The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for deception with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1992 (19) 1993-1998 (18) 1999-2001 (25) 2002-2003 (32) 2004 (37) 2005 (62) 2006 (35) 2007 (40) 2008 (38) 2009 (33) 2010 (31) 2011 (27) 2012 (38) 2013 (34) 2014 (55) 2015 (70) 2016 (76) 2017 (85) 2018 (114) 2019 (149) 2020 (165) 2021 (194) 2022 (186) 2023 (244) 2024 (68)
Publication types (Num. hits)
article(941) book(4) incollection(24) inproceedings(885) phdthesis(19) proceedings(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 307 occurrences of 218 keywords

Results
Found 1875 publication records. Showing 1875 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
13Sharad Agarwal, Gilberto Atondo Siu, Marilyne Ordekian, Alice Hutchings, Enrico Mariconti, Marie Vasek Short Paper: DeFi Deception - Uncovering the Prevalence of Rugpulls in Cryptocurrency Projects. Search on Bibsonomy FC (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Jiawei Luo, Tao Liu, Mengen Liang, Ning Hu A HMM-Based ICS Adaptive Deception Defense Framework. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Mohamed Osman, Tamer Nadeem, Ahmed Hemida, Charles A. Kamhoua Optimizing Honeypot Placement Strategies with Graph Neural Networks for Enhanced Resilience via Cyber Deception. Search on Bibsonomy GNNet@CoNEXT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Zelin Wan, Jin-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles A. Kamhoua, Munindar P. Singh Deception in Drone Surveillance Missions: Strategic vs. Learning Approaches. Search on Bibsonomy MobiHoc The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Andre Slonopas, Stephanie Travis, Warren Thompson Cybersecurity Defense via Agile Virtual Infrastructure Deception. Search on Bibsonomy VCC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Dmytro S. Morozov, Tetiana A. Vakaliuk, Andrii A. Yefimenko, Tetiana M. Nikitchuk, Roman O. Kolomiiets Honeypot and cyber deception as a tool for detecting cyber attacks on critical infrastructure. Search on Bibsonomy doors The full citation details ... 2023 DBLP  BibTeX  RDF
13Sayde King, Najare Johnson, Kristin Kosyluk, Tempestt J. Neal Therapist Perceptions of Automated Deception Detection in Mental Health Applications. Search on Bibsonomy HCI (40) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Stanislava Ivanova, Naghmeh Moradpoor Fake PLC in the Cloud, We Thought the Attackers Believed that: How ICS Honeypot Deception Gets Impacted by Cloud Deployments? Search on Bibsonomy WFCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Ghanshyam S. Bopche, Saloni Pawar, Nilin Prabhaker Classification of Images Extracted from Scientific Documents for Cyber Deception. Search on Bibsonomy RTIP2R (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Henrik Skaug Sætra Machiavelli for robots: Strategic robot failure, deception, and trust. Search on Bibsonomy RO-MAN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Shoei Nashimoto, Tomoyuki Nagatsuka Cover Chirp Jaming: Hybrid Jamming-Deception Attack on FMCW Radar and Its Countermeasure. Search on Bibsonomy ASHES@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Stefan Sarkadi An Arms Race in Theory-of-Mind: Deception Drives the Emergence of Higher-level Theory-of-Mind in Agent Societies. Search on Bibsonomy ACSOS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13David Lopes Antunes, Salvador Llopis Sánchez The Age of fighting machines: the use of cyber deception for Adversarial Artificial Intelligence in Cyber Defence. Search on Bibsonomy ARES The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Aviral Srivastava, Priyansh Sanghavi, Viral Parmar Unveiling the Veil of Deception: An Insightful Journey into Adversarial Attacks and Defence Mechanisms in Deep Learning Networks. Search on Bibsonomy IC3I The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Digvijay Singh, Annu Yadav, Rishabh Arora, G. Ravivarman, S. Arul Antran Vijay, Y. K. Sharma Deep Neural Network Deception Using A Single Pixel Assault. Search on Bibsonomy IC3I The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Shuxin Yang, Baizhen Chen, Guixiang Zhu EPCG: An Elite Population Co-evolutionary Genetic Algorithm for Global Community Deception. Search on Bibsonomy CCEAI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Saswata Satpathi, Hirak Banerjee, Aurobinda Routray, Partha Sarathi Satpathi A thermal video database for studying deception in real life. Search on Bibsonomy EMBC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Matthew Peter Aylett, Mei Yii Lim, Katerina Pappa, Bruce W. Wilson, Ruth Aylett, Mario Parra Embodied Conversational Agents: Trust, Deception and the Suspension of Disbelief. Search on Bibsonomy