|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 307 occurrences of 218 keywords
|
|
|
Results
Found 1875 publication records. Showing 1875 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
13 | Jie Fu |
On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GameSec ![In: Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings, pp. 67-86, 2022, Springer, 978-3-031-26368-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Ryan Gabrys, Mark Bilinski, Justin Mauger, Daniel Silva 0012, Sunny Fugate |
Casino Rationale: Countering Attacker Deception in Zero-Sum Stackelberg Security Games of Bounded Rationality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GameSec ![In: Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings, pp. 23-43, 2022, Springer, 978-3-031-26368-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Siddhant Bhambri, Purv Chauhan, Frederico Araujo, Adam Doupé, Subbarao Kambhampati |
Using Deception in Markov Game to Understand Adversarial Behaviors Through a Capture-The-Flag Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GameSec ![In: Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings, pp. 87-106, 2022, Springer, 978-3-031-26368-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Md. Abu Sayed, Ahmed H. Anwar, Christopher Kiekintveld, Branislav Bosanský, Charles A. Kamhoua |
Cyber Deception Against Zero-Day Attacks: A Game Theoretic Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GameSec ![In: Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings, pp. 44-63, 2022, Springer, 978-3-031-26368-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Ara Mambreyan, Elena Punskaya, Hatice Gunes |
Dataset Bias in Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR ![In: 26th International Conference on Pattern Recognition, ICPR 2022, Montreal, QC, Canada, August 21-25, 2022, pp. 1083-1089, 2022, IEEE, 978-1-6654-9062-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Merve Sahin, Cédric Hébert, Rocío Cabrera Lozoya |
An Approach to Generate Realistic HTTP Parameters for Application Layer Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Rome, Italy, June 20-23, 2022, Proceedings, pp. 337-355, 2022, Springer, 978-3-031-09233-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Jingshi Yao, Xiang Yin 0003, Shaoyuan Li |
Sensor Deception Attacks Against Initial-State Privacy in Supervisory Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDC ![In: 61st IEEE Conference on Decision and Control, CDC 2022, Cancun, Mexico, December 6-9, 2022, pp. 4839-4845, 2022, IEEE, 978-1-6654-6761-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Arunava Naha, André Teixeira 0001, Anders Ahlén, Subhrakanti Dey |
Structural analyses of a parsimonious watermarking policy for data deception attack detection in networked control systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDC ![In: 61st IEEE Conference on Decision and Control, CDC 2022, Cancun, Mexico, December 6-9, 2022, pp. 7648-7655, 2022, IEEE, 978-1-6654-6761-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo |
Web Cache Deception Escalates! ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, pp. 179-196, 2022, USENIX Association, 978-1-939133-31-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Yinan Bao, Qianwen Ma, Lingwei Wei, Ding Wang, Wei Zhou 0019, Songlin Hu |
Deception Detection Towards Multi-turn Question Answering with Context Selector Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRICAI (1) ![In: PRICAI 2022: Trends in Artificial Intelligence - 19th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2022, Shanghai, China, November 10-13, 2022, Proceedings, Part I, pp. 304-315, 2022, Springer, 978-3-031-20861-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Francis Rhys Ward, Francesca Toni, Francesco Belardinelli |
A Causal Perspective on AI Deception in Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICLP Workshops ![In: Proceedings of the International Conference on Logic Programming 2022 Workshops co-located with the 38th International Conference on Logic Programming (ICLP 2022), Haifa, Israel, July 31st - August 1st, 2022., 2022, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Sadat Shahriar, Arjun Mukherjee, Omprakash Gnawali |
Deception Detection with Feature-Augmentation by Soft Domain Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SocInfo ![In: Social Informatics - 13th International Conference, SocInfo 2022, Glasgow, UK, October 19-21, 2022, Proceedings, pp. 373-380, 2022, Springer, 978-3-031-19096-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Ahmed H. Anwar, Mu Zhu, Zelin Wan, Jin-Hee Cho, Charles A. Kamhoua, Munindar P. Singh |
