|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 307 occurrences of 218 keywords
|
|
|
Results
Found 1875 publication records. Showing 1875 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
26 | Sarah Ita Levitan, Angel Maredia, Julia Hirschberg |
Linguistic Cues to Deception and Perceived Deception in Interview Dialogues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NAACL-HLT ![In: Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL-HLT 2018, New Orleans, Louisiana, USA, June 1-6, 2018, Volume 1 (Long Papers), pp. 1941-1950, 2018, Association for Computational Linguistics, 978-1-948087-27-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Mohamed Abouelenien, Rada Mihalcea, Mihai Burzo |
Analyzing Thermal and Visual Clues of Deception for a Non-Contact Deception Detection Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PETRA ![In: Proceedings of the 9th ACM International Conference on PErvasive Technologies Related to Assistive Environments, PETRA 2016, Corfu Island, Greece, June 29 - July 1, 2016, pp. 35, 2016, ACM, 978-1-4503-4337-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Jiang Wu, Lina Zhou |
DOBNet: exploiting the discourse of deception behaviour to uncover online deception strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Behav. Inf. Technol. ![In: Behav. Inf. Technol. 34(9), pp. 936-948, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben S. Schmoker, Alexander W. Tsow |
Cyber Denial, Deception and Counter Deception - A Framework for Supporting Active Cyber Defense ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2015 |
DOI RDF |
|
26 | Jeffrey Gainer Proudfoot, Jeffrey L. Jenkins, Judee K. Burgoon, Jay F. Nunamaker Jr. |
Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2015 IEEE International Conference on Intelligence and Security Informatics, ISI 2015, Baltimore, MD, USA, May 27-29, 2015, pp. 97-102, 2015, IEEE, 978-1-4799-9889-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Sarah Ita Levitan, Guozhen An, Mandi Wang, Gideon Mendels, Julia Hirschberg, Michelle Levine, Andrew Rosenberg |
Cross-Cultural Production and Detection of Deception from Speech. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WMDD@ICMI ![In: Proceedings of the 2015 ACM Workshop on Multimodal Deception Detection, WMDD@ICMI 2015, Seattle, Washington, USA, November 13, 2015, pp. 1-8, 2015, ACM, 978-1-4503-3987-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Barbara Diana, Massimiliano Elia, Valentino Zurloni, Annibale Elia, Alessandro Maisto, Serena Pelosi |
Multimodal Deception Detection: A t-pattern Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WMDD@ICMI ![In: Proceedings of the 2015 ACM Workshop on Multimodal Deception Detection, WMDD@ICMI 2015, Seattle, Washington, USA, November 13, 2015, pp. 21-28, 2015, ACM, 978-1-4503-3987-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Krystian Radlak, Maciej Bozek, Bogdan Smolka |
Silesian Deception Database: Presentation and Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WMDD@ICMI ![In: Proceedings of the 2015 ACM Workshop on Multimodal Deception Detection, WMDD@ICMI 2015, Seattle, Washington, USA, November 13, 2015, pp. 29-35, 2015, ACM, 978-1-4503-3987-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Yanjuan Yang, Michael V. Mannino |
An experimental comparison of real and artificial deception using a deception generation model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Decis. Support Syst. ![In: Decis. Support Syst. 53(3), pp. 543-553, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Christie M. Fuller, Kent Marett, Douglas P. Twitchell |
An Examination of Deception in Virtual Teams: Effects of Deception on Task Performance, Mutuality, and Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Prof. Commun. ![In: IEEE Trans. Prof. Commun. 55(1), pp. 20-35, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Yanjuan Yang, Michael V. Mannino |
An Experimental Comparison of a Document Deception Detection Policy using Real and Artificial Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM J. Data Inf. Qual. ![In: ACM J. Data Inf. Qual. 3(3), pp. 6:1-6:25, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Victoria L. Rubin |
On deception and deception detection: Content analysis of computer-mediated stated beliefs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIST ![In: Navigating Streams in an Information Ecosystem - Proceedings of the 73rd ASIS&T Annual Meeting, ASIST 2010, Pittsburgh, PA, USA, October 22-27, 2010, pp. 1-10, 2010, Wiley. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Tamilla Mavlanova, Raquel Benbunan-Fich, Nanda Kumar |
