首页 > 最新文献

IT Professional最新文献

英文 中文
Write a Winning Essay 撰写获奖论文
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-01 DOI: 10.1109/mitp.2024.3386236
{"title":"Write a Winning Essay","authors":"","doi":"10.1109/mitp.2024.3386236","DOIUrl":"https://doi.org/10.1109/mitp.2024.3386236","url":null,"abstract":"","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"33 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140833667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Computer Society Information 电气和电子工程师学会计算机协会信息
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-01 DOI: 10.1109/mitp.2024.3390193
{"title":"IEEE Computer Society Information","authors":"","doi":"10.1109/mitp.2024.3390193","DOIUrl":"https://doi.org/10.1109/mitp.2024.3390193","url":null,"abstract":"","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"185 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140833669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Computer Society Volunteer Service Awards 电气和电子工程师学会计算机协会志愿者服务奖
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-01 DOI: 10.1109/mitp.2024.3390191
{"title":"IEEE Computer Society Volunteer Service Awards","authors":"","doi":"10.1109/mitp.2024.3390191","DOIUrl":"https://doi.org/10.1109/mitp.2024.3390191","url":null,"abstract":"","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"17 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140833492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Security and Privacy IEEE 安全与隐私
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-01 DOI: 10.1109/mitp.2024.3388649
{"title":"IEEE Security and Privacy","authors":"","doi":"10.1109/mitp.2024.3388649","DOIUrl":"https://doi.org/10.1109/mitp.2024.3388649","url":null,"abstract":"","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"10 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140833545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Who’s Doing the Work? What C-Suites Should Know About Sourcing 谁在工作?首席执行官应了解的采购知识
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-01 DOI: 10.1109/mitp.2024.3375570
Stephen J. Andriole
Alternative sourcing models include insourcing, cosourcing, and outsourcing. Every C-Suite on the planet should understand the strengths, weaknesses, and appropriateness of each model. The major distinction is “brains” versus “brawn” where decisions must be made about what can be insourced, cosourced, and outsourced. The rule of thumb is to keep brains in house and leave the brawn to outsources, to keep strategy, innovation, and AI inhouse, and outsource operational requirements.
可供选择的外包模式包括内包、外包和外包。地球上的每一位首席执行官都应该了解每种模式的优缺点和适宜性。主要的区别在于 "大脑 "与 "体力",必须就哪些工作可以内包、外包和外包做出决定。经验法则是把大脑留在公司内部,把体力留给外包;把战略、创新和人工智能留在公司内部,把运营需求外包。
{"title":"Who’s Doing the Work? What C-Suites Should Know About Sourcing","authors":"Stephen J. Andriole","doi":"10.1109/mitp.2024.3375570","DOIUrl":"https://doi.org/10.1109/mitp.2024.3375570","url":null,"abstract":"Alternative sourcing models include insourcing, cosourcing, and outsourcing. Every C-Suite on the planet should understand the strengths, weaknesses, and appropriateness of each model. The major distinction is “brains” versus “brawn” where decisions must be made about what can be insourced, cosourced, and outsourced. The rule of thumb is to keep brains in house and leave the brawn to outsources, to keep strategy, innovation, and AI inhouse, and outsource operational requirements.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"57 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140833608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Data-Driven Classification Framework for Cybersecurity Breaches 数据驱动的网络安全漏洞分类框架
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-01 DOI: 10.1109/mitp.2024.3374096
Priyanka Rani, Abhijit Kumar Nag, Rifat Shahriyar
Unauthorized access to sensitive or confidential data results in a data breach, which can cause significant harm to an organization. Reporting breaches and reviewing prior records can help reduce damages. To aid in preparation, antivirus and security companies have published data breach reports, but they can be difficult to comprehend and require substantial effort to study. This article proposes a data breach incident classification framework using machine learning algorithms (naive Bayes, logistic regression, support vector machine, and random forest) on a dataset from the Privacy Rights Clearinghouse. The framework’s performance is evaluated using various metrics, including accuracy, F1 score, and confusion matrix. The article also employs topic modeling with latent Dirichlet allocation to enhance the classification’s accuracy.