Honeypot-Based Cyber Deception Against Malicious Reconnaissance via Hypergame Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: IEEE Global Communications Conference, GLOBECOM 2022, Rio de Janeiro, Brazil, December 4-8, 2022, pp. 3393-3398, 2022, IEEE, 978-1-6654-3540-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Stephan D. Frisbie, Mohamed F. Younis |
AI-Enabled Jammer Deception Using Decoy Packets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: IEEE Global Communications Conference, GLOBECOM 2022, Rio de Janeiro, Brazil, December 4-8, 2022, pp. 5013-5018, 2022, IEEE, 978-1-6654-3540-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Md Ali Reza Al Amin, Sachin Shetty, Charles A. Kamhoua |
Cyber Deception Metrics For Interconnected Complex Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Winter Simulation Conference, WSC 2022, Singapore, December 11-14, 2022, pp. 473-483, 2022, IEEE, 978-1-6654-7661-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Masoumeh Abolfathi, Ilan Shomorony, Alireza Vahid, Jafar Haadi Jafarian |
A Game-Theoretically Optimal Defense Paradigm against Traffic Analysis Attacks using Multipath Routing and Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8 - 10, 2022, pp. 67-78, 2022, ACM, 978-1-4503-9357-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Kristen Moore, Cody James Christopher, David Liebowitz, Surya Nepal, Renee Selvey |
Modelling direct messaging networks with multiple recipients for cyber deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P ![In: 7th IEEE European Symposium on Security and Privacy, EuroS&P 2022, Genoa, Italy, June 6-10, 2022, pp. 1-19, 2022, IEEE, 978-1-6654-1614-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Arlen Fan, Yuxin Ma, Michelle Mancenido, Ross Maciejewski |
Annotating Line Charts for Addressing Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022 - 5 May 2022, pp. 80:1-80:12, 2022, ACM, 978-1-4503-9157-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Cathy Mengying Fang, G. R. Marvez, Neska El Haouij, Rosalind W. Picard |
Cardiac Arrest: Evaluating the Role of Biosignals in Gameplay Strategies and Players' Physiological Synchrony in Social Deception Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022 - 5 May 2022, Extended Abstracts, pp. 240:1-240:7, 2022, ACM, 978-1-4503-9156-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | N. Kalaichelvi, K. S. Easwarakumar |
A Comprehensive Survey on Community Deception Approaches in Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCSP ![In: Computer, Communication, and Signal Processing - 6th IFIP TC 5 International Conference, ICCCSP 2022, Chennai, India, February 24-25, 2022, Revised Selected Papers, pp. 163-173, 2022, Springer, 978-3-031-11632-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Ying Zhang, Lei Ma 0013, Chunyu Yang 0001, Linna Zhou |
Formation Control for Quadrotor Swarms with Deception Attacks Via Singular Perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ROBIO ![In: IEEE International Conference on Robotics and Biomimetics, ROBIO 2022, Jinghong, China, December 5-9, 2022, pp. 189-194, 2022, IEEE, 978-1-6654-8110-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Petr Stejskal, Martin Faix |
Legal Aspects of Misattribution Caused by Cyber Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyCom ![In: 14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022, pp. 205-218, 2022, IEEE, 978-9916-9789-1-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Ahmed H. Anwar, Charles A. Kamhoua |
Cyber Deception using Honeypot Allocation and Diversity: A Game Theoretic Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: 19th IEEE Annual Consumer Communications & Networking Conference, CCNC 2022, Las Vegas, NV, USA, January 8-11, 2022, pp. 543-549, 2022, IEEE, 978-1-6654-3161-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Md Ali Reza Al Amin, Peter Foytik, Sachin Shetty, Jessica Dorismond, Marco A. Gamarra |
Deception for Characterizing Adversarial Strategies in Complex Networked Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: 19th IEEE Annual Consumer Communications & Networking Conference, CCNC 2022, Las Vegas, NV, USA, January 8-11, 2022, pp. 429-432, 2022, IEEE, 978-1-6654-3161-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Yuantian Zhang, Feng Liu, Huashan Chen |
Optimal Strategy Selection for Cyber Deception via Deep Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta ![In: IEEE Smartworld, Ubiquitous Intelligence & Computing, Scalable Computing & Communications, Digital Twin, Privacy Computing, Metaverse, Autonomous & Trusted Vehicles, SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022, Haikou, China, December 15-18, 2022, pp. 1841-1847, 2022, IEEE, 979-8-3503-4655-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Kevin Matthe Caramancion |