TAS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Quan Hong, Jiaqi Li, Xizhong Guo, Pan Xie, Lidong Zhai Assessing the Effectiveness of Deception-Based Cyber Defense with CyberBattleSim. Search on Bibsonomy ICDF2C (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Jing Zhou, Tongwen Chen Stealthy Linear Deception Attacks against Kalman Filtering with Partially Secured Measurements. Search on Bibsonomy CDC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Filippos Fotiadis, Kyriakos G. Vamvoudakis Game-Theoretic Deception Methods for Perfectly and Bounded Rational Stealthy Attackers. Search on Bibsonomy CDC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Fatih Emre Tosun, André Teixeira 0001 Robust Sequential Detection of Non-stealthy Sensor Deception Attacks in an Artificial Pancreas System. Search on Bibsonomy CDC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Kumara K. J. A. M. V., Kumari T. P. S., Ahilan Kanagasundaram, Ragupathyraj Valluvan Speech Deception Detection-Build A Model To Classify Whether Customer Can Pay The Loan Payment. Search on Bibsonomy ICIIS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Deniz Koyuncu, Alex Gittens, Bülent Yener, Moti Yung Deception by Omission: Using Adversarial Missingness to Poison Causal Structure Learning. Search on Bibsonomy KDD The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Bin Han 0004, Yao Zhu 0001, Anke Schmeink, Hans D. Schotten Non-Orthogonal Multiplexing in the FBL Regime Enhances Physical Layer Security with Deception. Search on Bibsonomy SPAWC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Xuan Zhu, Hao Wu, Fangmin He, Jin Meng A New Deception Jamming Signal Detection Technique Based on YOLOv7. Search on Bibsonomy ICCT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Haimin Hu, Zixu Zhang, Kensuke Nakamura, Andrea Bajcsy, Jaime Fernández Fisac Deception Game: Closing the Safety-Learning Loop in Interactive Robot Autonomy. Search on Bibsonomy CoRL The full citation details ... 2023 DBLP  BibTeX  RDF
13Manikya Alister, Keith James Ransom, Andrew Perfors Inferring the truth from deception: What can people learn from helpful and unhelpful information providers? Search on Bibsonomy CogSci The full citation details ... 2023 DBLP  BibTeX  RDF
13Laslo Dinges, Marc-André Fiedler, Ayoub Al-Hamadi, Ahmed A. Abdelrahman, Joachim Weimann, Dmitri Bershadskyy Uncovering Lies: Deception Detection in a Rolling-Dice Experiment. Search on Bibsonomy ICIAP (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Danilo Avola, Luigi Cinque, Maria De Marsico, Angelo Di Mambro, Alessio Fagioli 0001, Gian Luca Foresti, Romeo Lanzino, Francesco Scarcello LieToMe: An LSTM-Based Method for Deception Detection by Hand Movements. Search on Bibsonomy ICIAP (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Shelina Khalid Jilani, Zeno Geradts, Aliyu Abubakar Decoding Deception: Understanding Human Discrimination Ability in Differentiating Authentic Faces from Deepfake Deceits. Search on Bibsonomy ICIAP Workshops (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Nazia Sharmin Bayesian Models for Targeted Cyber Deception Strategies (Student Abstract). Search on Bibsonomy AAAI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Rachele Carli, Amro Najjar Reconsidering Deception in Social Robotics: The Role of Human Vulnerability (Student Abstract). Search on Bibsonomy AAAI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Verena Distler The Influence of Context on Response to Spear-Phishing Attacks: an In-Situ Deception Study. Search on Bibsonomy CHI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Haowen Yi, Fan Liu 0005, Rui Wang, Ning Hu, Zhihong Tian A Survey of Deception Defense: Approaches Used to Counter Malicious Behavior. Search on Bibsonomy CloudNet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Xiaodong Zheng, Jun Yang, Chengkai Tang, Shan Lu, Jiawei Ding, Yicheng Kong Key Region UAV Fusion Immersion Deception Algorithm. Search on Bibsonomy ICSPCC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Pengqi Wang, Yue Lin, Junyi Chai 0001 Unmasking Deception: A Comparative Study of Tree-Based and Transformer-Based Models for Fake Review Detection on Yelp. Search on Bibsonomy SMC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Myoung-Ho Chae, Chae-Taek Choi, Seung-Ho Choi, Chang-Hoon Lee Laboratory Verification Process for Redirection Algorithm Design using GNSS Deception. Search on Bibsonomy ICTC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Yuetong Lu, Jingyao Xu, Yandong Li, Siyang Lu, Wei Xiang 0007, Wei Lu 0010 The Art of Deception: Black-box Attack Against Text-to-Image Diffusion Model. Search on Bibsonomy ICPADS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Sonali Singh, Faranak Abri, Akbar Siami Namin Exploiting Large Language Models (LLMs) through Deception Techniques and Persuasion Principles. Search on Bibsonomy IEEE Big Data The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Shun-Wen Hsiao, Cheng-Yuan Sun LoRA-like Calibration for Multimodal Deception Detection using ATSFace Data. Search on Bibsonomy IEEE Big Data The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Kimberly Ferguson-Walter, Sunny Fugate, Cliff Wang, Matt Bishop Introduction to the Minitrack on Cyber Deception and Cyberpsychology for Defense. Search on Bibsonomy HICSS The full citation details ... 2023 DBLP  BibTeX  RDF