Deception Tactics and Counterfeit Deception in Online Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the International Conference on Information Systems, ICIS 2008, Paris, France, December 14-17, 2008, pp. 105, 2008, Association for Information Systems. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
25 | Christie M. Fuller, David P. Biros, Dursun Delen |
Exploration of Feature Selection and Advanced Classification Models for High-Stakes Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 80, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Neil C. Rowe |
Finding Logically Consistent Resource-Deception Plans for Defense in Cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 563-568, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Christie M. Fuller, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr., Steven Coulon |
Detecting Deception in Person-of-Interest Statements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 504-509, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Hsinchun Chen, Homa Atabakhsh, Jennifer Jie Xu 0001, Alan Gang Wang, Byron Marshall, Siddharth Kaza, Chunju Tseng, Shauna Eggers, Hemanth Gowda, Tim Petersen, Chuck Violette |
Coplink center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 2005 National Conference on Digital Government Research, DG.O 2005, Atlanta, Georgia, USA, May 15-18, 2005, pp. 112-113, 2005, Digital Government Research Center. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
identity matching, data mining, social network analysis, law enforcement, homeland security |
25 | Kent Marett, Joey F. George |
Group Deception in Computer-Supported Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Randall J. Boyle, Cynthia P. Ruppel |
The Impact of Media Richness, Suspicion, and Perceived Truth Bias on Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Joey F. George, Kent Marett, Patti Tilley |
Deception Detection under Varying Electronic Media and Warning Conditions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Tiantian Qin, Judee K. Burgoon, Jay F. Nunamaker Jr. |
An Exploratory Study on Promising Cues in Deception Detection and Application of Decision Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Yuqing Mai, Radhika Upadrashta, Xiao Su |
J-Honeypot: A Java-Based Network Deception Tool with Monitoring and Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 804-808, 2004, IEEE Computer Society, 0-7695-2108-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Lina Zhou, Douglas P. Twitchell, Tiantian Qin, Judee K. Burgoon, Jay F. Nunamaker Jr. |
An Exploratory Study into Deception Detection in Text-Based Computer-Mediated Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 36th Hawaii International Conference on System Sciences (HICSS-36 2003), CD-ROM / Abstracts Proceedings, January 6-9, 2003, Big Island, HI, USA, pp. 44, 2003, IEEE Computer Society, 0-7695-1874-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Judee K. Burgoon, J. P. Blair, Tiantian Qin, Jay F. Nunamaker Jr. |
Detecting Deception through Linguistic Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings, pp. 91-101, 2003, Springer, 3-540-40189-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
25 | James Bret Michael |
On the Response Policy of Software Decoys: Conducting Software-Based Deception in the Cyber Battlespace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 26th International Computer Software and Applications Conference (COMPSAC 2002), Prolonging Software Life: Development and Redevelopment, 26-29 August 2002, Oxford, England, Proceedings, pp. 957-962, 2002, IEEE Computer Society, 0-7695-1727-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
25 | K. Suzanne Barber, Karen Fullam, Joonoo Kim |
Challenges for Trust, Fraud and Deception Research in Multi-agent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trust, Reputation, and Security ![In: Trust, Reputation, and Security: Theories and Practice, AAMAS 2002 International Workshop, Bologna, Italy, July 15, 2002, Selected and Invited Papers, pp. 8-14, 2002, Springer, 3-540-00988-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Ian Fette, Norman M. Sadeh, Anthony Tomasic |
Learning to detect phishing emails. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May 8-12, 2007, pp. 649-656, 2007, ACM, 978-1-59593-654-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
semantic attacks, learning, filtering, spam, email, phishing |
24 | Subramanian Appavu, Ramasamy Rajaram |
Association Rule Mining for Suspicious Email Detection: A Data Mining Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings, pp. 316-323, 2007, IEEE, 1-4244-1329-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Wanita Sherchan, Seng Wai Loke, Shonali Krishnaswamy |