未经授权访问敏感或机密数据会导致数据泄露,从而对组织造成重大损害。报告外泄事件和审查以前的记录有助于减少损失。为了帮助做好准备,杀毒软件和安全公司发布了数据泄露报告,但这些报告可能难以理解,需要花费大量精力进行研究。本文在隐私权信息交换所的数据集上使用机器学习算法(天真贝叶斯、逻辑回归、支持向量机和随机森林)提出了一个数据泄露事件分类框架。该框架的性能使用各种指标进行评估,包括准确率、F1 分数和混淆矩阵。文章还采用了潜在 Dirichlet 分配的主题建模来提高分类的准确性。
{"title":"A Data-Driven Classification Framework for Cybersecurity Breaches","authors":"Priyanka Rani, Abhijit Kumar Nag, Rifat Shahriyar","doi":"10.1109/mitp.2024.3374096","DOIUrl":"https://doi.org/10.1109/mitp.2024.3374096","url":null,"abstract":"Unauthorized access to sensitive or confidential data results in a data breach, which can cause significant harm to an organization. Reporting breaches and reviewing prior records can help reduce damages. To aid in preparation, antivirus and security companies have published data breach reports, but they can be difficult to comprehend and require substantial effort to study. This article proposes a data breach incident classification framework using machine learning algorithms (naive Bayes, logistic regression, support vector machine, and random forest) on a dataset from the Privacy Rights Clearinghouse. The framework’s performance is evaluated using various metrics, including accuracy, F1 score, and confusion matrix. The article also employs topic modeling with latent Dirichlet allocation to enhance the classification’s accuracy.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"32 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140833544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Computer Society D&I Fund 电气和电子工程师学会计算机协会 D&I 基金
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-01 DOI: 10.1109/mitp.2024.3375493
{"title":"IEEE Computer Society D&I Fund","authors":"","doi":"10.1109/mitp.2024.3375493","DOIUrl":"https://doi.org/10.1109/mitp.2024.3375493","url":null,"abstract":"","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"33 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140833710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Navigating the Landscape of Generative AI: Investment Trends, Industry Growth, and Economic Effects 领航生成式人工智能:投资趋势、行业增长和经济效应
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-01 DOI: 10.1109/mitp.2024.3375569
Nir Kshetri
This article examines investment trends and industry development in generative AI (GAI) while also evaluating its economic impact on diverse sectors and economies. It analyzes global variations across regions to provide comprehensive insights into the landscape of GAI adoption.
本文探讨了生成式人工智能(GAI)的投资趋势和行业发展,同时评估了其对不同行业和经济体的经济影响。文章分析了全球各地区的差异,对 GAI 的应用前景提供了全面的见解。
{"title":"Navigating the Landscape of Generative AI: Investment Trends, Industry Growth, and Economic Effects","authors":"Nir Kshetri","doi":"10.1109/mitp.2024.3375569","DOIUrl":"https://doi.org/10.1109/mitp.2024.3375569","url":null,"abstract":"This article examines investment trends and industry development in generative AI (GAI) while also evaluating its economic impact on diverse sectors and economies. It analyzes global variations across regions to provide comprehensive insights into the landscape of GAI adoption.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"64 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140834102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Drift Detection for Black-Box Deep Learning Models 黑盒深度学习模型的漂移检测
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-01 DOI: 10.1109/mitp.2023.3338007
Luca Piano, Fabio Garcea, Andrea Cavallone, Ignacio Aparicio Vazquez, Lia Morra, Fabrizio Lamberti
Dataset drift is a common challenge in machine learning, especially for models trained on unstructured data, such as images. In this article, we propose a new approach for the detection of data drift in black-box models, which is based on Hellinger distance and feature extraction methods. The proposed approach is aimed at detecting data drift without knowing the architecture of the model to monitor, the dataset on which it was trained, or both. The article analyzes three different use cases to evaluate the effectiveness of the proposed approach, encompassing a variety of tasks including document segmentation, classification, and handwriting recognition. The use cases considered for the drift are adversarial assaults, domain shifts, and dataset biases. The experimental results show the efficacy of our drift detection approach in identifying changes in distribution under various training settings.
