The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for deception with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1992 (19) 1993-1998 (18) 1999-2001 (25) 2002-2003 (32) 2004 (37) 2005 (62) 2006 (35) 2007 (40) 2008 (38) 2009 (33) 2010 (31) 2011 (27) 2012 (38) 2013 (34) 2014 (55) 2015 (70) 2016 (76) 2017 (85) 2018 (114) 2019 (149) 2020 (165) 2021 (194) 2022 (186) 2023 (244) 2024 (68)
Publication types (Num. hits)
article(941) book(4) incollection(24) inproceedings(885) phdthesis(19) proceedings(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 307 occurrences of 218 keywords

Results
Found 1875 publication records. Showing 1875 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
26Sarah Ita Levitan, Angel Maredia, Julia Hirschberg Linguistic Cues to Deception and Perceived Deception in Interview Dialogues. Search on Bibsonomy NAACL-HLT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Mohamed Abouelenien, Rada Mihalcea, Mihai Burzo Analyzing Thermal and Visual Clues of Deception for a Non-Contact Deception Detection Approach. Search on Bibsonomy PETRA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Jiang Wu, Lina Zhou DOBNet: exploiting the discourse of deception behaviour to uncover online deception strategies. Search on Bibsonomy Behav. Inf. Technol. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben S. Schmoker, Alexander W. Tsow Cyber Denial, Deception and Counter Deception - A Framework for Supporting Active Cyber Defense Search on Bibsonomy 2015   DOI  RDF
26Jeffrey Gainer Proudfoot, Jeffrey L. Jenkins, Judee K. Burgoon, Jay F. Nunamaker Jr. Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews. Search on Bibsonomy ISI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Sarah Ita Levitan, Guozhen An, Mandi Wang, Gideon Mendels, Julia Hirschberg, Michelle Levine, Andrew Rosenberg Cross-Cultural Production and Detection of Deception from Speech. Search on Bibsonomy WMDD@ICMI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Barbara Diana, Massimiliano Elia, Valentino Zurloni, Annibale Elia, Alessandro Maisto, Serena Pelosi Multimodal Deception Detection: A t-pattern Approach. Search on Bibsonomy WMDD@ICMI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Krystian Radlak, Maciej Bozek, Bogdan Smolka Silesian Deception Database: Presentation and Analysis. Search on Bibsonomy WMDD@ICMI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Yanjuan Yang, Michael V. Mannino An experimental comparison of real and artificial deception using a deception generation model. Search on Bibsonomy Decis. Support Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Christie M. Fuller, Kent Marett, Douglas P. Twitchell An Examination of Deception in Virtual Teams: Effects of Deception on Task Performance, Mutuality, and Trust. Search on Bibsonomy IEEE Trans. Prof. Commun. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Yanjuan Yang, Michael V. Mannino An Experimental Comparison of a Document Deception Detection Policy using Real and Artificial Deception. Search on Bibsonomy ACM J. Data Inf. Qual. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Victoria L. Rubin On deception and deception detection: Content analysis of computer-mediated stated beliefs. Search on Bibsonomy ASIST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Tamilla Mavlanova, Raquel Benbunan-Fich, Nanda Kumar Deception Tactics and Counterfeit Deception in Online Environments. Search on Bibsonomy ICIS The full citation details ... 2008 DBLP  BibTeX  RDF
25Christie M. Fuller, David P. Biros, Dursun Delen Exploration of Feature Selection and Advanced Classification Models for High-Stakes Deception Detection. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Neil C. Rowe Finding Logically Consistent Resource-Deception Plans for Defense in Cyberspace. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Christie M. Fuller, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr., Steven Coulon Detecting Deception in Person-of-Interest Statements. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Hsinchun Chen, Homa Atabakhsh, Jennifer Jie Xu 0001, Alan Gang Wang, Byron Marshall, Siddharth Kaza, Chunju Tseng, Shauna Eggers, Hemanth Gowda, Tim Petersen, Chuck Violette Coplink center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research. Search on Bibsonomy DG.O The full citation details ... 2005 DBLP  BibTeX  RDF identity matching, data mining, social network analysis, law enforcement, homeland security