A fuzzy model for reasoning about reputation in web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pp. 1886-1892, 2006, ACM, 1-59593-108-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
rationale inference, web services, reputation |
24 | Yun-qiang Li |
The Deceptive Degree of the Objective Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOGA ![In: Foundations of Genetic Algorithms, 8th International Workshop, FOGA 2005, Aizu-Wakamatsu City, Japan, January 5-9, 2005, Revised Selected Papers, pp. 300-314, 2005, Springer, 3-540-27237-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Christian Wagner 0001, Rachael Kwai Fun Ip, Karen S. K. Cheung, Fion S. L. Lee |
Deceptive Communication in Virtual Communities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Jeffrey T. Hancock, Lauren Curry, Saurabh Goorha, Michael Woodworth |
Automated Linguistic Analysis of Deceptive and Truthful Synchronous Computer-Mediated Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Michael Woodworth, Jeffrey T. Hancock, Saurabh Goorha |
The Motivational Enhancement Effect: Implications for our Chosen Modes of Communication in the 21st Century. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | P. S. Keila, David B. Skillicorn |
Detecting unusual email communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASCON ![In: Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative Research, October 17-20, 2005, Toronto, Ontario, Canada, pp. 117-125, 2005, IBM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
24 | Joey F. George, John R. Carlson |
Group Support Systems and Deceptive Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), January 5-8, 1999, Maui, Hawaii, USA, 1999, IEEE Computer Society, 0-7695-0001-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Shigeo Matsubara, Makoto Yokoo |
Negotiations with Inaccurate Payoff Values. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMAS ![In: Proceedings of the Third International Conference on Multiagent Systems, ICMAS 1998, Paris, France, July 3-7, 1998, pp. 449-450, 1998, IEEE Computer Society, 0-8186-8500-X. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
24 | Anil Menon, Kishan Mehrotra, Chilukuri K. Mohan, Sanjay Ranka |
A Probabilistic Database Approach to the Analysis of Genetic Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPSN ![In: Parallel Problem Solving from Nature - PPSN IV, International Conference on Evolutionary Computation. The 4th International Conference on Parallel Problem Solving from Nature, Berlin, Germany, September 22-26, 1996, Proceedings, pp. 164-173, 1996, Springer, 3-540-61723-X. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
24 | Gustavus J. Simmons |
Cryptanalysis and Protocol Failures (abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '93, Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993., pp. 213-214, 1993, ACM, 0-89791-629-8. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
24 | Reihaneh Safavi-Naini, Leonid M. Tombak |
Optimal Authentication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings, pp. 12-27, 1993, Springer, 3-540-57600-2. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
19 | Kazunori Terada, Akira Ito |
Can a robot deceive humans? ![Search on Bibsonomy](Pics/bibsonomy.png) |
HRI ![In: Proceedings of the 5th ACM/IEEE International Conference on Human Robot Interaction, HRI 2010, Osaka, Japan, March 2-5, 2010, pp. 191-192, 2010, ACM, 978-1-4244-4893-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
intention attribution, deception, theory of mind |
19 | Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo |
Automating the injection of believable decoys to detect snooping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 81-86, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
decoys, honeyflow, honeytoken, trap-based defense, deception, traffic generation |
19 | Rosalind W. Picard |
Robots with emotional intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HRI ![In: Proceedings of the 4th ACM/IEEE International Conference on Human Robot Interaction, HRI 2009, La Jolla, California, USA, March 9-13, 2009, pp. 5-6, 2009, ACM, 978-1-60558-404-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
empathic technology, prosody analysis, affective computing, system, emotion recognition, autism, facial expression recognition, emotional intelligence, deception detection, physiological sensing |
19 | Ephraim Nissan |
