|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 307 occurrences of 218 keywords
|
|
|
Results
Found 1875 publication records. Showing 1875 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
26 | Sarah Ita Levitan, Angel Maredia, Julia Hirschberg |
Linguistic Cues to Deception and Perceived Deception in Interview Dialogues. |
NAACL-HLT |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Mohamed Abouelenien, Rada Mihalcea, Mihai Burzo |
Analyzing Thermal and Visual Clues of Deception for a Non-Contact Deception Detection Approach. |
PETRA |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Jiang Wu, Lina Zhou |
DOBNet: exploiting the discourse of deception behaviour to uncover online deception strategies. |
Behav. Inf. Technol. |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben S. Schmoker, Alexander W. Tsow |
Cyber Denial, Deception and Counter Deception - A Framework for Supporting Active Cyber Defense |
|
2015 |
DOI RDF |
|
26 | Jeffrey Gainer Proudfoot, Jeffrey L. Jenkins, Judee K. Burgoon, Jay F. Nunamaker Jr. |
Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews. |
ISI |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Sarah Ita Levitan, Guozhen An, Mandi Wang, Gideon Mendels, Julia Hirschberg, Michelle Levine, Andrew Rosenberg |
Cross-Cultural Production and Detection of Deception from Speech. |
WMDD@ICMI |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Barbara Diana, Massimiliano Elia, Valentino Zurloni, Annibale Elia, Alessandro Maisto, Serena Pelosi |
Multimodal Deception Detection: A t-pattern Approach. |
WMDD@ICMI |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Krystian Radlak, Maciej Bozek, Bogdan Smolka |
Silesian Deception Database: Presentation and Analysis. |
WMDD@ICMI |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Yanjuan Yang, Michael V. Mannino |
An experimental comparison of real and artificial deception using a deception generation model. |
Decis. Support Syst. |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Christie M. Fuller, Kent Marett, Douglas P. Twitchell |
An Examination of Deception in Virtual Teams: Effects of Deception on Task Performance, Mutuality, and Trust. |
IEEE Trans. Prof. Commun. |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Yanjuan Yang, Michael V. Mannino |
An Experimental Comparison of a Document Deception Detection Policy using Real and Artificial Deception. |
ACM J. Data Inf. Qual. |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Victoria L. Rubin |
On deception and deception detection: Content analysis of computer-mediated stated beliefs. |
ASIST |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Tamilla Mavlanova, Raquel Benbunan-Fich, Nanda Kumar |
Deception Tactics and Counterfeit Deception in Online Environments. |
ICIS |
2008 |
DBLP BibTeX RDF |
|
25 | Christie M. Fuller, David P. Biros, Dursun Delen |
Exploration of Feature Selection and Advanced Classification Models for High-Stakes Deception Detection. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Neil C. Rowe |
Finding Logically Consistent Resource-Deception Plans for Defense in Cyberspace. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Christie M. Fuller, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr., Steven Coulon |
Detecting Deception in Person-of-Interest Statements. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Hsinchun Chen, Homa Atabakhsh, Jennifer Jie Xu 0001, Alan Gang Wang, Byron Marshall, Siddharth Kaza, Chunju Tseng, Shauna Eggers, Hemanth Gowda, Tim Petersen, Chuck Violette |
Coplink center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research. |
DG.O |
2005 |
DBLP BibTeX RDF |
identity matching, data mining, social network analysis, law enforcement, homeland security |
25 | Kent Marett, Joey F. George |
Group Deception in Computer-Supported Environments. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Randall J. Boyle, Cynthia P. Ruppel |
The Impact of Media Richness, Suspicion, and Perceived Truth Bias on Deception Detection. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Joey F. George, Kent Marett, Patti Tilley |
Deception Detection under Varying Electronic Media and Warning Conditions. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Tiantian Qin, Judee K. Burgoon, Jay F. Nunamaker Jr. |
An Exploratory Study on Promising Cues in Deception Detection and Application of Decision Tree. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Yuqing Mai, Radhika Upadrashta, Xiao Su |
