Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
My Subscriptions
Browse Content
Resources
All
Your New Research Discovery Platform
My Subscriptions
Browse Content
Resources
All
Advanced Search
Browse more than 981k articles on advanced computing topics
Magazines
Journals
Video Library
Conference Proceedings
Remote Access
Contextual Integrity, Explained: A More Usable Privacy Definition
Nathan Malkin
IEEE Security & Privacy, Jan.-Feb. 2023
Popular
AI’s 10 to Watch for 2024
Jurgen Dix
, +1 more
IEEE Intelligent Systems, Jan.-Feb. 2025
Popular
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media
Prakash L. Kharvi
IEEE Security & Privacy, July-Aug. 2024
Popular
Latest Articles
LBDT: A Lightweight Blockchain-Based Data Trading Scheme in Internet of Vehicles Using Proof-of-Reputation
Full-text access may be available. Sign in or learn about subscription options.
by
Weilin Chen
,
Wei Yang
,
Mingjun Xiao
,
Lide Xue
,
Shaowei Wang
STDatav2: Accessing Efficient Black-Box Stealing for Adversarial Attacks
Full-text access may be available. Sign in or learn about subscription options.
by
Xuxiang Sun
,
Gong Cheng
,
Hongda Li
,
Chunbo Lang
,
Junwei Han
BackFillMe: An Energy and Performance Efficient Virtual Machine Scheduler for IaaS Datacenters
Full-text access may be available. Sign in or learn about subscription options.
by
Muhammad Zakarya
,
Lee Gillam
,
Mohammad Reza Chalak Qazani
,
Ayaz Ali Khan
,
Khaled Salah
,
Omer Rana
F-RDW: Redirected Walking With Forecasting Future Position
Full-text access may be available. Sign in or learn about subscription options.
by
Sang-Bin Jeon
,
Jaeho Jung
,
Jinhyung Park
,
In-Kwon Lee
NegCPARBP: Enhancing Privacy Protection for Cross-Project Aging-Related Bug Prediction Based on Negative Database
Full-text access may be available. Sign in or learn about subscription options.
by
Dongdong Zhao
,
Zhihui Liu
,
Fengji Zhang
,
Lei Liu
,
Jacky Wai Keung
,
Xiao Yu
Knowledge-Enhanced Program Repair for Data Science Code
Freely available from IEEE.
by
Shuyin Ouyang
,
Jie Zhang
,
Zeyu Sun
,
Albert Merono Penuela
Secure Federated Learning Across Heterogeneous Cloud and High-Performance Computing Resources: A Case Study on Federated Fine-Tuning of LLaMA 2
Freely available from IEEE.
by
Zilinghan Li
,
Shilan He
,
Pranshu Chaturvedi
,
Volodymyr Kindratenko
,
Eliu A. Huerta
,
Kibaek Kim
,
Ravi Madduri
Detection of Violent Content in Videos Using Attention-Augmented 3D Convolutional Networks
Full-text access may be available. Sign in or learn about subscription options.
by
Bhavyesh Sajja
,
Anurag Singh
Making Non-Overlapping Matters: An Unsupervised Alignment Enhanced Cross-Domain Cold-Start Recommendation
Full-text access may be available. Sign in or learn about subscription options.
by
Zihan Wang
,
Yonghui Yang
,
Le Wu
,
Richang Hong
,
Meng Wang
An Evolutionary Multitasking Algorithm for Efficient Multiobjective Recommendations
Full-text access may be available. Sign in or learn about subscription options.
by
Ye Tian
,
Luke Ji
,
Yiwei Hu
,
Haiping Ma
,
Le Wu
,
Xingyi Zhang
Trending
Contextual Integrity, Explained: A More Usable Privacy Definition
Nathan Malkin
AI’s 10 to Watch for 2024
Jurgen Dix
, +1 more
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media
Prakash L. Kharvi
A Survey on Neural Network Hardware Accelerators
Tamador Mohaidat
, +1 more
BEVFormer: Learning Bird’s-Eye-View Representation From LiDAR-Camera via Spatiotemporal Transformers
Zhiqi Li
, +7 more
Search By Popular Terms
accessibility
ai
autonomous vehicles
big data
blockchain
cyberthreats
cyber-physical systems
hpc / high performance computing / supercomputing
iot
language processing
Libraries and Institutions
Bring top computing research to your institution.
Learn More
Authors
Write academic, technical, and industry research papers in computing.
Learn More
Researchers
Browse our academic journals for the latest in computing research.
Learn More