25Kent Marett, Joey F. George Group Deception in Computer-Supported Environments. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Randall J. Boyle, Cynthia P. Ruppel The Impact of Media Richness, Suspicion, and Perceived Truth Bias on Deception Detection. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Joey F. George, Kent Marett, Patti Tilley Deception Detection under Varying Electronic Media and Warning Conditions. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Tiantian Qin, Judee K. Burgoon, Jay F. Nunamaker Jr. An Exploratory Study on Promising Cues in Deception Detection and Application of Decision Tree. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Yuqing Mai, Radhika Upadrashta, Xiao Su J-Honeypot: A Java-Based Network Deception Tool with Monitoring and Intrusion Detection. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Lina Zhou, Douglas P. Twitchell, Tiantian Qin, Judee K. Burgoon, Jay F. Nunamaker Jr. An Exploratory Study into Deception Detection in Text-Based Computer-Mediated Communication. Search on Bibsonomy HICSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Judee K. Burgoon, J. P. Blair, Tiantian Qin, Jay F. Nunamaker Jr. Detecting Deception through Linguistic Analysis. Search on Bibsonomy ISI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25James Bret Michael On the Response Policy of Software Decoys: Conducting Software-Based Deception in the Cyber Battlespace. Search on Bibsonomy COMPSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
25K. Suzanne Barber, Karen Fullam, Joonoo Kim Challenges for Trust, Fraud and Deception Research in Multi-agent Systems. Search on Bibsonomy Trust, Reputation, and Security The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Ian Fette, Norman M. Sadeh, Anthony Tomasic Learning to detect phishing emails. Search on Bibsonomy WWW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF semantic attacks, learning, filtering, spam, email, phishing
24Subramanian Appavu, Ramasamy Rajaram Association Rule Mining for Suspicious Email Detection: A Data Mining Approach. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Wanita Sherchan, Seng Wai Loke, Shonali Krishnaswamy A fuzzy model for reasoning about reputation in web services. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF rationale inference, web services, reputation
24Yun-qiang Li The Deceptive Degree of the Objective Function. Search on Bibsonomy FOGA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Christian Wagner 0001, Rachael Kwai Fun Ip, Karen S. K. Cheung, Fion S. L. Lee Deceptive Communication in Virtual Communities. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Jeffrey T. Hancock, Lauren Curry, Saurabh Goorha, Michael Woodworth Automated Linguistic Analysis of Deceptive and Truthful Synchronous Computer-Mediated Communication. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Michael Woodworth, Jeffrey T. Hancock, Saurabh Goorha The Motivational Enhancement Effect: Implications for our Chosen Modes of Communication in the 21st Century. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24P. S. Keila, David B. Skillicorn Detecting unusual email communication. Search on Bibsonomy CASCON The full citation details ... 2005 DBLP  BibTeX  RDF
24Joey F. George, John R. Carlson Group Support Systems and Deceptive Communication. Search on Bibsonomy HICSS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
24Shigeo Matsubara, Makoto Yokoo Negotiations with Inaccurate Payoff Values. Search on Bibsonomy ICMAS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
24Anil Menon, Kishan Mehrotra, Chilukuri K. Mohan, Sanjay Ranka A Probabilistic Database Approach to the Analysis of Genetic Algorithms. Search on Bibsonomy PPSN The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
24Gustavus J. Simmons Cryptanalysis and Protocol Failures (abstract). Search on Bibsonomy CCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
24Reihaneh Safavi-Naini, Leonid M. Tombak Optimal Authentication Systems. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
19Kazunori Terada, Akira Ito Can a robot deceive humans? Search on Bibsonomy HRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF intention attribution, deception, theory of mind
19Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo Automating the injection of believable decoys to detect snooping. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF decoys, honeyflow, honeytoken, trap-based defense, deception, traffic generation
19Rosalind W. Picard Robots with emotional intelligence. Search on Bibsonomy HRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF empathic technology, prosody analysis, affective computing, system, emotion recognition, autism, facial expression recognition, emotional intelligence, deception detection, physiological sensing