Using Timer Data to Conjunct Self-Reported Measures in Quantifying Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIIoT ![In: 2022 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, June 6-9, 2022, pp. 65-70, 2022, IEEE, 978-1-6654-8453-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Shun-Wen Hsiao, Cheng-Yuan Sun |
Attention-Aware Multi-modal RNN for Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Big Data ![In: IEEE International Conference on Big Data, Big Data 2022, Osaka, Japan, December 17-20, 2022, pp. 3593-3596, 2022, IEEE, 978-1-6654-8045-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Sunny Fugate, Matt Bishop, Cliff Wang, Kimberly Ferguson-Walter |
Introduction to the Minitrack on Cyber Deception and Cyberpsychology for Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 55th Hawaii International Conference on System Sciences, HICSS 2022, Virtual Event / Maui, Hawaii, USA, January 4-7, 2022, pp. 1-2, 2022, ScholarSpace. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Yibo Hu 0002, Yu Lin 0002, Erick Skorupa Parolin, Latifur Khan, Kevin W. Hamlen |
Controllable Fake Document Infilling for Cyber Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EMNLP (Findings) ![In: Findings of the Association for Computational Linguistics: EMNLP 2022, Abu Dhabi, United Arab Emirates, December 7-11, 2022., pp. 6505-6519, 2022, Association for Computational Linguistics. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Haula Galadima, Amar Seeam, Visham Ramsurrun |
Cyber Deception against DDoS attack using Moving Target Defence Framework in SDN IOT-EDGE Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NextComp ![In: 3rd International Conference on Next Generation Computing Applications, NextComp 2022, Flic-en-Flac, Mauritius, October 6-8, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-6954-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Phan The Duy, Hien Do Hoang, Nghi Hoang Khoa, Do Thi Thu Hien, Van-Hau Pham |
Fool Your Enemies: Enable Cyber Deception and Moving Target Defense for Intrusion Detection in SDN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIT ![In: 21st International Symposium on Communications and Information Technologies, ISCIT 2022, Xi'an, China, September 27-30, 2022, pp. 27-32, 2022, IEEE, 978-1-6654-9851-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Lin-Yu Lu, Shih-Wen Lin, Chia-Chi Chu, Jian-Hong Liu |
Generalized Deception Attack Detection of Consensus Control in Isolated AC Microgrids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: IEEE Industry Applications Society Annual Meeting, IAS 2022, Detroit, MI, USA, October 9-14, 2022, pp. 1-8, 2022, IEEE, 978-1-6654-7815-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Amal Sayari, Yacine Djemaiel, Slim Rekhis, Ali Mabrouk, Belhassen Jerbi |
Attack Modeling and Cyber Deception Resources Deployment Using Multi-layer Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: Advanced Information Networking and Applications - Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022), Volume 2, pp. 560-572, 2022, Springer, 978-3-030-99586-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Maria Luce Lupetti, Maarten Van Mechelen |
Promoting Children's Critical Thinking Towards Robotics through Robot Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HRI ![In: ACM/IEEE International Conference on Human-Robot Interaction, HRI 2022, Sapporo, Hokkaido, Japan, March 7 - 10, 2022, pp. 588-597, 2022, IEEE / ACM. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Felix O. Olowononi, Danda B. Rawat, Charles A. Kamhoua, Brian M. Sadler |
Deep Reinforcement Learning for Deception in IRS-assisted UAV Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MILCOM ![In: IEEE Military Communications Conference, MILCOM 2022, Rockville, MD, USA, November 28 - December 2, 2022, pp. 763-768, 2022, IEEE, 978-1-6654-8534-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Paolo Dario, Gastone Ciuti, Alberto Pirni, Marianna Capasso, Piercosma Bisconti |
Social Robots Between Trust and Deception: The Impact on Institutions and Practices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Robophilosophy ![In: Social Robots in Social Institutions - Proceedings of Robophilosophy 2022, Helsinki, Finland, August 16-19, 2022, pp. 677-682, 2022, IOS Press, 978-1-64368-374-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Ying Wu 0014, Mou Chen, Wei Hu |
Event-Triggered Optimal Cooperative NN Control for UAV Systems with Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARM ![In: International Conference on Advanced Robotics and Mechatronics , ICARM 2022, Guilin, China, July 9-11, 2022, pp. 213-218, 2022, IEEE, 978-1-6654-8306-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Ronald C. Arkin |
