Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
My Subscriptions
Browse Content
Resources
All
Your New Research Discovery Platform
My Subscriptions
Browse Content
Resources
All
Advanced Search
Browse more than 981k articles on advanced computing topics
Magazines
Journals
Video Library
Conference Proceedings
Remote Access
Evaluating the Effectiveness of Memory Safety Sanitizers
Emanuel Q. Vintila
, +2 more
2025 IEEE Symposium on Security and Privacy (SP), 2025
Popular
Generative AI in Software Development: Challenges, Opportunities, and New Paradigms for Quality Assurance
F. Muratovic
, +2 more
Computer, July 2025
Popular
Excel Isn’t a Process, and Not All ‘Intelligence’ Is Smart
Sahar Tahvili
, +1 more
IEEE Software, July-Aug. 2025
Popular
Latest Articles
Knowledge Transfer Service for Multi-Granular Traffic Prediction in Smart Cities
Full-text access may be available. Sign in or learn about subscription options.
by
Jiqian Mo
,
Junyang Chen
,
Zhiguo Gong
Ethics-driven Incentives: Supporting Government Policies for Responsible AI Innovation
Full-text access may be available. Sign in or learn about subscription options.
by
Maria Teresa Baldassarre
,
Danilo Caivano
,
Berenice Fernández Nieto
,
Azzurra Ragone
Fidelity-Aware Inference Services in DT-Assisted Edge Computing via Service Model Retraining
Full-text access may be available. Sign in or learn about subscription options.
by
Xuan Ai
,
Weifa Liang
,
Yuncan Zhang
,
Wenzheng Xu
Cyberphysical Systems in Control: Risks of Digital Transformation
Full-text access may be available. Sign in or learn about subscription options.
by
Dimitrios Serpanos
,
Panayotis Antoniadis
GLAMP: Generative Learning for Adversarially-Robust Malware Prediction
Full-text access may be available. Sign in or learn about subscription options.
by
Saurabh Kumar
,
Cristian Molinaro
,
Lirika Sola
,
V.S. Subrahmanian
Bridging the Gap Between Engineering and Cybersecurity to Better Protect Critical Infrastructures
Full-text access may be available. Sign in or learn about subscription options.
by
Joseph Weiss
,
James Bret Michael
Verifiable E-Voting with a Trustless Bulletin Board
Full-text access may be available. Sign in or learn about subscription options.
by
Daniel Rausch
,
Nicolas Huber
,
Ralf Küsters
Data-Inflected Visions of Feminicide
Full-text access may be available. Sign in or learn about subscription options.
by
Helena Suárez Val
Denoising Neural Relation Extraction for Spatio-Temporal Recommendation System
Full-text access may be available. Sign in or learn about subscription options.
by
Ye Wang
,
Lihong Guo
,
Yang Yu
,
Yuan Gao
Cost-Sensitive Neighborhood Granularity Selection for Hierarchical Classification
Full-text access may be available. Sign in or learn about subscription options.
by
Shuai Li
,
Jie Yang
,
Huanan Bao
,
Deyou Xia
,
Qinghua Zhang
,
Guoyin Wang
Trending
Evaluating the Effectiveness of Memory Safety Sanitizers
Emanuel Q. Vintila
, +2 more
Generative AI in Software Development: Challenges, Opportunities, and New Paradigms for Quality Assurance
F. Muratovic
, +2 more
Excel Isn’t a Process, and Not All ‘Intelligence’ Is Smart
Sahar Tahvili
, +1 more
5t" ICSE workshop on component-based software engineering: benchmarks for predictable assembly
I. Crnkovic
, +3 more
Digital Privacy: Trends, Challenges, and the Future
Mohd Anuaruddin Ahmadon
, +8 more
Search By Popular Terms
accessibility
ai
autonomous vehicles
big data
blockchain
cyberthreats
cyber-physical systems
hpc / high performance computing / supercomputing
iot
language processing
Libraries and Institutions
Bring top computing research to your institution.
Learn More
Authors
Write academic, technical, and industry research papers in computing.
Learn More
Researchers
Browse our academic journals for the latest in computing research.
Learn More