|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 307 occurrences of 218 keywords
|
|
|
Results
Found 1875 publication records. Showing 1875 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
13 | Fan Wang 0006, Zidong Wang, Jinling Liang, Carlos Silvestre |
A Recursive Algorithm for Secure Filtering for Two-Dimensional State-Saturated Systems Under Network-Based Deception Attacks. |
IEEE Trans. Netw. Sci. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Xiufeng Mu, Zhou Gu, Lingzhi Hua |
Memory-based event-triggered leader-following consensus for T-S fuzzy multi-agent systems subject to deception attacks. |
J. Frankl. Inst. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Zhichen Han, Shengbing Zhang, Zengwang Jin, Yanyan Hu |
Secure state estimation for event-triggered cyber-physical systems against deception attacks. |
J. Frankl. Inst. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Hongqian Lu, Xiwen Wang, Wuneng Zhou, Yuexing Gou |
Hybrid-driven-based H∞ filtering for networked systems under randomly occurring deception attacks. |
J. Frankl. Inst. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Fei Tan, Lili Zhou, Jianwei Xia |
Adaptive quantitative exponential synchronization in multiplex Cohen-Grossberg neural networks under deception attacks. |
J. Frankl. Inst. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Xiufeng Mu, Zhou Gu, Lingzhi Hua |
Corrigendum to 'Memory-based event-triggered leader-following consensus for T-S fuzzy multi-agent systems subject to deception attacks' [Journal of the Franklin Institute Volume 359, Issue 1, January 2022, Pages 599-618]. |
J. Frankl. Inst. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Wenhai Qi, Caiyu Lv, Ju H. Park 0001, Guangdeng Zong, Jun Cheng 0004, Kaibo Shi |
SMC for Semi-Markov Jump Cyber-Physical Systems Subject to Randomly Occurring Deception Attacks. |
IEEE Trans. Circuits Syst. II Express Briefs |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Mengxiang Liu, Chengcheng Zhao, Zhenyong Zhang, Ruilong Deng, Peng Cheng 0001, Jiming Chen 0001 |
Converter-Based Moving Target Defense Against Deception Attacks in DC Microgrids. |
IEEE Trans. Smart Grid |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Zhong-Hua Pang, Lan-Zhi Fan, Haibin Guo, Yuntao Shi, Runqi Chai, Jian Sun 0003, Guo-Ping Liu 0003 |
Security of networked control systems subject to deception attacks: a survey. |
Int. J. Syst. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Mustafa O. Karabag, Melkior Ornik, Ufuk Topcu |
Deception in Supervisory Control. |
IEEE Trans. Autom. Control. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Hongyu Gao, Hongli Dong, Zidong Wang, Fei Han 0003 |
Recursive Minimum-Variance Filter Design for State-Saturated Complex Networks With Uncertain Coupling Strengths Subject to Deception Attacks. |
IEEE Trans. Cybern. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Jun Cheng 0004, Wentao Huang, Ju H. Park 0001, Jinde Cao |
A Hierarchical Structure Approach to Finite-Time Filter Design for Fuzzy Markov Switching Systems With Deception Attacks. |
IEEE Trans. Cybern. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Haifang Song, Derui Ding, Hongli Dong, Qing-Long Han |
Distributed Maximum Correntropy Filtering for Stochastic Nonlinear Systems Under Deception Attacks. |
IEEE Trans. Cybern. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Yuzhe Li, Yake Yang, Tianyou Chai, Tongwen Chen |
Stochastic detection against deception attacks in CPS: Performance evaluation and game-theoretic analysis. |
Autom. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Narges Babadi, Ali Doustmohammadi |
A moving target defence approach for detecting deception attacks on cyber-physical systems. |
Comput. Electr. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Shina Sheen, K. A. Asmitha, Sridhar Venkatesan |
R-Sentry: Deception based ransomware detection using file access patterns. |
Comput. Electr. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Karnati Mohan, Ayan Seal, Anis Yazidi, Ondrej Krejcar |
LieNet: A Deep Convolution Neural Network Framework for Detecting Deception. |
IEEE Trans. Cogn. Dev. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Zelin Wan, Jin-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles A. Kamhoua, Munindar P. Singh |
Foureye: Defensive Deception Against Advanced Persistent Threats via Hypergame Theory. |
IEEE Trans. Netw. Serv. Manag. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Ahmed H. Anwar, Charles A. Kamhoua, Nandi O. Leslie, Christopher Kiekintveld |
Honeypot Allocation for Cyber Deception Under Uncertainty. |