13Preet Derasari, Kailash Gogineni, Guru Venkataramani Mayalok: A Cyber-Deception Hardware Using Runtime Instruction Infusion. Search on Bibsonomy ASAP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Preet Derasari, Kailash Gogineni, Guru Venkataramani MAYAVI: A Cyber-Deception Hardware for Memory Load-Stores. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Francis Ward, Francesca Toni, Francesco Belardinelli, Tom Everitt Honesty Is the Best Policy: Defining and Mitigating AI Deception. Search on Bibsonomy NeurIPS The full citation details ... 2023 DBLP  BibTeX  RDF
13Samuel Rhys Cox, Grace Cheong, Wei Tsang Ooi "The Use of Deception in Dementia-Care Robots: Should Robots Tell "White Lies" to Limit Emotional Distress?". Search on Bibsonomy HAI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Andrei Kvasov, Merve Sahin, Cédric Hébert, Anderson Santana de Oliveira Simulating Deception for Web Applications Using Reinforcement Learning. Search on Bibsonomy ESORICS Workshops (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Sultan Ahmed, Md Jahangir Alam, Sajedul Talukder, Ismail Hossain Towards Addressing Identity Deception in Social Media using Bangla Text-Based Gender Identification. Search on Bibsonomy ASONAM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Kantwon Rogers, Reiden John Allen Webber, Ayanna M. Howard Lying About Lying: Examining Trust Repair Strategies After Robot Deception in a High-Stakes HRI Scenario. Search on Bibsonomy HRI (Companion) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Sean Ha, Gavin Smith, Robert Starr Thwarting Adversarial Network Reconnaissance Through Vulnerability Scan Denial and Deception with Data Plane Programming and P4. Search on Bibsonomy MILCOM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Noora Alhosani, Saed Alrabaee, Ahmed Al-Faresi An Efficient Strategy for Deploying Deception Technology. Search on Bibsonomy FABULOUS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Sudeep Mangalvedhekar, Kshitij Deshpande, Yash Patwardhan, Vedant Deshpande, Ravindra Murumkar Mavericks at ArAIEval Shared Task: Towards a Safer Digital Space - Transformer Ensemble Models Tackling Deception and Persuasion. Search on Bibsonomy ArabicNLP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Bryan Tuck, Fatima Zahra Qachfar, Dainis Boumber, Rakesh M. Verma DetectiveRedasers at ArAIEval Shared Task: Leveraging Transformer Ensembles for Arabic Deception Detection. Search on Bibsonomy ArabicNLP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Rachele Carli, Davide Calvaresi Reinterpreting Vulnerability to Tackle Deception in Principles-Based XAI for Human-Computer Interaction. Search on Bibsonomy EXTRAAMAS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Amir Javadpour, Forough Ja'fari, Tarik Taleb, Chafika Benzaïd A Mathematical Model for Analyzing Honeynets and Their Cyber Deception Techniques. Search on Bibsonomy ICECCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Joseph Bao, Murat Kantarcioglu, Yevgeniy Vorobeychik, Charles A. Kamhoua IoTFlowGenerator: Crafting Synthetic IoT Device Traffic Flows for Cyber Deception. Search on Bibsonomy FLAIRS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Chongyang Shi, Shuo Han 0002, Jie Fu Quantitative Planning with Action Deception in Concurrent Stochastic Games. Search on Bibsonomy AAMAS The full citation details ... 2023 DBLP  BibTeX  RDF
13Francis Rhys Ward, Francesca Toni, Francesco Belardinelli Defining Deception in Structural Causal Games. Search on Bibsonomy AAMAS The full citation details ... 2023 DBLP  BibTeX  RDF
