IT Professional最新文献

筛选
英文 中文
Write a Winning Essay 撰写获奖论文
IF 2.6 4区 计算机科学
IT Professional Pub Date : 2024-05-01 DOI: 10.1109/mitp.2024.3386236
{"title":"Write a Winning Essay","authors":"","doi":"10.1109/mitp.2024.3386236","DOIUrl":"https://doi.org/10.1109/mitp.2024.3386236","url":null,"abstract":"","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"33 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140833667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Computer Society Information 电气和电子工程师学会计算机协会信息
IF 2.6 4区 计算机科学
IT Professional Pub Date : 2024-05-01 DOI: 10.1109/mitp.2024.3390193
{"title":"IEEE Computer Society Information","authors":"","doi":"10.1109/mitp.2024.3390193","DOIUrl":"https://doi.org/10.1109/mitp.2024.3390193","url":null,"abstract":"","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"185 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140833669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Computer Society Volunteer Service Awards 电气和电子工程师学会计算机协会志愿者服务奖
IF 2.6 4区 计算机科学
IT Professional Pub Date : 2024-05-01 DOI: 10.1109/mitp.2024.3390191
{"title":"IEEE Computer Society Volunteer Service Awards","authors":"","doi":"10.1109/mitp.2024.3390191","DOIUrl":"https://doi.org/10.1109/mitp.2024.3390191","url":null,"abstract":"","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"17 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140833492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Security and Privacy IEEE 安全与隐私
IF 2.6 4区 计算机科学
IT Professional Pub Date : 2024-05-01 DOI: 10.1109/mitp.2024.3388649
{"title":"IEEE Security and Privacy","authors":"","doi":"10.1109/mitp.2024.3388649","DOIUrl":"https://doi.org/10.1109/mitp.2024.3388649","url":null,"abstract":"","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"10 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140833545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Who’s Doing the Work? What C-Suites Should Know About Sourcing 谁在工作?首席执行官应了解的采购知识
IF 2.6 4区 计算机科学
IT Professional Pub Date : 2024-05-01 DOI: 10.1109/mitp.2024.3375570
Stephen J. Andriole
{"title":"Who’s Doing the Work? What C-Suites Should Know About Sourcing","authors":"Stephen J. Andriole","doi":"10.1109/mitp.2024.3375570","DOIUrl":"https://doi.org/10.1109/mitp.2024.3375570","url":null,"abstract":"Alternative sourcing models include insourcing, cosourcing, and outsourcing. Every C-Suite on the planet should understand the strengths, weaknesses, and appropriateness of each model. The major distinction is “brains” versus “brawn” where decisions must be made about what can be insourced, cosourced, and outsourced. The rule of thumb is to keep brains in house and leave the brawn to outsources, to keep strategy, innovation, and AI inhouse, and outsource operational requirements.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"57 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140833608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Data-Driven Classification Framework for Cybersecurity Breaches 数据驱动的网络安全漏洞分类框架
IF 2.6 4区 计算机科学
IT Professional Pub Date : 2024-05-01 DOI: 10.1109/mitp.2024.3374096
Priyanka Rani, Abhijit Kumar Nag, Rifat Shahriyar
{"title":"A Data-Driven Classification Framework for Cybersecurity Breaches","authors":"Priyanka Rani, Abhijit Kumar Nag, Rifat Shahriyar","doi":"10.1109/mitp.2024.3374096","DOIUrl":"https://doi.org/10.1109/mitp.2024.3374096","url":null,"abstract":"Unauthorized access to sensitive or confidential data results in a data breach, which can cause significant harm to an organization. Reporting breaches and reviewing prior records can help reduce damages. To aid in preparation, antivirus and security companies have published data breach reports, but they can be difficult to comprehend and require substantial effort to study. This article proposes a data breach incident classification framework using machine learning algorithms (naive Bayes, logistic regression, support vector machine, and random forest) on a dataset from the Privacy Rights Clearinghouse. The framework’s performance is evaluated using various metrics, including accuracy, F1 score, and confusion matrix. The article also employs topic modeling with latent Dirichlet allocation to enhance the classification’s accuracy.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"32 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140833544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Computer Society D&I Fund 电气和电子工程师学会计算机协会 D&I 基金