IEEE Trans. Netw. Serv. Manag. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Yue Yang, Jiangshuai Huang, Xiaojie Su, Kai Wang 0003, Guoqi Li |
Adaptive Control of Second-Order Nonlinear Systems With Injection and Deception Attacks. |
IEEE Trans. Syst. Man Cybern. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Jun Cheng 0004, Yuyan Wu, Zheng-Guang Wu, Huaicheng Yan 0001 |
Nonstationary Filtering for Fuzzy Markov Switching Affine Systems With Quantization Effects and Deception Attacks. |
IEEE Trans. Syst. Man Cybern. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Iury Bessa, Carlos Trapiello, Vicenç Puig, Reinaldo Martinez Palhares |
Dual-Rate Control Framework With Safe Watermarking Against Deception Attacks. |
IEEE Trans. Syst. Man Cybern. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Di Zhao, Zidong Wang, Qing-Long Han, Guoliang Wei |
Proportional-Integral Observer Design for Uncertain Time-Delay Systems Subject to Deception Attacks: An Outlier-Resistant Approach. |
IEEE Trans. Syst. Man Cybern. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Ruimei Zhang, Hongxia Wang 0001, Ju H. Park 0001, Hak-Keung Lam, Peisong He |
Quasisynchronization of Reaction-Diffusion Neural Networks Under Deception Attacks. |
IEEE Trans. Syst. Man Cybern. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Jianhua Wang, Yan Song 0002, Guoliang Wei |
Security-Based Resilient Robust Model Predictive Control for Polytopic Uncertain Systems Subject to Deception Attacks and RR Protocol. |
IEEE Trans. Syst. Man Cybern. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Xin Li 0055, Guoliang Wei, Derui Ding, Shuai Liu 0007 |
Recursive Filtering for Time-Varying Discrete Sequential Systems Subject to Deception Attacks: Weighted Try-Once-Discard Protocol. |
IEEE Trans. Syst. Man Cybern. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Yi-Gang Li, Guang-Hong Yang |
Optimal innovation-based deception attacks with side information against remote state estimation in cyber-physical systems. |
Neurocomputing |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Shiping Li, Jianguo Guo |
An angle error extraction algorithm based on JADE for three-channel radar seeker system with the existence of deception jamming. |
Digit. Signal Process. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Jian Yang 0028, Jian Lu, Yuwei Tu, Zhiwei Yang |
Spatial deception suppression for wideband linear frequency modulation signals based on fractional Fourier transform with robust adaptive beamforming. |
Digit. Signal Process. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Huanruo Li, Yunfei Guo, Shumin Huo, Hongchao Hu, Penghao Sun |
Defensive deception framework against reconnaissance attacks in the cloud with deep reinforcement learning. |
Sci. China Inf. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Hanchen Xiao, Derui Ding, Hongli Dong, Guoliang Wei |
Adaptive event-triggered state estimation for large-scale systems subject to deception attacks. |
Sci. China Inf. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Jorge D. Camba, Pedro Company, Vetria L. Byrd, Beatriz Sousa Santos, Ginger Alford |
Identifying Deception as a Critical Component of Visualization Literacy. |
IEEE Computer Graphics and Applications |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Shaobo Zhang, Yuhang Liu, Dequan Yang |
A Novel IDS Securing Industrial Control System of Critical Infrastructure Using Deception Technology. |
Int. J. Digit. Crime Forensics |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Julian L. Rrushi |
Physics-Driven Page Fault Handling for Customized Deception against CPS Malware. |
ACM Trans. Embed. Comput. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Jianwei Fan, Jun Huang 0006, Xudong Zhao 0001 |
Improved Interval Estimation Method for Cyber-Physical Systems Under Stealthy Deception Attacks. |
IEEE Trans. Signal Inf. Process. over Networks |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Hang Geng, Zidong Wang, Fuad E. Alsaadi, Khalid Hamed Alharbi, Yuhua Cheng 0001 |
Protocol-Based Fusion Estimator Design for State-Saturated Systems With Dead-Zone-Like Censoring Under Deception Attacks. |
IEEE Trans. Signal Inf. Process. over Networks |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Fan Zhang 0007, Tianying Meng, Deliang Xiang, Fei Ma, Xiaokun Sun, Yongsheng Zhou |
Adversarial Deception Against SAR Target Recognition Network. |
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | David Liebowitz, Surya Nepal, Kristen Moore, Cody James Christopher, Salil S. Kanhere, David D. Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar |
Deception for Cyber Defence: Challenges and Opportunities. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Mateus Karvat Camara, Adriana Postal, Tomás Henrique Maul, Gustavo Paetzold |
Can lies be faked? Comparing low-stakes and high-stakes deception video datasets from a Machine Learning perspective. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Siddhant Bhambri, Purv Chauhan, Frederico Araujo, Adam Doupé, Subbarao Kambhampati |
Using Deception in Markov Game to Understand Adversarial Behaviors through a Capture-The-Flag Environment. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Rakesh M. Verma, Nachum Dershowitz, Victor Zeng, Xuting Liu |
Domain-Independent Deception: Definition, Taxonomy and the Linguistic Cues Debate. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Yibo Hu 0002, Yu Lin 0002, Erick Skorupa Parolin, Latifur Khan, Kevin W. Hamlen |
Controllable Fake Document Infilling for Cyber Deception. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Jingshi Yao, Xiang Yin 0003, Shaoyuan Li |
Sensor Deception Attacks Against Initial-State Privacy in Supervisory Control Systems. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Hampei Sasahara, Henrik Sandberg |
Asymptotic Security using Bayesian Defense Mechanisms with Application to Cyber Deception. |
CoRR |
2022 |
DBLP BibTeX RDF |
|
13 | Jie Fu |
On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Keenan Jones, Enes Altuncu, Virginia N. L. Franqueira, Yichao Wang, Shujun Li |
A Comprehensive Survey of Natural Language Generation Advances from the Perspective of Digital Deception. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Mehmet Emin Aktas, Esra Akbas, Ashley Hahn |
Liars are more influential: Effect of Deception in Influence Maximization on Social Networks. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Liwei Guo, Kaiyang Zhao 0002, Yiying Zhang, Felix Xiaozhu Lin |
Protecting File Activities via Deception for ARM TrustZone. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Pritam Dash, Guanpeng Li, Mehdi Karimibiuki, Karthik Pattabiraman |
Replay-based Recovery for Autonomous Robotic Vehicles from Sensor Deception Attacks. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
13 | David Noever, Matthew Ciolino |
The Turing Deception. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Marc Miquel-Ribé |
Dark User Experience: From Manipulation to Deception. |
CoRR |
2022 |
DBLP BibTeX RDF |
|
13 | Loukas Ilias, Felix Soldner, Bennett Kleinberg |
Explainable Verbal Deception Detection using Transformers. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Gordon H. McCormick, Guillermo Owen |
The Role of Deception in a Game of 'Hide and Seek'. |
IGTR |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Mehmet Umut Sen, Verónica Pérez-Rosas, Berrin A. Yanikoglu, Mohamed Abouelenien, Mihai Burzo, Rada Mihalcea |
Multimodal Deception Detection Using Real-Life Trial Data. |
IEEE Trans. Affect. Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Ahmed Alharbi, Hai Dong, Xun Yi, Zahir Tari, Ibrahim Khalil |
Social Media Identity Deception Detection: A Survey. |
ACM Comput. Surv. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Kelly Shortridge, Ryan Petrich |
Lamboozling attackers: a new generation of deception. |
Commun. ACM |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Katerina Papantoniou, Panagiotis Papadakos, Theodore Patkos, George Flouris, Ion Androutsopoulos, Dimitris Plexousakis |
Deception detection in text and its relation to the cultural dimension of individualism/collectivism. |
Nat. Lang. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Ya Wang, Xinming Chen, Lei Shi 0012, Yuhua Cheng 0001, Houjun Wang |
A Trust Assessment-Based Distributed Localization Algorithm for Sensor Networks Under Deception Attacks. |
IEEE CAA J. Autom. Sinica |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Khubaib Ahmed Qureshi, Rauf Ahmed Shams Malick, Muhammad Sabih, Hocine Cherifi |
Deception detection on social media: A source-based perspective. |
Knowl. Based Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Huijun Zhang, Yang Ding, Lei Cao, Xin Wang 0117, Ling Feng |
Fine-Grained Question-Level Deception Detection via Graph-Based Learning and Cross-Modal Fusion. |
IEEE Trans. Inf. Forensics Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Jiayu Zhou, Wenjie Ding, Wen Yang 0002 |
A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation. |
IEEE Trans. Inf. Forensics Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Amirhossein Asgharnia, Howard M. Schwartz 0001, Mohamed M. Atia |