J-Honeypot: A Java-Based Network Deception Tool with Monitoring and Intrusion Detection. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Lina Zhou, Douglas P. Twitchell, Tiantian Qin, Judee K. Burgoon, Jay F. Nunamaker Jr. |
An Exploratory Study into Deception Detection in Text-Based Computer-Mediated Communication. |
HICSS |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Judee K. Burgoon, J. P. Blair, Tiantian Qin, Jay F. Nunamaker Jr. |
Detecting Deception through Linguistic Analysis. |
ISI |
2003 |
DBLP DOI BibTeX RDF |
|
25 | James Bret Michael |
On the Response Policy of Software Decoys: Conducting Software-Based Deception in the Cyber Battlespace. |
COMPSAC |
2002 |
DBLP DOI BibTeX RDF |
|
25 | K. Suzanne Barber, Karen Fullam, Joonoo Kim |
Challenges for Trust, Fraud and Deception Research in Multi-agent Systems. |
Trust, Reputation, and Security |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Ian Fette, Norman M. Sadeh, Anthony Tomasic |
Learning to detect phishing emails. |
WWW |
2007 |
DBLP DOI BibTeX RDF |
semantic attacks, learning, filtering, spam, email, phishing |
24 | Subramanian Appavu, Ramasamy Rajaram |
Association Rule Mining for Suspicious Email Detection: A Data Mining Approach. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Wanita Sherchan, Seng Wai Loke, Shonali Krishnaswamy |
A fuzzy model for reasoning about reputation in web services. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
rationale inference, web services, reputation |
24 | Yun-qiang Li |
The Deceptive Degree of the Objective Function. |
FOGA |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Christian Wagner 0001, Rachael Kwai Fun Ip, Karen S. K. Cheung, Fion S. L. Lee |
Deceptive Communication in Virtual Communities. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Jeffrey T. Hancock, Lauren Curry, Saurabh Goorha, Michael Woodworth |
Automated Linguistic Analysis of Deceptive and Truthful Synchronous Computer-Mediated Communication. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Michael Woodworth, Jeffrey T. Hancock, Saurabh Goorha |
The Motivational Enhancement Effect: Implications for our Chosen Modes of Communication in the 21st Century. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
24 | P. S. Keila, David B. Skillicorn |
Detecting unusual email communication. |
CASCON |
2005 |
DBLP BibTeX RDF |
|
24 | Joey F. George, John R. Carlson |
Group Support Systems and Deceptive Communication. |
HICSS |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Shigeo Matsubara, Makoto Yokoo |
Negotiations with Inaccurate Payoff Values. |
ICMAS |
1998 |
DBLP DOI BibTeX RDF |
|
24 | Anil Menon, Kishan Mehrotra, Chilukuri K. Mohan, Sanjay Ranka |
A Probabilistic Database Approach to the Analysis of Genetic Algorithms. |
PPSN |
1996 |
DBLP DOI BibTeX RDF |
|
24 | Gustavus J. Simmons |
Cryptanalysis and Protocol Failures (abstract). |
CCS |
1993 |
DBLP DOI BibTeX RDF |
|
24 | Reihaneh Safavi-Naini, Leonid M. Tombak |
Optimal Authentication Systems. |
EUROCRYPT |
1993 |
DBLP DOI BibTeX RDF |
|
19 | Kazunori Terada, Akira Ito |
Can a robot deceive humans? |
HRI |
2010 |
DBLP DOI BibTeX RDF |
intention attribution, deception, theory of mind |
19 | Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo |
Automating the injection of believable decoys to detect snooping. |
WISEC |
2010 |
DBLP DOI BibTeX RDF |
decoys, honeyflow, honeytoken, trap-based defense, deception, traffic generation |
19 | Rosalind W. Picard |
Robots with emotional intelligence. |
HRI |
2009 |
DBLP DOI BibTeX RDF |
empathic technology, prosody analysis, affective computing, system, emotion recognition, autism, facial expression recognition, emotional intelligence, deception detection, physiological sensing |
19 | Ephraim Nissan |
Nested Beliefs, Goals, Duties, and Agents Reasoning About their Own or Each Other's Body in the TIMUR Model: A Formalism for the Narrative of Tamerlane and the Three Painters. |
J. Intell. Robotic Syst. |
2008 |
DBLP DOI BibTeX RDF |
Nested beliefs, Belief ascription, Duties, Social hierarchy, Episodic formulae, TIMUR model, Narrative, Goals, Deception, Embodied agents, Penalty |
19 | Michael Voong |
Mobile location-based awareness and connectedness. |
BCS HCI (2) |
2008 |
DBLP DOI BibTeX RDF |
mobile, location, design guidelines, deception, social awareness, connectedness, experience sampling |