Nested Beliefs, Goals, Duties, and Agents Reasoning About their Own or Each Other's Body in the TIMUR Model: A Formalism for the Narrative of Tamerlane and the Three Painters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Robotic Syst. ![In: J. Intell. Robotic Syst. 52(3-4), pp. 515-582, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Nested beliefs, Belief ascription, Duties, Social hierarchy, Episodic formulae, TIMUR model, Narrative, Goals, Deception, Embodied agents, Penalty |
19 | Michael Voong |
Mobile location-based awareness and connectedness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BCS HCI (2) ![In: Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction - Volume 2, BCS HCI 2008, Liverpool, United Kingdom, 1-5 September 2008, pp. 257-258, 2008, BCS, 978-1-906124-06-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
mobile, location, design guidelines, deception, social awareness, connectedness, experience sampling |
19 | James Caverlee, Ling Liu 0001, Steve Webb |
Socialtrust: tamper-resilient trust establishment in online communities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JCDL ![In: ACM/IEEE Joint Conference on Digital Libraries, JCDL 2008, Pittsburgh, PA, USA, June 16-20, 2008, pp. 104-114, 2008, ACM, 978-1-59593-998-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
social networks, trust, web 2.0, spam, deception, myspace |
19 | Jeffrey T. Hancock, Catalina L. Toma, Kate Fenner |
I know something you don't: the use of asymmetric personal information for interpersonal advantage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCW ![In: Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, CSCW 2008, San Diego, CA, USA, November 8-12, 2008, pp. 413-416, 2008, ACM, 978-1-60558-007-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
interpersonal attration, computer-mediated communication, social networking sites, deception |
19 | Panagiotis Tsiamyrtzis, Jonathan Dowdall, Dvijesh J. Shastri, Ioannis T. Pavlidis, M. G. Frank, P. Ekman |
Imaging Facial Physiology for the Detection of Deceit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Vis. ![In: Int. J. Comput. Vis. 71(2), pp. 197-214, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
polygraph, thermography, facial tracking, contact-free physiological monitoring, deception detection |
19 | Michel François Valstar, Hatice Gunes, Maja Pantic |
How to distinguish posed from spontaneous smiles using geometric features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMI ![In: Proceedings of the 9th International Conference on Multimodal Interfaces, ICMI 2007, Nagoya, Aichi, Japan, November 12-15, 2007, pp. 38-45, 2007, ACM, 978-1-59593-817-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multimodal video processing, human information processing, deception detection |
19 | Gwen Littlewort, Marian Stewart Bartlett, Kang Lee |
Faces of pain: automated measurement of spontaneousallfacial expressions of genuine and posed pain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMI ![In: Proceedings of the 9th International Conference on Multimodal Interfaces, ICMI 2007, Nagoya, Aichi, Japan, November 12-15, 2007, pp. 15-21, 2007, ACM, 978-1-59593-817-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
spontaneous behavior, machine learning, computer vision, facial expression recognition, deception, facial action coding system, FACS, pain |
19 | Hsinchun Chen, Homa Atabakhsh, Siddharth Kaza, Byron Marshall, Jennifer Jie Xu 0001, G. Alan Wang, Tim Petersen, Chuck Violette |
BorderSafe: cross-jurisdictional information sharing, analysis, and visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 2005 National Conference on Digital Government Research, DG.O 2005, Atlanta, Georgia, USA, May 15-18, 2005, pp. 241-242, 2005, Digital Government Research Center. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
criminal network analysis, critical infrastructure protection, deception detection |
13 | Wei Yu, Deqing Huang, Pengfei Sun, Qingyuan Wang 0001 |
Sliding Mode Control for High-Speed Train via Event-Triggered Strategy Under Energy-Limited Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 73(2), pp. 1554-1566, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Cristina Torrecillas, Carmen Zarzuelo, Jorge de la Fuente, Bismarck Jigena-Antelo, Gonçalo Prates |
Evaluation and Modelling of the Coastal Geomorphological Changes of Deception Island since the 1970 Eruption and Its Involvement in Research Activity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 16(3), pp. 512, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Qiang Li 0032, Yumei Guo, Peng Zhang, Hong Xu 0010, Linrang Zhang, Zhanye Chen, Yan Huang 0018 |