IF 2.6 4区 计算机科学
IT Professional Pub Date : 2024-05-01 DOI: 10.1109/mitp.2024.3375493
{"title":"IEEE Computer Society D&I Fund","authors":"","doi":"10.1109/mitp.2024.3375493","DOIUrl":"https://doi.org/10.1109/mitp.2024.3375493","url":null,"abstract":"","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"33 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140833710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Navigating the Landscape of Generative AI: Investment Trends, Industry Growth, and Economic Effects 领航生成式人工智能:投资趋势、行业增长和经济效应
IF 2.6 4区 计算机科学
IT Professional Pub Date : 2024-05-01 DOI: 10.1109/mitp.2024.3375569
Nir Kshetri
{"title":"Navigating the Landscape of Generative AI: Investment Trends, Industry Growth, and Economic Effects","authors":"Nir Kshetri","doi":"10.1109/mitp.2024.3375569","DOIUrl":"https://doi.org/10.1109/mitp.2024.3375569","url":null,"abstract":"This article examines investment trends and industry development in generative AI (GAI) while also evaluating its economic impact on diverse sectors and economies. It analyzes global variations across regions to provide comprehensive insights into the landscape of GAI adoption.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"64 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140834102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Drift Detection for Black-Box Deep Learning Models 黑盒深度学习模型的漂移检测
IF 2.6 4区 计算机科学
IT Professional Pub Date : 2024-05-01 DOI: 10.1109/mitp.2023.3338007
Luca Piano, Fabio Garcea, Andrea Cavallone, Ignacio Aparicio Vazquez, Lia Morra, Fabrizio Lamberti
{"title":"Drift Detection for Black-Box Deep Learning Models","authors":"Luca Piano, Fabio Garcea, Andrea Cavallone, Ignacio Aparicio Vazquez, Lia Morra, Fabrizio Lamberti","doi":"10.1109/mitp.2023.3338007","DOIUrl":"https://doi.org/10.1109/mitp.2023.3338007","url":null,"abstract":"Dataset drift is a common challenge in machine learning, especially for models trained on unstructured data, such as images. In this article, we propose a new approach for the detection of data drift in black-box models, which is based on Hellinger distance and feature extraction methods. The proposed approach is aimed at detecting data drift without knowing the architecture of the model to monitor, the dataset on which it was trained, or both. The article analyzes three different use cases to evaluate the effectiveness of the proposed approach, encompassing a variety of tasks including document segmentation, classification, and handwriting recognition. The use cases considered for the drift are adversarial assaults, domain shifts, and dataset biases. The experimental results show the efficacy of our drift detection approach in identifying changes in distribution under various training settings.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"1 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140833666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unveiling the Deepfake Dilemma: Framework, Classification, and Future Trajectories 揭开深度伪造的困境:框架、分类和未来轨迹
IF 2.6 4区 计算机科学
IT Professional Pub Date : 2024-05-01 DOI: 10.1109/mitp.2024.3369948
Vishal Maniyal, Vijay Kumar
{"title":"Unveiling the Deepfake Dilemma: Framework, Classification, and Future Trajectories","authors":"Vishal Maniyal, Vijay Kumar","doi":"10.1109/mitp.2024.3369948","DOIUrl":"https://doi.org/10.1109/mitp.2024.3369948","url":null,"abstract":"Deepfake is a type of artificial intelligence technology that makes use of deep learning to generate fake multimedia. A large number of images, audios, and videos have surfaced, particularly on social media, in which deepfake technology is used. This has raised concerns because it can be misleading or fraudulent media, can spread misinformation and propaganda, or potentially cause harm to individuals’ reputations. This article presents a comprehensive review of deepfake technology, focusing on its underlying principles and methodologies. The analysis highlights both the positive as well as negative implications of deepfake technology, shedding light on its potential benefits in filmmaking, digital art, and content creation, alongside its ethical and societal implications, including concerns about misinformation, privacy violations, and cyberthreats.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"57 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140833925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信