19 | James Caverlee, Ling Liu 0001, Steve Webb |
Socialtrust: tamper-resilient trust establishment in online communities. |
JCDL |
2008 |
DBLP DOI BibTeX RDF |
social networks, trust, web 2.0, spam, deception, myspace |
19 | Jeffrey T. Hancock, Catalina L. Toma, Kate Fenner |
I know something you don't: the use of asymmetric personal information for interpersonal advantage. |
CSCW |
2008 |
DBLP DOI BibTeX RDF |
interpersonal attration, computer-mediated communication, social networking sites, deception |
19 | Panagiotis Tsiamyrtzis, Jonathan Dowdall, Dvijesh J. Shastri, Ioannis T. Pavlidis, M. G. Frank, P. Ekman |
Imaging Facial Physiology for the Detection of Deceit. |
Int. J. Comput. Vis. |
2007 |
DBLP DOI BibTeX RDF |
polygraph, thermography, facial tracking, contact-free physiological monitoring, deception detection |
19 | Michel François Valstar, Hatice Gunes, Maja Pantic |
How to distinguish posed from spontaneous smiles using geometric features. |
ICMI |
2007 |
DBLP DOI BibTeX RDF |
multimodal video processing, human information processing, deception detection |
19 | Gwen Littlewort, Marian Stewart Bartlett, Kang Lee |
Faces of pain: automated measurement of spontaneousallfacial expressions of genuine and posed pain. |
ICMI |
2007 |
DBLP DOI BibTeX RDF |
spontaneous behavior, machine learning, computer vision, facial expression recognition, deception, facial action coding system, FACS, pain |
19 | Hsinchun Chen, Homa Atabakhsh, Siddharth Kaza, Byron Marshall, Jennifer Jie Xu 0001, G. Alan Wang, Tim Petersen, Chuck Violette |
BorderSafe: cross-jurisdictional information sharing, analysis, and visualization. |
DG.O |
2005 |
DBLP BibTeX RDF |
criminal network analysis, critical infrastructure protection, deception detection |
13 | Wei Yu, Deqing Huang, Pengfei Sun, Qingyuan Wang 0001 |
Sliding Mode Control for High-Speed Train via Event-Triggered Strategy Under Energy-Limited Deception Attacks. |
IEEE Trans. Veh. Technol. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Cristina Torrecillas, Carmen Zarzuelo, Jorge de la Fuente, Bismarck Jigena-Antelo, Gonçalo Prates |
Evaluation and Modelling of the Coastal Geomorphological Changes of Deception Island since the 1970 Eruption and Its Involvement in Research Activity. |
Remote. Sens. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Qiang Li 0032, Yumei Guo, Peng Zhang, Hong Xu 0010, Linrang Zhang, Zhanye Chen, Yan Huang 0018 |
Deception Velocity-Based Method to Discriminate Physical Targets and Active False Targets in a Multistatic Radar System. |
Remote. Sens. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Alejandro Corbea-Pérez, Carmen Recondo, Javier F. Calleja |
Improvements in the Estimation of Air Temperature with Empirical Models on Livingston and Deception Islands in Maritime Antarctica (2000-2016) Using C6 MODIS LST. |
Remote. Sens. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Javier F. Calleja, Rubén Muñiz, Jaime Otero, Francisco J. Navarro, Alejandro Corbea-Pérez, Carleen Reijmer, Miguel Ángel de Pablo, Susana Fernández |
Spatiotemporal Evolution of the Land Cover over Deception Island, Antarctica, Its Driving Mechanisms, and Its Impact on the Shortwave Albedo. |
Remote. Sens. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Jianyuan Li, Pei Wang, Hongxi Zhang, Chao Luo, Zhenning Li, Yihai Wei |
A Novel Chaotic-NLFM Signal under Low Oversampling Factors for Deception Jamming Suppression. |
Remote. Sens. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Ning Zhao 0002, Yongjie Tian, Huiyan Zhang, Enrique Herrera-Viedma |
Fuzzy-based adaptive event-triggered control for nonlinear cyber-physical systems against deception attacks via a single parameter learning method. |
Inf. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Myoung-Ho Chae, Seong-Ook Park, Seung-Ho Choi, Chae-Taek Choi |
Reinforcement Learning-Based Counter Fixed-Wing Drone System Using GNSS Deception. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Joelle Kabdjou, Norihiko Shinomiya |
Improving Quality of Service and HTTPS DDoS Detection in MEC Environment With a Cyber Deception-Based Architecture. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yingjie Fan 0003, Xia Huang, Zhen Wang 0008 |
Memory-Dependent Event-Trigger Scheme for Secure Control of Memristive Neural Networks: Dealing With Deception Attacks. |
IEEE Trans. Ind. Informatics |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Lexin Chen, Shaocheng Tong |