数据集漂移是机器学习中的一个常见挑战,尤其是对于在非结构化数据(如图像)上训练的模型而言。在本文中,我们提出了一种检测黑盒模型数据漂移的新方法,它基于海灵格距离和特征提取方法。所提出的方法旨在检测数据漂移,而无需知道要监控的模型架构、训练模型的数据集或两者。文章分析了三种不同的用例,以评估所提方法的有效性,其中包括文档分割、分类和手写识别等多种任务。漂移考虑的用例包括对抗性攻击、领域转移和数据集偏差。实验结果表明,我们的漂移检测方法能在各种训练设置下有效识别分布变化。
{"title":"Drift Detection for Black-Box Deep Learning Models","authors":"Luca Piano, Fabio Garcea, Andrea Cavallone, Ignacio Aparicio Vazquez, Lia Morra, Fabrizio Lamberti","doi":"10.1109/mitp.2023.3338007","DOIUrl":"https://doi.org/10.1109/mitp.2023.3338007","url":null,"abstract":"Dataset drift is a common challenge in machine learning, especially for models trained on unstructured data, such as images. In this article, we propose a new approach for the detection of data drift in black-box models, which is based on Hellinger distance and feature extraction methods. The proposed approach is aimed at detecting data drift without knowing the architecture of the model to monitor, the dataset on which it was trained, or both. The article analyzes three different use cases to evaluate the effectiveness of the proposed approach, encompassing a variety of tasks including document segmentation, classification, and handwriting recognition. The use cases considered for the drift are adversarial assaults, domain shifts, and dataset biases. The experimental results show the efficacy of our drift detection approach in identifying changes in distribution under various training settings.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"1 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140833666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unveiling the Deepfake Dilemma: Framework, Classification, and Future Trajectories 揭开深度伪造的困境:框架、分类和未来轨迹
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-01 DOI: 10.1109/mitp.2024.3369948
Vishal Maniyal, Vijay Kumar
Deepfake is a type of artificial intelligence technology that makes use of deep learning to generate fake multimedia. A large number of images, audios, and videos have surfaced, particularly on social media, in which deepfake technology is used. This has raised concerns because it can be misleading or fraudulent media, can spread misinformation and propaganda, or potentially cause harm to individuals’ reputations. This article presents a comprehensive review of deepfake technology, focusing on its underlying principles and methodologies. The analysis highlights both the positive as well as negative implications of deepfake technology, shedding light on its potential benefits in filmmaking, digital art, and content creation, alongside its ethical and societal implications, including concerns about misinformation, privacy violations, and cyberthreats.
Deepfake 是一种利用深度学习生成虚假多媒体的人工智能技术。大量使用了 Deepfake 技术的图片、音频和视频浮出水面,尤其是在社交媒体上。这引起了人们的关注,因为它可能是误导性或欺诈性媒体,可能传播错误信息和宣传,也可能对个人声誉造成伤害。本文全面回顾了深度伪造技术,重点介绍了其基本原理和方法。分析强调了深度伪造技术的积极和消极影响,揭示了其在电影制作、数字艺术和内容创作方面的潜在优势,以及其道德和社会影响,包括对误导信息、侵犯隐私和网络威胁的担忧。
{"title":"Unveiling the Deepfake Dilemma: Framework, Classification, and Future Trajectories","authors":"Vishal Maniyal, Vijay Kumar","doi":"10.1109/mitp.2024.3369948","DOIUrl":"https://doi.org/10.1109/mitp.2024.3369948","url":null,"abstract":"Deepfake is a type of artificial intelligence technology that makes use of deep learning to generate fake multimedia. A large number of images, audios, and videos have surfaced, particularly on social media, in which deepfake technology is used. This has raised concerns because it can be misleading or fraudulent media, can spread misinformation and propaganda, or potentially cause harm to individuals’ reputations. This article presents a comprehensive review of deepfake technology, focusing on its underlying principles and methodologies. The analysis highlights both the positive as well as negative implications of deepfake technology, shedding light on its potential benefits in filmmaking, digital art, and content creation, alongside its ethical and societal implications, including concerns about misinformation, privacy violations, and cyberthreats.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"57 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140833925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IT Professional
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1