Learning Deception Using Fuzzy Multi-Level Reinforcement Learning in a Multi-Defender One-Invader Differential Game. |
Int. J. Fuzzy Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Qian-Qian Li, Zi-Peng Wang, Huai-Ning Wu, Yueyang Li, Han-Xiong Li |
Mixed H2/H∞ Fault-Tolerant Sampled-Data Fuzzy Control for Nonlinear Parabolic PDE Systems Under Deception Attacks. |
Int. J. Fuzzy Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Lingge Zhou, Huizi Cui, Chongru Huang, Bingyi Kang, Jianfeng Zhang |
Counter Deception in Belief Functions Using Shapley Value Methodology. |
Int. J. Fuzzy Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Shuyu Zhang 0004, Yanqian Wang, Guangming Zhuang, Gongfei Song |
Dynamic Event-Based Asynchronous and Resilient Dissipative Filtering for T-S Fuzzy Markov Jump Singularly Perturbed Systems Against Deception Attacks. |
Int. J. Fuzzy Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Zixian Zeng, Shiguo Peng, Wandian Feng |
Quasi-Consensus of Time-Varying Multi-Agent Systems with External Inputs under Deception Attacks. |
Entropy |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Junaid Haseeb, Saif Ur Rehman Malik, Masood Mansoori, Ian Welch |
Probabilistic modelling of deception-based security framework using markov decision process. |
Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Zhen Li 0025, Qi Liao 0002 |
Preventive portfolio against data-selling ransomware - A game theory of encryption and deception. |
Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Junaid Haseeb, Saif Ur Rehman Malik, Masood Mansoori, Ian Welch |
Corrigendum to 'Probabilistic modelling of deception-based security framework using markov decision process' [Computers & Security 115 (2022)/102599]. |
Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Marcus A. Butavicius, Ronnie Taib, Simon Jerome Han |
Why people keep falling for phishing scams: The effects of time pressure and deception cues on the detection of phishing emails. |
Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Nathan Vance, Jeremy Speth, Siamul Karim Khan, Adam Czajka, Kevin W. Bowyer, Diane Wright, Patrick J. Flynn |
Deception Detection and Remote Physiological Monitoring: A Dataset and Baseline Experimental Results. |
IEEE Trans. Biom. Behav. Identity Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Shanshan Zhao, Minju Yi, Ziwei Liu |
Cooperative Anti-Deception Jamming in a Distributed Multiple-Radar System under Registration Errors. |
Sensors |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Raquel Caballero-Águila, Jun Hu 0004, Josefa Linares-Pérez |
Two Compensation Strategies for Optimal Estimation in Sensor Networks with Random Matrices, Time-Correlated Noises, Deception Attacks and Packet Losses. |
Sensors |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Pilla Vaishno Mohan, Shriniket Dixit, Amogh Gyaneshwar, Utkarsh Chadha, Kathiravan Srinivasan, Jung-Taek Seo |
Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions. |
Sensors |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Junfeng Gao, Lingyun Gu, Xiangde Min, Pan Lin, Chenhong Li, Quan Zhang, Nini Rao |
Brain Fingerprinting and Lie Detection: A Study of Dynamic Functional Connectivity Patterns of Deception Using EEG Phase Synchrony Analysis. |
IEEE J. Biomed. Health Informatics |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Junfeng Gao, Xiangde Min, Qianruo Kang, Huifang Si, Huimiao Zhan, Anne Manyande, Xuebi Tian, Yinhong Dong, Hua Zheng, Jian Song |
Effective Connectivity in Cortical Networks During Deception: A Lie Detection Study Based on EEG. |
IEEE J. Biomed. Health Informatics |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Shuti Wang, Xunhe Yin, Peng Li, Yanxin Zhang, Huabin Wen |
Consensus control of multi-agent systems with deception attacks using event-triggered adaptive cognitive control. |
Commun. Nonlinear Sci. Numer. Simul. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Fei Ding 0002, Xu Han 0011, Chao Jiang 0005, Jie Liu, Chen Peng 0001 |
Fuzzy Dynamic Output Feedback Force Security Control for Hysteretic Leaf Spring Hydro-Suspension With Servo Valve Opening Predictive Management Under Deception Attack. |
IEEE Trans. Fuzzy Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Ramalingam Sakthivel, Oh-Min Kwon 0001, Myeong-Jin Park, Seong-Gon Choi, Rathinasamy Sakthivel |
Robust Asynchronous Filtering for Discrete-Time T-S Fuzzy Complex Dynamical Networks Against Deception Attacks. |
IEEE Trans. Fuzzy Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Ruimei Zhang, Hongxia Wang 0001, Ju H. Park 0001, Peisong He, Deqiang Zeng, Xiangpeng Xie |