Observer-Based Adaptive Fuzzy Consensus Control of Nonlinear Multiagent Systems Encountering Deception Attacks. |
IEEE Trans. Ind. Informatics |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Chong Zhang, Luoyi Fu, Jiaxin Ding, Xinde Cao, Fei Long, Xinbing Wang, Lei Zhou, Jing Zhang, Chenghu Zhou |
Community Deception in Large Networks: Through the Lens of Laplacian Spectrum. |
IEEE Trans. Comput. Soc. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Valeria Fionda, Giuseppe Pirrò |
Community Deception in Attributed Networks. |
IEEE Trans. Comput. Soc. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Saif Aldeen Madi, Giuseppe Pirrò |
Node-Centric Community Deception Based on Safeness. |
IEEE Trans. Comput. Soc. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Katerina Papantoniou, Panagiotis Papadakos, Dimitris Plexousakis |
What Do LLMs Know about Deception in Text? |
ERCIM News |
2024 |
DBLP BibTeX RDF |
|
13 | Lili Li, Qingjun Guo, Bingqi Chen, Wei Yue 0001, Zhongchang Liu, Hong Sang |
Output regulation for switched systems via dual distributed event-triggered mechanisms under multiple deception attacks. |
Appl. Math. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Xinyu Fang, Mengmeng Li, Shaoran Wang, Xia Ai, Weidong Wang, Jiaqi Liu, Dazhi Ding |
EM Scattering Center Model-Guided Passive SAR Deception Using Diverse Frequency Time-Modulation. |
IEEE Trans. Geosci. Remote. Sens. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Hao Lin, Mengdao Xing, Yishan Lou, Zhihao Wang, Tinghao Zhang, Guangcai Sun |
Research on Anti-Deception Forwarding Interference of Squint Azimuth Multichannel SAR. |
IEEE Trans. Geosci. Remote. Sens. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Giuseppe Pirrò |
Community Deception From a Node-Centric Perspective. |
IEEE Trans. Netw. Sci. Eng. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Mingyang Tian, Chunmei Duan |
Event-triggered control for uncertain delayed neural networks with actuator saturation against deception attack. |
Int. J. Control |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Wenhai Qi, Wendi Tan, Ju H. Park 0001, Zheng-Guang Wu, Huaicheng Yan 0001 |
Finite-Time Self-Triggered Stabilization for Networked Power System With Deception Attacks. |
IEEE Trans. Circuits Syst. II Express Briefs |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yahui Gao, Ben Niu 0003, Wendi Chen, Huanqing Wang, Chaoxu Mu, Guoxing Wen 0001 |
Adaptive Control of Constrained Nonlinear CPSs Under Deception Attacks Through Sensor and Actuator Networks. |
IEEE Trans. Circuits Syst. II Express Briefs |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Meijie Zhang, Yaping Sun, Xinsong Yang, Ju H. Park 0001 |
Secure State Estimation of Singularly Perturbed Switched Systems With Output Deception Attack via Discretized LKF Approach. |
IEEE Trans. Circuits Syst. II Express Briefs |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Wen-Di Chen, Yuan-Xin Li 0001, Lei Liu 0006, Xu-Dong Zhao 0001, Ben Niu 0003, Li-Min Han |
Nussbaum-Based Adaptive Fault-Tolerant Control for Nonlinear CPSs With Deception Attacks: A New Coordinate Transformation Technology. |
IEEE Trans. Cybern. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Qingchen Liu, Jie Wang 0047, Yuqing Ni, Cong Zhang, Ling Shi, Jiahu Qin |
Performance analysis for cyber-physical systems under two types of stealthy deception attacks. |
Autom. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Cong Zhang, Jiahu Qin, Chengzhen Yan, Yang Shi, Yaonan Wang 0001, Man Li 0002 |
Towards invariant extended Kalman filter-based resilient distributed state estimation for moving robots over mobile sensor networks under deception attacks. |
Autom. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Jingshi Yao, Shaoyuan Li, Xiang Yin 0003 |
Sensor deception attacks against security in supervisory control systems. |
Autom. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Phil Laplante |
Deception and Intuition in Software Engineering. |
Computer |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Xiang Zhang, Wei Xie, Rui Gao, Weidong Zhang 0004 |
Finite-Time H∞ Filtering for Markov Jump Systems Under Deception Attacks and Delays. |
IEEE Trans. Syst. Man Cybern. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Fanghui Li, Zhongsheng Hou |
Event-Triggered Model-Free Adaptive Predictive Control for Networked Control Systems Under Deception Attacks. |
