The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Deception with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1992 (19) 1993-1998 (18) 1999-2001 (25) 2002-2003 (32) 2004 (37) 2005 (62) 2006 (35) 2007 (40) 2008 (38) 2009 (33) 2010 (31) 2011 (27) 2012 (38) 2013 (34) 2014 (55) 2015 (70) 2016 (76) 2017 (85) 2018 (114) 2019 (149) 2020 (165) 2021 (194) 2022 (186) 2023 (244) 2024 (68)
Publication types (Num. hits)
article(941) book(4) incollection(24) inproceedings(885) phdthesis(19) proceedings(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 307 occurrences of 218 keywords

Results
Found 1875 publication records. Showing 1875 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
13Fan Wang 0006, Zidong Wang, Jinling Liang, Carlos Silvestre A Recursive Algorithm for Secure Filtering for Two-Dimensional State-Saturated Systems Under Network-Based Deception Attacks. Search on Bibsonomy IEEE Trans. Netw. Sci. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Xiufeng Mu, Zhou Gu, Lingzhi Hua Memory-based event-triggered leader-following consensus for T-S fuzzy multi-agent systems subject to deception attacks. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Zhichen Han, Shengbing Zhang, Zengwang Jin, Yanyan Hu Secure state estimation for event-triggered cyber-physical systems against deception attacks. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Hongqian Lu, Xiwen Wang, Wuneng Zhou, Yuexing Gou Hybrid-driven-based H∞ filtering for networked systems under randomly occurring deception attacks. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Fei Tan, Lili Zhou, Jianwei Xia Adaptive quantitative exponential synchronization in multiplex Cohen-Grossberg neural networks under deception attacks. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Xiufeng Mu, Zhou Gu, Lingzhi Hua Corrigendum to 'Memory-based event-triggered leader-following consensus for T-S fuzzy multi-agent systems subject to deception attacks' [Journal of the Franklin Institute Volume 359, Issue 1, January 2022, Pages 599-618]. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Wenhai Qi, Caiyu Lv, Ju H. Park 0001, Guangdeng Zong, Jun Cheng 0004, Kaibo Shi SMC for Semi-Markov Jump Cyber-Physical Systems Subject to Randomly Occurring Deception Attacks. Search on Bibsonomy IEEE Trans. Circuits Syst. II Express Briefs The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Mengxiang Liu, Chengcheng Zhao, Zhenyong Zhang, Ruilong Deng, Peng Cheng 0001, Jiming Chen 0001 Converter-Based Moving Target Defense Against Deception Attacks in DC Microgrids. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Zhong-Hua Pang, Lan-Zhi Fan, Haibin Guo, Yuntao Shi, Runqi Chai, Jian Sun 0003, Guo-Ping Liu 0003 Security of networked control systems subject to deception attacks: a survey. Search on Bibsonomy Int. J. Syst. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Mustafa O. Karabag, Melkior Ornik, Ufuk Topcu Deception in Supervisory Control. Search on Bibsonomy IEEE Trans. Autom. Control. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Hongyu Gao, Hongli Dong, Zidong Wang, Fei Han 0003 Recursive Minimum-Variance Filter Design for State-Saturated Complex Networks With Uncertain Coupling Strengths Subject to Deception Attacks. Search on Bibsonomy IEEE Trans. Cybern. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Jun Cheng 0004, Wentao Huang, Ju H. Park 0001, Jinde Cao A Hierarchical Structure Approach to Finite-Time Filter Design for Fuzzy Markov Switching Systems With Deception Attacks. Search on Bibsonomy IEEE Trans. Cybern. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Haifang Song, Derui Ding, Hongli Dong, Qing-Long Han Distributed Maximum Correntropy Filtering for Stochastic Nonlinear Systems Under Deception Attacks. Search on Bibsonomy IEEE Trans. Cybern. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Yuzhe Li, Yake Yang, Tianyou Chai, Tongwen Chen Stochastic detection against deception attacks in CPS: Performance evaluation and game-theoretic analysis. Search on Bibsonomy Autom. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Narges Babadi, Ali Doustmohammadi A moving target defence approach for detecting deception attacks on cyber-physical systems. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Shina Sheen, K. A. Asmitha, Sridhar Venkatesan R-Sentry: Deception based ransomware detection using file access patterns. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Karnati Mohan, Ayan Seal, Anis Yazidi, Ondrej Krejcar LieNet: A Deep Convolution Neural Network Framework for Detecting Deception. Search on Bibsonomy IEEE Trans. Cogn. Dev. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Zelin Wan, Jin-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles A. Kamhoua, Munindar P. Singh Foureye: Defensive Deception Against Advanced Persistent Threats via Hypergame Theory. Search on Bibsonomy IEEE Trans. Netw. Serv. Manag. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Ahmed H. Anwar, Charles A. Kamhoua, Nandi O. Leslie, Christopher Kiekintveld Honeypot Allocation for Cyber Deception Under Uncertainty. Search on Bibsonomy IEEE Trans. Netw. Serv. Manag. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Yue Yang, Jiangshuai Huang, Xiaojie Su, Kai Wang 0003, Guoqi Li Adaptive Control of Second-Order Nonlinear Systems With Injection and Deception Attacks. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Jun Cheng 0004, Yuyan Wu, Zheng-Guang Wu, Huaicheng Yan 0001 Nonstationary Filtering for Fuzzy Markov Switching Affine Systems With Quantization Effects and Deception Attacks. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Iury Bessa, Carlos Trapiello, Vicenç Puig, Reinaldo Martinez Palhares Dual-Rate Control Framework With Safe Watermarking Against Deception Attacks. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Di Zhao, Zidong Wang, Qing-Long Han, Guoliang Wei Proportional-Integral Observer Design for Uncertain Time-Delay Systems Subject to Deception Attacks: An Outlier-Resistant Approach. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Ruimei Zhang, Hongxia Wang 0001, Ju H. Park 0001, Hak-Keung Lam, Peisong He Quasisynchronization of Reaction-Diffusion Neural Networks Under Deception Attacks. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Jianhua Wang, Yan Song 0002, Guoliang Wei Security-Based Resilient Robust Model Predictive Control for Polytopic Uncertain Systems Subject to Deception Attacks and RR Protocol. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Xin Li 0055, Guoliang Wei, Derui Ding, Shuai Liu 0007 Recursive Filtering for Time-Varying Discrete Sequential Systems Subject to Deception Attacks: Weighted Try-Once-Discard Protocol. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Yi-Gang Li, Guang-Hong Yang Optimal innovation-based deception attacks with side information against remote state estimation in cyber-physical systems. Search on Bibsonomy Neurocomputing The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Shiping Li, Jianguo Guo An angle error extraction algorithm based on JADE for three-channel radar seeker system with the existence of deception jamming. Search on Bibsonomy Digit. Signal Process. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Jian Yang 0028, Jian Lu, Yuwei Tu, Zhiwei Yang Spatial deception suppression for wideband linear frequency modulation signals based on fractional Fourier transform with robust adaptive beamforming. Search on Bibsonomy Digit. Signal Process. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Huanruo Li, Yunfei Guo, Shumin Huo, Hongchao Hu, Penghao Sun Defensive deception framework against reconnaissance attacks in the cloud with deep reinforcement learning. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Hanchen Xiao, Derui Ding, Hongli Dong, Guoliang Wei Adaptive event-triggered state estimation for large-scale systems subject to deception attacks. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Jorge D. Camba, Pedro Company, Vetria L. Byrd, Beatriz Sousa Santos, Ginger Alford Identifying Deception as a Critical Component of Visualization Literacy. Search on Bibsonomy IEEE Computer Graphics and Applications The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Shaobo Zhang, Yuhang Liu, Dequan Yang A Novel IDS Securing Industrial Control System of Critical Infrastructure Using Deception Technology. Search on Bibsonomy Int. J. Digit. Crime Forensics The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Julian L. Rrushi Physics-Driven Page Fault Handling for Customized Deception against CPS Malware. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Jianwei Fan, Jun Huang 0006, Xudong Zhao 0001 Improved Interval Estimation Method for Cyber-Physical Systems Under Stealthy Deception Attacks. Search on Bibsonomy IEEE Trans. Signal Inf. Process. over Networks The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Hang Geng, Zidong Wang, Fuad E. Alsaadi, Khalid Hamed Alharbi, Yuhua Cheng 0001 Protocol-Based Fusion Estimator Design for State-Saturated Systems With Dead-Zone-Like Censoring Under Deception Attacks. Search on Bibsonomy IEEE Trans. Signal Inf. Process. over Networks The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Fan Zhang 0007, Tianying Meng, Deliang Xiang, Fei Ma, Xiaokun Sun, Yongsheng Zhou Adversarial Deception Against SAR Target Recognition Network. Search on Bibsonomy IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13David Liebowitz, Surya Nepal, Kristen Moore, Cody James Christopher, Salil S. Kanhere, David D. Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar Deception for Cyber Defence: Challenges and Opportunities. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Mateus Karvat Camara, Adriana Postal, Tomás Henrique Maul, Gustavo Paetzold Can lies be faked? Comparing low-stakes and high-stakes deception video datasets from a Machine Learning perspective. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Siddhant Bhambri, Purv Chauhan, Frederico Araujo, Adam Doupé, Subbarao Kambhampati Using Deception in Markov Game to Understand Adversarial Behaviors through a Capture-The-Flag Environment. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Rakesh M. Verma, Nachum Dershowitz, Victor Zeng, Xuting Liu Domain-Independent Deception: Definition, Taxonomy and the Linguistic Cues Debate. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Yibo Hu 0002, Yu Lin 0002, Erick Skorupa Parolin, Latifur Khan, Kevin W. Hamlen Controllable Fake Document Infilling for Cyber Deception. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Jingshi Yao, Xiang Yin 0003, Shaoyuan Li Sensor Deception Attacks Against Initial-State Privacy in Supervisory Control Systems. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Hampei Sasahara, Henrik Sandberg Asymptotic Security using Bayesian Defense Mechanisms with Application to Cyber Deception. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
13Jie Fu On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Keenan Jones, Enes Altuncu, Virginia N. L. Franqueira, Yichao Wang, Shujun Li A Comprehensive Survey of Natural Language Generation Advances from the Perspective of Digital Deception. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Mehmet Emin Aktas, Esra Akbas, Ashley Hahn Liars are more influential: Effect of Deception in Influence Maximization on Social Networks. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Liwei Guo, Kaiyang Zhao 0002, Yiying Zhang, Felix Xiaozhu Lin Protecting File Activities via Deception for ARM TrustZone. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Pritam Dash, Guanpeng Li, Mehdi Karimibiuki, Karthik Pattabiraman Replay-based Recovery for Autonomous Robotic Vehicles from Sensor Deception Attacks. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13David Noever, Matthew Ciolino The Turing Deception. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Marc Miquel-Ribé Dark User Experience: From Manipulation to Deception. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
13Loukas Ilias, Felix Soldner, Bennett Kleinberg Explainable Verbal Deception Detection using Transformers. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Gordon H. McCormick, Guillermo Owen The Role of Deception in a Game of 'Hide and Seek'. Search on Bibsonomy IGTR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Mehmet Umut Sen, Verónica Pérez-Rosas, Berrin A. Yanikoglu, Mohamed Abouelenien, Mihai Burzo, Rada Mihalcea Multimodal Deception Detection Using Real-Life Trial Data. Search on Bibsonomy IEEE Trans. Affect. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Ahmed Alharbi, Hai Dong, Xun Yi, Zahir Tari, Ibrahim Khalil Social Media Identity Deception Detection: A Survey. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Kelly Shortridge, Ryan Petrich Lamboozling attackers: a new generation of deception. Search on Bibsonomy Commun. ACM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Katerina Papantoniou, Panagiotis Papadakos, Theodore Patkos, George Flouris, Ion Androutsopoulos, Dimitris Plexousakis Deception detection in text and its relation to the cultural dimension of individualism/collectivism. Search on Bibsonomy Nat. Lang. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Ya Wang, Xinming Chen, Lei Shi 0012, Yuhua Cheng 0001, Houjun Wang A Trust Assessment-Based Distributed Localization Algorithm for Sensor Networks Under Deception Attacks. Search on Bibsonomy IEEE CAA J. Autom. Sinica The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Khubaib Ahmed Qureshi, Rauf Ahmed Shams Malick, Muhammad Sabih, Hocine Cherifi Deception detection on social media: A source-based perspective. Search on Bibsonomy Knowl. Based Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Huijun Zhang, Yang Ding, Lei Cao, Xin Wang 0117, Ling Feng Fine-Grained Question-Level Deception Detection via Graph-Based Learning and Cross-Modal Fusion. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Jiayu Zhou, Wenjie Ding, Wen Yang 0002 A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Amirhossein Asgharnia, Howard M. Schwartz 0001, Mohamed M. Atia Learning Deception Using Fuzzy Multi-Level Reinforcement Learning in a Multi-Defender One-Invader Differential Game. Search on Bibsonomy Int. J. Fuzzy Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Qian-Qian Li, Zi-Peng Wang, Huai-Ning Wu, Yueyang Li, Han-Xiong Li Mixed H2/H∞ Fault-Tolerant Sampled-Data Fuzzy Control for Nonlinear Parabolic PDE Systems Under Deception Attacks. Search on Bibsonomy Int. J. Fuzzy Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Lingge Zhou, Huizi Cui, Chongru Huang, Bingyi Kang, Jianfeng Zhang Counter Deception in Belief Functions Using Shapley Value Methodology. Search on Bibsonomy Int. J. Fuzzy Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Shuyu Zhang 0004, Yanqian Wang, Guangming Zhuang, Gongfei Song Dynamic Event-Based Asynchronous and Resilient Dissipative Filtering for T-S Fuzzy Markov Jump Singularly Perturbed Systems Against Deception Attacks. Search on Bibsonomy Int. J. Fuzzy Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Zixian Zeng, Shiguo Peng, Wandian Feng Quasi-Consensus of Time-Varying Multi-Agent Systems with External Inputs under Deception Attacks. Search on Bibsonomy Entropy The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Junaid Haseeb, Saif Ur Rehman Malik, Masood Mansoori, Ian Welch Probabilistic modelling of deception-based security framework using markov decision process. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Zhen Li 0025, Qi Liao 0002 Preventive portfolio against data-selling ransomware - A game theory of encryption and deception. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Junaid Haseeb, Saif Ur Rehman Malik, Masood Mansoori, Ian Welch Corrigendum to 'Probabilistic modelling of deception-based security framework using markov decision process' [Computers & Security 115 (2022)/102599]. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Marcus A. Butavicius, Ronnie Taib, Simon Jerome Han Why people keep falling for phishing scams: The effects of time pressure and deception cues on the detection of phishing emails. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Nathan Vance, Jeremy Speth, Siamul Karim Khan, Adam Czajka, Kevin W. Bowyer, Diane Wright, Patrick J. Flynn Deception Detection and Remote Physiological Monitoring: A Dataset and Baseline Experimental Results. Search on Bibsonomy IEEE Trans. Biom. Behav. Identity Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Shanshan Zhao, Minju Yi, Ziwei Liu Cooperative Anti-Deception Jamming in a Distributed Multiple-Radar System under Registration Errors. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Raquel Caballero-Águila, Jun Hu 0004, Josefa Linares-Pérez Two Compensation Strategies for Optimal Estimation in Sensor Networks with Random Matrices, Time-Correlated Noises, Deception Attacks and Packet Losses. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Pilla Vaishno Mohan, Shriniket Dixit, Amogh Gyaneshwar, Utkarsh Chadha, Kathiravan Srinivasan, Jung-Taek Seo Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Junfeng Gao, Lingyun Gu, Xiangde Min, Pan Lin, Chenhong Li, Quan Zhang, Nini Rao Brain Fingerprinting and Lie Detection: A Study of Dynamic Functional Connectivity Patterns of Deception Using EEG Phase Synchrony Analysis. Search on Bibsonomy IEEE J. Biomed. Health Informatics The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Junfeng Gao, Xiangde Min, Qianruo Kang, Huifang Si, Huimiao Zhan, Anne Manyande, Xuebi Tian, Yinhong Dong, Hua Zheng, Jian Song Effective Connectivity in Cortical Networks During Deception: A Lie Detection Study Based on EEG. Search on Bibsonomy IEEE J. Biomed. Health Informatics The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Shuti Wang, Xunhe Yin, Peng Li, Yanxin Zhang, Huabin Wen Consensus control of multi-agent systems with deception attacks using event-triggered adaptive cognitive control. Search on Bibsonomy Commun. Nonlinear Sci. Numer. Simul. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Fei Ding 0002, Xu Han 0011, Chao Jiang 0005, Jie Liu, Chen Peng 0001 Fuzzy Dynamic Output Feedback Force Security Control for Hysteretic Leaf Spring Hydro-Suspension With Servo Valve Opening Predictive Management Under Deception Attack. Search on Bibsonomy IEEE Trans. Fuzzy Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Ramalingam Sakthivel, Oh-Min Kwon 0001, Myeong-Jin Park, Seong-Gon Choi, Rathinasamy Sakthivel Robust Asynchronous Filtering for Discrete-Time T-S Fuzzy Complex Dynamical Networks Against Deception Attacks. Search on Bibsonomy IEEE Trans. Fuzzy Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Ruimei Zhang, Hongxia Wang 0001, Ju H. Park 0001, Peisong He, Deqiang Zeng, Xiangpeng Xie Fuzzy Secure Control for Nonlinear $N$-D Parabolic PDE-ODE Coupled Systems Under Stochastic Deception Attacks. Search on Bibsonomy IEEE Trans. Fuzzy Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Jun Cheng 0004, Yueying Wang, Ju H. Park 0001, Jinde Cao, Kaibo Shi Static Output Feedback Quantized Control for Fuzzy Markovian Switching Singularly Perturbed Systems With Deception Attacks. Search on Bibsonomy IEEE Trans. Fuzzy Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Merylin Monaro, Stéphanie Maldera, Cristina Scarpazza, Giuseppe Sartori, Nicolò Navarin Detecting deception through facial expressions in a dataset of videotaped interviews: A comparison between human judges and machine learning models. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Huihui Zhang, Lulu Li 0001, Xiaodi Li Exponential synchronization of coupled neural networks under stochastic deception attacks. Search on Bibsonomy Neural Networks The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13M. Mubeen Tajudeen, M. Syed Ali 0001, Syeda Asma Kauser, Khanyaluck Subkrajang, Anuwat Jirawattanapanit, Grienggrai Rajchakit Adaptive Event-Triggered Control for Complex Dynamical Network with Random Coupling Delay under Stochastic Deception Attacks. Search on Bibsonomy Complex. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Linan Huang, Quanyan Zhu A Dynamic Game Framework for Rational and Persistent Robot Deception With an Application to Deceptive Pursuit-Evasion. Search on Bibsonomy IEEE Trans Autom. Sci. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Valeria Fionda, Saif Aldeen Madi, Giuseppe Pirrò Community deception: from undirected to directed networks. Search on Bibsonomy Soc. Netw. Anal. Min. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Ali Kazemy, James Lam, Xian-Ming Zhang Event-Triggered Output Feedback Synchronization of Master-Slave Neural Networks Under Deception Attacks. Search on Bibsonomy IEEE Trans. Neural Networks Learn. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Jiaang Ge, Junwei Xie The deception effect of FDA counteracting amplitude-comparison monopulse reconnaissance. Search on Bibsonomy EURASIP J. Adv. Signal Process. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Saif Aldeen Madi, Giuseppe Pirrò Influence-Based Community Deception. Search on Bibsonomy COMPLEX NETWORKS (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Rudra Prasad Baksi Pay or Not Pay? A Game-Theoretical Analysis of Ransomware Interactions Considering a Defender's Deception Architecture. Search on Bibsonomy DSN (Supplements) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Daniel Reti, Daniel Fraunholz, Karina Elzer, Daniel Schneider 0007, Hans Dieter Schotten Evaluating Deception and Moving Target Defense with Network Attack Simulation. Search on Bibsonomy MTD@CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Duohe Ma, Zhimin Tang, Xiaoyan Sun 0003, Lu Guo, Liming Wang, Kai Chen Game Theory Approaches for Evaluating the Deception-based Moving Target Defense. Search on Bibsonomy MTD@CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Alena Velichko, Maxim Markitantov, Heysem Kaya, Alexey Karpov 0001 Complex Paralinguistic Analysis of Speech: Predicting Gender, Emotions and Deception in a Hierarchical Framework. Search on Bibsonomy INTERSPEECH The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Daniel N. Jones Shadows Behind the Keyboard: Dark Personalities and Deception in Cyberattacks. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Victor Zeng, Xuting Liu, Rakesh M. Verma Does Deception Leave a Content Independent Stylistic Trace? Search on Bibsonomy CODASPY The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Fatemeh Akbarian, William Tärneberg, Emma Fitzgerald, Maria Kihl Detection and mitigation of deception attacks on cloud-based industrial control systems. Search on Bibsonomy ICIN The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Hongliang Luo, Jieyi Liu, Jingyao Liu, Yue Wu 0004, Yaru Yin A Deception Jamming Discrimination Method Based on Semi-supervised Learning with Generative Adversarial Networks. Search on Bibsonomy IFIP TC12 ICIS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Saiying Ge Trust and Distrust Network in Group Deception: An Exploratory study. Search on Bibsonomy AMCIS The full citation details ... 2022 DBLP  BibTeX  RDF
13Casey Hanks, Rakesh M. Verma Data Quality and Linguistic Cues for Domain-independent Deception Detection. Search on Bibsonomy BDCAT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Morteza Safaei Pour, Joseph Khoury, Elias Bou-Harb HoneyComb: A Darknet-Centric Proactive Deception Technique For Curating IoT Malware Forensic Artifacts. Search on Bibsonomy NOMS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 1875 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license