Deception Velocity-Based Method to Discriminate Physical Targets and Active False Targets in a Multistatic Radar System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 16(2), pp. 382, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Alejandro Corbea-Pérez, Carmen Recondo, Javier F. Calleja |
Improvements in the Estimation of Air Temperature with Empirical Models on Livingston and Deception Islands in Maritime Antarctica (2000-2016) Using C6 MODIS LST. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 16(6), pp. 1084, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Javier F. Calleja, Rubén Muñiz, Jaime Otero, Francisco J. Navarro, Alejandro Corbea-Pérez, Carleen Reijmer, Miguel Ángel de Pablo, Susana Fernández |
Spatiotemporal Evolution of the Land Cover over Deception Island, Antarctica, Its Driving Mechanisms, and Its Impact on the Shortwave Albedo. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 16(5), pp. 915, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Jianyuan Li, Pei Wang, Hongxi Zhang, Chao Luo, Zhenning Li, Yihai Wei |
A Novel Chaotic-NLFM Signal under Low Oversampling Factors for Deception Jamming Suppression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 16(1), pp. 35, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Ning Zhao 0002, Yongjie Tian, Huiyan Zhang, Enrique Herrera-Viedma |
Fuzzy-based adaptive event-triggered control for nonlinear cyber-physical systems against deception attacks via a single parameter learning method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 657, pp. 119948, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Myoung-Ho Chae, Seong-Ook Park, Seung-Ho Choi, Chae-Taek Choi |
Reinforcement Learning-Based Counter Fixed-Wing Drone System Using GNSS Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 16549-16558, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Joelle Kabdjou, Norihiko Shinomiya |
Improving Quality of Service and HTTPS DDoS Detection in MEC Environment With a Cyber Deception-Based Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 23490-23503, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yingjie Fan 0003, Xia Huang, Zhen Wang 0008 |
Memory-Dependent Event-Trigger Scheme for Secure Control of Memristive Neural Networks: Dealing With Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 20(4), pp. 5562-5571, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Lexin Chen, Shaocheng Tong |
Observer-Based Adaptive Fuzzy Consensus Control of Nonlinear Multiagent Systems Encountering Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 20(2), pp. 1808-1818, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Chong Zhang, Luoyi Fu, Jiaxin Ding, Xinde Cao, Fei Long, Xinbing Wang, Lei Zhou, Jing Zhang, Chenghu Zhou |
Community Deception in Large Networks: Through the Lens of Laplacian Spectrum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Soc. Syst. ![In: IEEE Trans. Comput. Soc. Syst. 11(2), pp. 2057-2069, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Valeria Fionda, Giuseppe Pirrò |
Community Deception in Attributed Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Soc. Syst. ![In: IEEE Trans. Comput. Soc. Syst. 11(1), pp. 228-237, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Saif Aldeen Madi, Giuseppe Pirrò |
Node-Centric Community Deception Based on Safeness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Soc. Syst. ![In: IEEE Trans. Comput. Soc. Syst. 11(2), pp. 2955-2965, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Katerina Papantoniou, Panagiotis Papadakos, Dimitris Plexousakis |
What Do LLMs Know about Deception in Text? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ERCIM News ![In: ERCIM News 2024(136), 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
13 | Lili Li, Qingjun Guo, Bingqi Chen, Wei Yue 0001, Zhongchang Liu, Hong Sang |
Output regulation for switched systems via dual distributed event-triggered mechanisms under multiple deception attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 466, pp. 128465, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Xinyu Fang, Mengmeng Li, Shaoran Wang, Xia Ai, Weidong Wang, Jiaqi Liu, Dazhi Ding |
EM Scattering Center Model-Guided Passive SAR Deception Using Diverse Frequency Time-Modulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Geosci. Remote. Sens. ![In: IEEE Trans. Geosci. Remote. Sens. 62, pp. 1-13, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Hao Lin, Mengdao Xing, Yishan Lou, Zhihao Wang, Tinghao Zhang, Guangcai Sun |
Research on Anti-Deception Forwarding Interference of Squint Azimuth Multichannel SAR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Geosci. Remote. Sens. ![In: IEEE Trans. Geosci. Remote. Sens. 62, pp. 1-12, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Giuseppe Pirrò |