19Ephraim Nissan Nested Beliefs, Goals, Duties, and Agents Reasoning About their Own or Each Other's Body in the TIMUR Model: A Formalism for the Narrative of Tamerlane and the Three Painters. Search on Bibsonomy J. Intell. Robotic Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Nested beliefs, Belief ascription, Duties, Social hierarchy, Episodic formulae, TIMUR model, Narrative, Goals, Deception, Embodied agents, Penalty
19Michael Voong Mobile location-based awareness and connectedness. Search on Bibsonomy BCS HCI (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mobile, location, design guidelines, deception, social awareness, connectedness, experience sampling
19James Caverlee, Ling Liu 0001, Steve Webb Socialtrust: tamper-resilient trust establishment in online communities. Search on Bibsonomy JCDL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF social networks, trust, web 2.0, spam, deception, myspace
19Jeffrey T. Hancock, Catalina L. Toma, Kate Fenner I know something you don't: the use of asymmetric personal information for interpersonal advantage. Search on Bibsonomy CSCW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF interpersonal attration, computer-mediated communication, social networking sites, deception
19Panagiotis Tsiamyrtzis, Jonathan Dowdall, Dvijesh J. Shastri, Ioannis T. Pavlidis, M. G. Frank, P. Ekman Imaging Facial Physiology for the Detection of Deceit. Search on Bibsonomy Int. J. Comput. Vis. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF polygraph, thermography, facial tracking, contact-free physiological monitoring, deception detection
19Michel François Valstar, Hatice Gunes, Maja Pantic How to distinguish posed from spontaneous smiles using geometric features. Search on Bibsonomy ICMI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multimodal video processing, human information processing, deception detection
19Gwen Littlewort, Marian Stewart Bartlett, Kang Lee Faces of pain: automated measurement of spontaneousallfacial expressions of genuine and posed pain. Search on Bibsonomy ICMI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF spontaneous behavior, machine learning, computer vision, facial expression recognition, deception, facial action coding system, FACS, pain
19Hsinchun Chen, Homa Atabakhsh, Siddharth Kaza, Byron Marshall, Jennifer Jie Xu 0001, G. Alan Wang, Tim Petersen, Chuck Violette BorderSafe: cross-jurisdictional information sharing, analysis, and visualization. Search on Bibsonomy DG.O The full citation details ... 2005 DBLP  BibTeX  RDF criminal network analysis, critical infrastructure protection, deception detection
13Wei Yu, Deqing Huang, Pengfei Sun, Qingyuan Wang 0001 Sliding Mode Control for High-Speed Train via Event-Triggered Strategy Under Energy-Limited Deception Attacks. Search on Bibsonomy IEEE Trans. Veh. Technol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Cristina Torrecillas, Carmen Zarzuelo, Jorge de la Fuente, Bismarck Jigena-Antelo, Gonçalo Prates Evaluation and Modelling of the Coastal Geomorphological Changes of Deception Island since the 1970 Eruption and Its Involvement in Research Activity. Search on Bibsonomy Remote. Sens. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Qiang Li 0032, Yumei Guo, Peng Zhang, Hong Xu 0010, Linrang Zhang, Zhanye Chen, Yan Huang 0018 Deception Velocity-Based Method to Discriminate Physical Targets and Active False Targets in a Multistatic Radar System. Search on Bibsonomy Remote. Sens. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Alejandro Corbea-Pérez, Carmen Recondo, Javier F. Calleja Improvements in the Estimation of Air Temperature with Empirical Models on Livingston and Deception Islands in Maritime Antarctica (2000-2016) Using C6 MODIS LST. Search on Bibsonomy Remote. Sens. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Javier F. Calleja, Rubén Muñiz, Jaime Otero, Francisco J. Navarro, Alejandro Corbea-Pérez, Carleen Reijmer, Miguel Ángel de Pablo, Susana Fernández Spatiotemporal Evolution of the Land Cover over Deception Island, Antarctica, Its Driving Mechanisms, and Its Impact on the Shortwave Albedo. Search on Bibsonomy Remote. Sens. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Jianyuan Li, Pei Wang, Hongxi Zhang, Chao Luo, Zhenning Li, Yihai Wei A Novel Chaotic-NLFM Signal under Low Oversampling Factors for Deception Jamming Suppression. Search on Bibsonomy Remote. Sens. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Ning Zhao 0002, Yongjie Tian, Huiyan Zhang, Enrique Herrera-Viedma Fuzzy-based adaptive event-triggered control for nonlinear cyber-physical systems against deception attacks via a single parameter learning method. Search on Bibsonomy Inf. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Myoung-Ho Chae, Seong-Ook Park, Seung-Ho Choi, Chae-Taek Choi Reinforcement Learning-Based Counter Fixed-Wing Drone System Using GNSS Deception. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Joelle Kabdjou, Norihiko Shinomiya Improving Quality of Service and HTTPS DDoS Detection in MEC Environment With a Cyber Deception-Based Architecture. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Yingjie Fan 0003, Xia Huang, Zhen Wang 0008 Memory-Dependent Event-Trigger Scheme for Secure Control of Memristive Neural Networks: Dealing With Deception Attacks. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Lexin Chen, Shaocheng Tong Observer-Based Adaptive Fuzzy Consensus Control of Nonlinear Multiagent Systems Encountering Deception Attacks. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Chong Zhang, Luoyi Fu, Jiaxin Ding, Xinde Cao, Fei Long, Xinbing Wang, Lei Zhou, Jing Zhang, Chenghu Zhou Community Deception in Large Networks: Through the Lens of Laplacian Spectrum. Search on Bibsonomy IEEE Trans. Comput. Soc. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Valeria Fionda, Giuseppe Pirrò Community Deception in Attributed Networks. Search on Bibsonomy IEEE Trans. Comput. Soc. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Saif Aldeen Madi, Giuseppe Pirrò Node-Centric Community Deception Based on Safeness. Search on Bibsonomy IEEE Trans. Comput. Soc. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Katerina Papantoniou, Panagiotis Papadakos, Dimitris Plexousakis What Do LLMs Know about Deception in Text? Search on Bibsonomy ERCIM News The full citation details ... 2024 DBLP  BibTeX  RDF
13Lili Li, Qingjun Guo, Bingqi Chen, Wei Yue 0001, Zhongchang Liu, Hong Sang Output regulation for switched systems via dual distributed event-triggered mechanisms under multiple deception attacks. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Xinyu Fang, Mengmeng Li, Shaoran Wang, Xia Ai, Weidong Wang, Jiaqi Liu, Dazhi Ding EM Scattering Center Model-Guided Passive SAR Deception Using Diverse Frequency Time-Modulation. Search on Bibsonomy IEEE Trans. Geosci. Remote. Sens. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Hao Lin, Mengdao Xing, Yishan Lou, Zhihao Wang, Tinghao Zhang, Guangcai Sun Research on Anti-Deception Forwarding Interference of Squint Azimuth Multichannel SAR. Search on Bibsonomy IEEE Trans. Geosci. Remote. Sens. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Giuseppe Pirrò Community Deception From a Node-Centric Perspective. Search on Bibsonomy IEEE Trans. Netw. Sci. Eng. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Mingyang Tian, Chunmei Duan Event-triggered control for uncertain delayed neural networks with actuator saturation against deception attack. Search on Bibsonomy Int. J. Control The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Wenhai Qi, Wendi Tan, Ju H. Park 0001, Zheng-Guang Wu, Huaicheng Yan 0001 Finite-Time Self-Triggered Stabilization for Networked Power System With Deception Attacks. Search on Bibsonomy IEEE Trans. Circuits Syst. II Express Briefs The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Yahui Gao, Ben Niu 0003, Wendi Chen, Huanqing Wang, Chaoxu Mu, Guoxing Wen 0001 Adaptive Control of Constrained Nonlinear CPSs Under Deception Attacks Through Sensor and Actuator Networks. Search on Bibsonomy IEEE Trans. Circuits Syst. II Express Briefs The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Meijie Zhang, Yaping Sun, Xinsong Yang, Ju H. Park 0001 Secure State Estimation of Singularly Perturbed Switched Systems With Output Deception Attack via Discretized LKF Approach. Search on Bibsonomy IEEE Trans. Circuits Syst. II Express Briefs The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Wen-Di Chen, Yuan-Xin Li 0001, Lei Liu 0006, Xu-Dong Zhao 0001, Ben Niu 0003, Li-Min Han Nussbaum-Based Adaptive Fault-Tolerant Control for Nonlinear CPSs With Deception Attacks: A New Coordinate Transformation Technology. Search on Bibsonomy IEEE Trans. Cybern. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Qingchen Liu, Jie Wang 0047, Yuqing Ni, Cong Zhang, Ling Shi, Jiahu Qin Performance analysis for cyber-physical systems under two types of stealthy deception attacks. Search on Bibsonomy Autom. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Cong Zhang, Jiahu Qin, Chengzhen Yan, Yang Shi, Yaonan Wang 0001, Man Li 0002 Towards invariant extended Kalman filter-based resilient distributed state estimation for moving robots over mobile sensor networks under deception attacks. Search on Bibsonomy Autom. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Jingshi Yao, Shaoyuan Li, Xiang Yin 0003 Sensor deception attacks against security in supervisory control systems. Search on Bibsonomy Autom. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Phil Laplante Deception and Intuition in Software Engineering. Search on Bibsonomy Computer The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Xiang Zhang, Wei Xie, Rui Gao, Weidong Zhang 0004 Finite-Time H∞ Filtering for Markov Jump Systems Under Deception Attacks and Delays. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Fanghui Li, Zhongsheng Hou Event-Triggered Model-Free Adaptive Predictive Control for Networked Control Systems Under Deception Attacks. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Xinjun Wang, Ye Cao, Guangdeng Zong, Huanqing Wang, Ben Niu 0003 Resilient Adaptive Intermittent Control of Nonlinear Systems Under Deception Attacks. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Da-Wei Zhang, Guo-Ping Liu 0003 Predictive Sliding-Mode Control for Networked High-Order Fully Actuated Multiagents Under Random Deception Attacks. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Zhenzhen Pan, Ronghu Chi, Zhongsheng Hou Distributed Model-Free Adaptive Predictive Control for MIMO Multi-Agent Systems With Deception Attack. Search on Bibsonomy IEEE Trans. Signal Inf. Process. over Networks The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Bo Wei, Teng Huang, Xi Zhang, Jiaming Liang, Yunhao Li, Cong Cao, Dan Li, Yongfeng Chen, Huagang Xiong, Feng Jiang, Xiqiu Zhang Cam-PC: A Novel Method for Camouflaging Point Clouds to Counter Adversarial Deception in Remote Sensing. Search on Bibsonomy IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Aswathy Velutharambath, Amelie Wührl, Roman Klinger Can Factual Statements be Deceptive? The DeFaBel Corpus of Belief-based Deception. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Zhongjie Ba, Qingyu Liu, Zhenguang Liu, Shuang Wu, Feng Lin, Li Lu, Kui Ren 0001 Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Orson Mengara The Art of Deception: Robust Backdoor Attack using Dynamic Stacking of Triggers. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Tao Li, Quanyan Zhu Symbiotic Game and Foundation Models for Cyber Deception Operations in Strategic Cyber Warfare. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Rakesh M. Verma, Nachum Dershowitz, Victor Zeng, Dainis Boumber, Xuting Liu Domain-Independent Deception: A New Taxonomy and Linguistic Analysis. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Pedro Beltran Lopez, Pantaleone Nespoli, Manuel Gil Pérez Cyber Deception Reactive: TCP Stealth Redirection to On-Demand Honeypots. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Sohail Ahmed Khan, Duc-Tien Dang-Nguyen CLIPping the Deception: Adapting Vision-Language Models for Universal Deepfake Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Christian Tarsney Deception and Manipulation in Generative AI. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Wenbing Tang 0001, Yuan Zhou 0005, Yang Liu 0003, Zuohua Ding, Jing Liu 0012 Robust Motion Planning for Multi-Robot Systems Against Position Deception Attacks. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Ni Yang, Ruiyi Gao, Youzhi Feng, Huan Su Event-Triggered Impulsive Control for Complex Networks Under Stochastic Deception Attacks. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Yong Zhao, Jiaxin Luo, Weihai Zhang, Xiangyun Lin Asynchronous Finite-Time Exponential Dissipative Filtering for Stochastic Fuzzy Markov Jump Systems Against Deception Attacks Based on Event-Triggered Scheme. Search on Bibsonomy Int. J. Fuzzy Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Tom Meurs, Edward J. Cartwright, Anna Cartwright 0001, Marianne Junger, Abhishta Abhishta Deception in double extortion ransomware attacks: An analysis of profitability and credibility. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Ji-Jing Lu, Xiao-Heng Chang Mixed H∞ and passive resilient control for discrete-time systems with Round-Robin protocol and deception attacks. Search on Bibsonomy Trans. Inst. Meas. Control The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Tu Zhang, Guobao Zhang, Yongming Huang Secure iterative interval estimation method for cyber-physical systems subject to stealthy deception attacks. Search on Bibsonomy Trans. Inst. Meas. Control The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Huawei Tao, Hang Yu, Man Liu, Hongliang Fu, Chunhua Zhu, Yue Xie A semi-supervised high-quality pseudo labels algorithm based on multi-constraint optimization for speech deception detection. Search on Bibsonomy Comput. Speech Lang. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Zhengle Zhang, Tiedong Ma, Xiaojie Su, Xiaoyu Ma Impulsive Consensus of One-Sided Lipschitz Multi-Agent Systems With Deception Attacks and Stochastic Perturbation. Search on Bibsonomy IEEE Trans. Artif. Intell. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 1875 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license