text access may be available. Sign in or learn about subscription options.
by
Jessica Liu
,
Huaming Chen
,
Jun Shen
,
Kim-Kwang Raymond Choo
Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions
Full-text access may be available. Sign in or learn about subscription options.
by
Mustafa Abdallah
,
Saurabh Bagchi
,
Shaunak D. Bopardikar
,
Kevin Chan
,
Xing Gao
,
Murat Kantarcioglu
,
Congmiao Li
,
Peng Liu
,
Quanyan Zhu
Constructing Rectilinear Steiner Minimum Tree with Conditional Generative Adversarial Network
Full-text access may be available. Sign in or learn about subscription options.
by
Kritanta Saha
,
Pritha Banerjee
,
Susmita Sur-Kolay
Trending
Contextual Integrity, Explained: A More Usable Privacy Definition
Nathan Malkin
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media
Prakash L. Kharvi
Quality of Low-Code/No-Code Development Platforms Through the Lens of ISO 25010:2023
Bilal Naqvi
, +3 more
Medical Education Metaverses (MedEd Metaverses): Opportunities, Use Case, and Guidelines
Yosra Magdi Mekki
, +3 more
Enhancing Virtual Reality Training Through Artificial Intelligence: A Case Study
Riccardo Giussani
, +4 more
Search By Popular Terms
accessibility
ai
autonomous vehicles
big data
blockchain
cyberthreats
cyber-physical systems
hpc / high performance computing / supercomputing
iot
language processing
Libraries and Institutions
Bring top computing research to your institution.
Learn More
Authors
Write academic, technical, and industry research papers in computing.
Learn More
Researchers
Browse our academic journals for the latest in computing research.
Learn More