13Suhaib Salah, Tarek Khater, Eqab R. F. Almajali, Wasiq Khan, Abir Hussain Deception Detection Deep Learning Comprehensive system Utilizing Explainable AI. Search on Bibsonomy DeSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Felipe Galarza-Jimenez, Jorge I. Poveda, Gianluca Bianchin, Emiliano Dall'Anese Extremum Seeking Under Persistent Gradient Deception: A Switching Systems Approach. Search on Bibsonomy IEEE Control. Syst. Lett. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Hampei Sasahara, Henrik Sandberg Epistemic Signaling Games for Cyber Deception With Asymmetric Recognition. Search on Bibsonomy IEEE Control. Syst. Lett. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Yawen Tan, Jiajia Liu 0001, Jiadai Wang How to Protect Key Drones in Unmanned Aerial Vehicle Networks? An SDN-Based Topology Deception Scheme. Search on Bibsonomy IEEE Trans. Veh. Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Shi Li, Wenfeng Cheng Augmenting the global semantic information between words to heterogeneous graph for deception detection. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Waleed Bin Shahid, Baber Aslam, Haider Abbas, Hammad Afzal, Saad Bin Khalid A deep learning assisted personalized deception system for countering web application attacks. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Qishui Zhong, Sheng Han 0002, Kaibo Shi, Xiao Cai, Oh-Min Kwon 0001, Shouming Zhong Secure consensus switching control for multiagent system under abnormal deception attacks and its application to unmanned surface vehicle clusters. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Huanruo Li, Yunfei Guo, Penghao Sun, Yawen Wang, Shumin Huo An optimal defensive deception framework for the container-based cloud with deep reinforcement learning. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Yukai Kong, Xiang Wang, Changxin Wu, Xianxiang Yu, Guolong Cui Active Deception Jamming Recognition in the Presence of Extended Target. Search on Bibsonomy IEEE Geosci. Remote. Sens. Lett. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Libing Huang, Zhulin Zong, Shunsheng Zhang, Wen-Qin Wang 2-D Moving Target Deception Against Multichannel SAR-GMTI Using Frequency Diverse Array. Search on Bibsonomy IEEE Geosci. Remote. Sens. Lett. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Zhengjie Li, Junwei Xie, Weijian Liu, Haowei Zhang 0001, Houhong Xiang Transmit Antenna Selection and Power Allocation for Joint Multi-Target Localization and Discrimination in MIMO Radar with Distributed Antennas under Deception Jamming. Search on Bibsonomy Remote. Sens. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Haowei Zhang 0001, Weijian Liu, Qiliang Zhang, Junwei Xie Joint resource optimization for a distributed MIMO radar when tracking multiple targets in the presence of deception jamming. Search on Bibsonomy Signal Process. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Maya Zheltyakova, Alexander Korotkov, Denis Cherednichenko, Maxim Kireev Functional Interactions Between Neural Substrates of Socio-cognitive Mechanisms Involved in Simple Deception and Manipulative Truth. Search on Bibsonomy Brain Connect. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Nguyen Van Huynh, Diep N. Nguyen, Dinh Thai Hoang, Thang X. Vu, Eryk Dutkiewicz, Symeon Chatzinotas Defeating Super-Reactive Jammers With Deception Strategy: Modeling, Signal Detection, and Performance Analysis. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Zhaoke Ning, Tong Wang 0003, Kai Zhang Dynamic event-triggered security control and fault detection for nonlinear systems with quantization and deception attack. Search on Bibsonomy Inf. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Qingcao Zhang, Xiuxia Yin, Songlin Hu A two-event-generator scheme for event-triggered control of uncertain NCSs under deception attacks. Search on Bibsonomy Inf. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Olayiwola Tokunbo Taofeek, Moatsum Alawida, Abdulatif Alabdulatif, Abiodun Esther Omolara, Oludare Isaac Abiodun A Cognitive Deception Model for Generating Fake Documents to Curb Data Exfiltration in Networks During Cyber-Attacks. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Sinead V. Fernandes, Muhammad Sana Ullah A Comprehensive Review on Features Extraction and Features Matching Techniques for Deception Detection. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Wengang Ao, Huiyan Zhang, Ning Zhao 0002, Luis I. Minchala Adaptive Neural Security Control for Networked Singular Systems Under Deception Attacks. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Mujahed Abdulqader, Abdallah Namoun, Yazed Alsaawy Fake Online Reviews: A Unified Detection Model Using Deception Theories. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Manar Alohaly, Olusesi Balogun, Daniel Takabi Integrating Cyber Deception Into Attribute-Based Access Control (ABAC) for Insider Threat Detection. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Arumugam Parivallal, Yongdo Lim, Juyoung Jeong Hybrid-Triggered H∞ Control for Parabolic PDE Systems Under Deception Attacks. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Olivier Tsemogne, Yezekael Hayel, Charles A. Kamhoua, Gabriel Deugoue Game-Theoretic Modeling of Cyber Deception Against Epidemic Botnets in Internet of Things. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Yahan Deng, Hongqian Lu, Wuneng Zhou Security Event-Triggered Filtering for Delayed Neural Networks Under Denial-of-Service Attack and Randomly Occurring Deception Attacks. Search on Bibsonomy Neural Process. Lett. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Juma Ibrahim, Slavko Gajin Entropy-based network traffic anomaly classification method resilient to deception. Search on Bibsonomy Comput. Sci. Inf. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Zizhao Dong, Gang Wang, Shaoyuan Lu, Luyao Dai, Shucheng Huang, Ye Liu 0010 Intentional-Deception Detection Based on Facial Muscle Movements in an Interactive Social Context. Search on Bibsonomy Pattern Recognit. Lett. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Katerina Papantoniou, Panagiotis Papadakos, Dimitris Plexousakis Culture Aware Deception Detection from Text. Search on Bibsonomy ERCIM News The full citation details ... 2022 DBLP  BibTeX  RDF
13Ning Zhang, Wenhai Qi, Guocheng Pang, Jun Cheng 0004, Kaibo Shi Observer-based sliding mode control for fuzzy stochastic switching systems with deception attacks. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Jiyang Xie 0004, Shuqian Zhu, Dawei Zhang 0004 A robust distributed secure interval observation approach for uncertain discrete-time positive systems under deception attacks. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Yingchun Wang, Wei Yan, Huaguang Zhang, Xiangpeng Xie Observer-based dynamic event-triggered H∞ LFC for power systems under actuator saturation and deception attack. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Haibin Sun, Yahui Cui, Linlin Hou, Kaibo Shi Adaptive finite-time control for cyber-physical systems with injection and deception attacks. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Fangzheng Lou, Feng Li 0009, Jing Wang 0071, Yan Wang Reliable output feedback control for persistent dwell-time switched piecewise-affine systems against deception attacks. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Zhen Mei, Ting Fang, Hao Shen 0001 Finite-time l2-l∞ filtering for persistent dwell-time switched piecewise-affine systems against deception attacks. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Baoxing Li, Tao Han, Bo Xiao, Xisheng Zhan 0001, Huaicheng Yan 0001 Leader-following bipartite consensus of multiple uncertain Euler-Lagrange systems under deception attacks. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13R. Sakthivel 0001, H. Divya, S. A. Karthick, Fanchao Kong Resilient Control-Based Fault Estimation for Networked Control Systems with Jumping Parameters and Deception Attacks. Search on Bibsonomy Circuits Syst. Signal Process. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Jalaj Pateria, Laxmi Ahuja, Subhranil Som Critical Path to Place Decoys in Deception Biota. Search on Bibsonomy Int. J. Perform. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Wenjing Wang, Junjie Wu 0001, Jifang Pei, Zhichao Sun, Jianyu Yang, Qingying Yi Antirange-Deception Jamming From Multijammer for Multistatic SAR. Search on Bibsonomy IEEE Trans. Geosci. Remote. Sens. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Mingyue Lou, Jianyu Yang, Zhongyu Li, Hang Ren, Hongyang An, Junjie Wu 0001 Joint Optimal and Adaptive 2-D Spatial Filtering Technique for FDA-MIMO SAR Deception Jamming Separation and Suppression. Search on Bibsonomy IEEE Trans. Geosci. Remote. Sens. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Qinzhe Lv, Yinghui Quan, Wei Feng 0004, Minghui Sha, Shuxian Dong, Mengdao Xing Radar Deception Jamming Recognition Based on Weighted Ensemble CNN With Transfer Learning. Search on Bibsonomy IEEE Trans. Geosci. Remote. Sens. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Wenjing Wang, Junjie Wu 0001, Jifang Pei, Zhichao Sun, Jianyu Yang Deception-Jamming Localization and Suppression via Configuration Optimization for Multistatic SAR. Search on Bibsonomy IEEE Trans. Geosci. Remote. Sens. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Jun Cheng 0004, Ju H. Park 0001, Zheng-Guang Wu, Huaicheng Yan 0001 Ultimate Boundedness Control for Networked Singularly Perturbed Systems With Deception Attacks: A Markovian Communication Protocol Approach. Search on Bibsonomy IEEE Trans. Netw. Sci. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Wei Yu, Xuhui Bu, Zhongsheng Hou Security Data-Driven Control for Nonlinear Systems Subject to Deception and False Data Injection Attacks. Search on Bibsonomy IEEE Trans. Netw. Sci. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 1875 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license