IEEE Trans. Syst. Man Cybern. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Xinjun Wang, Ye Cao, Guangdeng Zong, Huanqing Wang, Ben Niu 0003 |
Resilient Adaptive Intermittent Control of Nonlinear Systems Under Deception Attacks. |
IEEE Trans. Syst. Man Cybern. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Da-Wei Zhang, Guo-Ping Liu 0003 |
Predictive Sliding-Mode Control for Networked High-Order Fully Actuated Multiagents Under Random Deception Attacks. |
IEEE Trans. Syst. Man Cybern. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Zhenzhen Pan, Ronghu Chi, Zhongsheng Hou |
Distributed Model-Free Adaptive Predictive Control for MIMO Multi-Agent Systems With Deception Attack. |
IEEE Trans. Signal Inf. Process. over Networks |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Bo Wei, Teng Huang, Xi Zhang, Jiaming Liang, Yunhao Li, Cong Cao, Dan Li, Yongfeng Chen, Huagang Xiong, Feng Jiang, Xiqiu Zhang |
Cam-PC: A Novel Method for Camouflaging Point Clouds to Counter Adversarial Deception in Remote Sensing. |
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Aswathy Velutharambath, Amelie Wührl, Roman Klinger |
Can Factual Statements be Deceptive? The DeFaBel Corpus of Belief-based Deception. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Zhongjie Ba, Qingyu Liu, Zhenguang Liu, Shuang Wu, Feng Lin, Li Lu, Kui Ren 0001 |
Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Orson Mengara |
The Art of Deception: Robust Backdoor Attack using Dynamic Stacking of Triggers. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Tao Li, Quanyan Zhu |
Symbiotic Game and Foundation Models for Cyber Deception Operations in Strategic Cyber Warfare. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Rakesh M. Verma, Nachum Dershowitz, Victor Zeng, Dainis Boumber, Xuting Liu |
Domain-Independent Deception: A New Taxonomy and Linguistic Analysis. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Pedro Beltran Lopez, Pantaleone Nespoli, Manuel Gil Pérez |
Cyber Deception Reactive: TCP Stealth Redirection to On-Demand Honeypots. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Sohail Ahmed Khan, Duc-Tien Dang-Nguyen |
CLIPping the Deception: Adapting Vision-Language Models for Universal Deepfake Detection. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Christian Tarsney |
Deception and Manipulation in Generative AI. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Wenbing Tang 0001, Yuan Zhou 0005, Yang Liu 0003, Zuohua Ding, Jing Liu 0012 |
Robust Motion Planning for Multi-Robot Systems Against Position Deception Attacks. |
IEEE Trans. Inf. Forensics Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Ni Yang, Ruiyi Gao, Youzhi Feng, Huan Su |
Event-Triggered Impulsive Control for Complex Networks Under Stochastic Deception Attacks. |
IEEE Trans. Inf. Forensics Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yong Zhao, Jiaxin Luo, Weihai Zhang, Xiangyun Lin |
Asynchronous Finite-Time Exponential Dissipative Filtering for Stochastic Fuzzy Markov Jump Systems Against Deception Attacks Based on Event-Triggered Scheme. |
Int. J. Fuzzy Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Tom Meurs, Edward J. Cartwright, Anna Cartwright 0001, Marianne Junger, Abhishta Abhishta |
Deception in double extortion ransomware attacks: An analysis of profitability and credibility. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Ji-Jing Lu, Xiao-Heng Chang |
Mixed H∞ and passive resilient control for discrete-time systems with Round-Robin protocol and deception attacks. |
Trans. Inst. Meas. Control |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Tu Zhang, Guobao Zhang, Yongming Huang |
Secure iterative interval estimation method for cyber-physical systems subject to stealthy deception attacks. |
Trans. Inst. Meas. Control |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Huawei Tao, Hang Yu, Man Liu, Hongliang Fu, Chunhua Zhu, Yue Xie |
A semi-supervised high-quality pseudo labels algorithm based on multi-constraint optimization for speech deception detection. |
Comput. Speech Lang. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Zhengle Zhang, Tiedong Ma, Xiaojie Su, Xiaoyu Ma |
Impulsive Consensus of One-Sided Lipschitz Multi-Agent Systems With Deception Attacks and Stochastic Perturbation. |
IEEE Trans. Artif. Intell. |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 1875 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|