Community Deception From a Node-Centric Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Netw. Sci. Eng. ![In: IEEE Trans. Netw. Sci. Eng. 11(1), pp. 969-981, January - February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Mingyang Tian, Chunmei Duan |
Event-triggered control for uncertain delayed neural networks with actuator saturation against deception attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Control ![In: Int. J. Control 97(3), pp. 554-566, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Wenhai Qi, Wendi Tan, Ju H. Park 0001, Zheng-Guang Wu, Huaicheng Yan 0001 |
Finite-Time Self-Triggered Stabilization for Networked Power System With Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. II Express Briefs ![In: IEEE Trans. Circuits Syst. II Express Briefs 71(4), pp. 2049-2053, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yahui Gao, Ben Niu 0003, Wendi Chen, Huanqing Wang, Chaoxu Mu, Guoxing Wen 0001 |
Adaptive Control of Constrained Nonlinear CPSs Under Deception Attacks Through Sensor and Actuator Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. II Express Briefs ![In: IEEE Trans. Circuits Syst. II Express Briefs 71(3), pp. 1241-1245, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Meijie Zhang, Yaping Sun, Xinsong Yang, Ju H. Park 0001 |
Secure State Estimation of Singularly Perturbed Switched Systems With Output Deception Attack via Discretized LKF Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. II Express Briefs ![In: IEEE Trans. Circuits Syst. II Express Briefs 71(2), pp. 792-796, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Wen-Di Chen, Yuan-Xin Li 0001, Lei Liu 0006, Xu-Dong Zhao 0001, Ben Niu 0003, Li-Min Han |
Nussbaum-Based Adaptive Fault-Tolerant Control for Nonlinear CPSs With Deception Attacks: A New Coordinate Transformation Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Cybern. ![In: IEEE Trans. Cybern. 54(2), pp. 1212-1222, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Qingchen Liu, Jie Wang 0047, Yuqing Ni, Cong Zhang, Ling Shi, Jiahu Qin |
Performance analysis for cyber-physical systems under two types of stealthy deception attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autom. ![In: Autom. 160, pp. 111446, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Cong Zhang, Jiahu Qin, Chengzhen Yan, Yang Shi, Yaonan Wang 0001, Man Li 0002 |
Towards invariant extended Kalman filter-based resilient distributed state estimation for moving robots over mobile sensor networks under deception attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autom. ![In: Autom. 159, pp. 111408, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Jingshi Yao, Shaoyuan Li, Xiang Yin 0003 |
Sensor deception attacks against security in supervisory control systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autom. ![In: Autom. 159, pp. 111330, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Phil Laplante |
Deception and Intuition in Software Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 57(1), pp. 110-113, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Xiang Zhang, Wei Xie, Rui Gao, Weidong Zhang 0004 |
Finite-Time H∞ Filtering for Markov Jump Systems Under Deception Attacks and Delays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Syst. ![In: IEEE Trans. Syst. Man Cybern. Syst. 54(3), pp. 1828-1839, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Fanghui Li, Zhongsheng Hou |
Event-Triggered Model-Free Adaptive Predictive Control for Networked Control Systems Under Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Syst. ![In: IEEE Trans. Syst. Man Cybern. Syst. 54(2), pp. 1325-1334, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Xinjun Wang, Ye Cao, Guangdeng Zong, Huanqing Wang, Ben Niu 0003 |
Resilient Adaptive Intermittent Control of Nonlinear Systems Under Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Syst. ![In: IEEE Trans. Syst. Man Cybern. Syst. 54(4), pp. 2171-2180, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Da-Wei Zhang, Guo-Ping Liu 0003 |
Predictive Sliding-Mode Control for Networked High-Order Fully Actuated Multiagents Under Random Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Syst. ![In: IEEE Trans. Syst. Man Cybern. Syst. 54(1), pp. 484-496, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Zhenzhen Pan, Ronghu Chi, Zhongsheng Hou |
Distributed Model-Free Adaptive Predictive Control for MIMO Multi-Agent Systems With Deception Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Signal Inf. Process. over Networks ![In: IEEE Trans. Signal Inf. Process. over Networks 10, pp. 32-47, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Bo Wei, Teng Huang, Xi Zhang, Jiaming Liang, Yunhao Li, Cong Cao, Dan Li, Yongfeng Chen, Huagang Xiong, Feng Jiang, Xiqiu Zhang |