Fuzzy Secure Control for Nonlinear $N$-D Parabolic PDE-ODE Coupled Systems Under Stochastic Deception Attacks. |
IEEE Trans. Fuzzy Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Jun Cheng 0004, Yueying Wang, Ju H. Park 0001, Jinde Cao, Kaibo Shi |
Static Output Feedback Quantized Control for Fuzzy Markovian Switching Singularly Perturbed Systems With Deception Attacks. |
IEEE Trans. Fuzzy Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Merylin Monaro, Stéphanie Maldera, Cristina Scarpazza, Giuseppe Sartori, Nicolò Navarin |
Detecting deception through facial expressions in a dataset of videotaped interviews: A comparison between human judges and machine learning models. |
Comput. Hum. Behav. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Huihui Zhang, Lulu Li 0001, Xiaodi Li |
Exponential synchronization of coupled neural networks under stochastic deception attacks. |
Neural Networks |
2022 |
DBLP DOI BibTeX RDF |
|
13 | M. Mubeen Tajudeen, M. Syed Ali 0001, Syeda Asma Kauser, Khanyaluck Subkrajang, Anuwat Jirawattanapanit, Grienggrai Rajchakit |
Adaptive Event-Triggered Control for Complex Dynamical Network with Random Coupling Delay under Stochastic Deception Attacks. |
Complex. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Linan Huang, Quanyan Zhu |
A Dynamic Game Framework for Rational and Persistent Robot Deception With an Application to Deceptive Pursuit-Evasion. |
IEEE Trans Autom. Sci. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Valeria Fionda, Saif Aldeen Madi, Giuseppe Pirrò |
Community deception: from undirected to directed networks. |
Soc. Netw. Anal. Min. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Ali Kazemy, James Lam, Xian-Ming Zhang |
Event-Triggered Output Feedback Synchronization of Master-Slave Neural Networks Under Deception Attacks. |
IEEE Trans. Neural Networks Learn. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Jiaang Ge, Junwei Xie |
The deception effect of FDA counteracting amplitude-comparison monopulse reconnaissance. |
EURASIP J. Adv. Signal Process. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Saif Aldeen Madi, Giuseppe Pirrò |
Influence-Based Community Deception. |
COMPLEX NETWORKS (2) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Rudra Prasad Baksi |
Pay or Not Pay? A Game-Theoretical Analysis of Ransomware Interactions Considering a Defender's Deception Architecture. |
DSN (Supplements) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Daniel Reti, Daniel Fraunholz, Karina Elzer, Daniel Schneider 0007, Hans Dieter Schotten |
Evaluating Deception and Moving Target Defense with Network Attack Simulation. |
MTD@CCS |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Duohe Ma, Zhimin Tang, Xiaoyan Sun 0003, Lu Guo, Liming Wang, Kai Chen |
Game Theory Approaches for Evaluating the Deception-based Moving Target Defense. |
MTD@CCS |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Alena Velichko, Maxim Markitantov, Heysem Kaya, Alexey Karpov 0001 |
Complex Paralinguistic Analysis of Speech: Predicting Gender, Emotions and Deception in a Hierarchical Framework. |
INTERSPEECH |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Daniel N. Jones |
Shadows Behind the Keyboard: Dark Personalities and Deception in Cyberattacks. |
IWSPA@CODASPY |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Victor Zeng, Xuting Liu, Rakesh M. Verma |
Does Deception Leave a Content Independent Stylistic Trace? |
CODASPY |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Fatemeh Akbarian, William Tärneberg, Emma Fitzgerald, Maria Kihl |
Detection and mitigation of deception attacks on cloud-based industrial control systems. |
ICIN |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Hongliang Luo, Jieyi Liu, Jingyao Liu, Yue Wu 0004, Yaru Yin |
A Deception Jamming Discrimination Method Based on Semi-supervised Learning with Generative Adversarial Networks. |
IFIP TC12 ICIS |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Saiying Ge |
Trust and Distrust Network in Group Deception: An Exploratory study. |
AMCIS |
2022 |
DBLP BibTeX RDF |
|
13 | Casey Hanks, Rakesh M. Verma |
Data Quality and Linguistic Cues for Domain-independent Deception Detection. |
BDCAT |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Morteza Safaei Pour, Joseph Khoury, Elias Bou-Harb |
HoneyComb: A Darknet-Centric Proactive Deception Technique For Curating IoT Malware Forensic Artifacts. |
NOMS |
2022 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #600 of 1875 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|