Cam-PC: A Novel Method for Camouflaging Point Clouds to Counter Adversarial Deception in Remote Sensing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. ![In: IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 17, pp. 56-67, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Aswathy Velutharambath, Amelie Wührl, Roman Klinger |
Can Factual Statements be Deceptive? The DeFaBel Corpus of Belief-based Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.10185, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Zhongjie Ba, Qingyu Liu, Zhenguang Liu, Shuang Wu, Feng Lin, Li Lu, Kui Ren 0001 |
Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.01786, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Orson Mengara |
The Art of Deception: Robust Backdoor Attack using Dynamic Stacking of Triggers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.01537, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Tao Li, Quanyan Zhu |
Symbiotic Game and Foundation Models for Cyber Deception Operations in Strategic Cyber Warfare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.10570, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Rakesh M. Verma, Nachum Dershowitz, Victor Zeng, Dainis Boumber, Xuting Liu |
Domain-Independent Deception: A New Taxonomy and Linguistic Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.01019, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Pedro Beltran Lopez, Pantaleone Nespoli, Manuel Gil Pérez |
Cyber Deception Reactive: TCP Stealth Redirection to On-Demand Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.09191, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Sohail Ahmed Khan, Duc-Tien Dang-Nguyen |
CLIPping the Deception: Adapting Vision-Language Models for Universal Deepfake Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.12927, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Christian Tarsney |
Deception and Manipulation in Generative AI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.11335, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Wenbing Tang 0001, Yuan Zhou 0005, Yang Liu 0003, Zuohua Ding, Jing Liu 0012 |
Robust Motion Planning for Multi-Robot Systems Against Position Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 19, pp. 2157-2170, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Ni Yang, Ruiyi Gao, Youzhi Feng, Huan Su |
Event-Triggered Impulsive Control for Complex Networks Under Stochastic Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 19, pp. 1525-1534, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yong Zhao, Jiaxin Luo, Weihai Zhang, Xiangyun Lin |
Asynchronous Finite-Time Exponential Dissipative Filtering for Stochastic Fuzzy Markov Jump Systems Against Deception Attacks Based on Event-Triggered Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Fuzzy Syst. ![In: Int. J. Fuzzy Syst. 26(3), pp. 735-752, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Tom Meurs, Edward J. Cartwright, Anna Cartwright 0001, Marianne Junger, Abhishta Abhishta |
Deception in double extortion ransomware attacks: An analysis of profitability and credibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 138, pp. 103670, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Ji-Jing Lu, Xiao-Heng Chang |
Mixed H∞ and passive resilient control for discrete-time systems with Round-Robin protocol and deception attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Inst. Meas. Control ![In: Trans. Inst. Meas. Control 46(1), pp. 27-38, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Tu Zhang, Guobao Zhang, Yongming Huang |
Secure iterative interval estimation method for cyber-physical systems subject to stealthy deception attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Inst. Meas. Control ![In: Trans. Inst. Meas. Control 46(6), pp. 1084-1092, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Huawei Tao, Hang Yu, Man Liu, Hongliang Fu, Chunhua Zhu, Yue Xie |
A semi-supervised high-quality pseudo labels algorithm based on multi-constraint optimization for speech deception detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Speech Lang. ![In: Comput. Speech Lang. 85, pp. 101586, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Zhengle Zhang, Tiedong Ma, Xiaojie Su, Xiaoyu Ma |
Impulsive Consensus of One-Sided Lipschitz Multi-Agent Systems With Deception Attacks and Stochastic Perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Artif. Intell. ![In: IEEE Trans. Artif. Intell. 5(3), pp. 1328-1338, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 1875 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|