Robots that Need to Mislead: Biologically-inspired Machine Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIES ![In: AIES '22: AAAI/ACM Conference on AI, Ethics, and Society, Oxford, United Kingdom, May 19 - 21, 2021, pp. 1, 2022, ACM, 978-1-4503-9247-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Wiem Tounsi |
Cyber Deception, the Ultimate Piece of a Defensive Strategy - Proof of Concept. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSNet ![In: 6th Cyber Security in Networking Conference, CSNet 2022, Rio de Janeiro, Brazil, October 24-26, 2022, pp. 1-5, 2022, IEEE, 979-8-3503-9722-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Francis Rhys Ward, Francesco Belardinelli, Francesca Toni |
A causal perspective on AI deception in games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISafety@IJCAI ![In: Proceedings of the Workshop on Artificial Intelligence Safety 2022 (AISafety 2022) co-located with the Thirty-First International Joint Conference on Artificial Intelligence and the Twenty-Fifth European Conference on Artificial Intelligence (IJCAI-ECAI-2022), Vienna, Austria, July 24-25, 2022., 2022, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Ron Alford, Lukás Chrpa, Mauro Vallati, Andy Applebaum |
Knowledge Reformulation and Deception as a Defense Against Automated Cyber Adversaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FLAIRS ![In: Proceedings of the Thirty-Fifth International Florida Artificial Intelligence Research Society Conference, FLAIRS 2022, Hutchinson Island, Jensen Beach, Florida, USA, May 15-18, 2022., 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Francielle Alves Vargas, Jonas D'Alessandro, Zohar Rabinovich, Fabrício Benevenuto, Thiago A. S. Pardo |
Rhetorical Structure Approach for Online Deception Detection: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LREC ![In: Proceedings of the Thirteenth Language Resources and Evaluation Conference, LREC 2022, Marseille, France, 20-25 June 2022, pp. 5906-5915, 2022, European Language Resources Association. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Subhadarshi Panda, Sarah Ita Levitan |
Improving Cross-domain, Cross-lingual and Multi-modal Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACL (student) ![In: Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics: Student Research Workshop, ACL 2022, Dublin, Ireland, May 22-27, 2022, pp. 383-390, 2022, Association for Computational Linguistics, 978-1-955917-23-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Subhadarshi Panda |
Deception Detection Across Domains, Languages and Modalities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
13 | Serge Kamguia |
Game Theory for Cyber Deception against Network SIR Epidemics. (Théorie des jeux et cybertromperie contre les épidémies réseau de type SIR). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
13 | Abhishek Ninad Kulkarni, Huan Luo, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu |
Deceptive Labeling: Hypergames on Graphs for Stealthy Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Control. Syst. Lett. ![In: IEEE Control. Syst. Lett. 5(3), pp. 977-982, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Weiming Fu, Jiahu Qin, Wei Xing Zheng 0001, Yuhang Chen, Yu Kang 0001 |
Resilient Cooperative Source Seeking of Double-Integrator Multi-Robot Systems Under Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Electron. ![In: IEEE Trans. Ind. Electron. 68(5), pp. 4218-4227, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Jing-Ming Guo, Chih-Hsien Hsia, Li-Wei Hsiao, Chen-Chieh Yao |
Contactless Deception Detection System with Hybrid Facial Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Sci. Eng. ![In: J. Inf. Sci. Eng. 37(4), pp. 793-808, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Eoin Conroy, Magdalena Kowal, Adam J. Toth, Mark John Campbell |
Boosting: Rank and skill deception in esports. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entertain. Comput. ![In: Entertain. Comput. 36, pp. 100393, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Tom McVey |
Trickbot re-emerges with fresh deception techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Netw. Secur. ![In: Netw. Secur. 2021(4), pp. 6, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Raúl Rodríguez-Ferrándiz, Cande Sánchez-Olmos, Tatiana Hidalgo-Marí, Estela Saquete Boró |
Memetics of Deception: Spreading Local Meme Hoaxes during COVID-19 1st Year. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 13(6), pp. 152, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Takanori Machida, Dai Yamamoto, Yuki Unno, Hisashi Kojima |
Novel Deception Techniques for Malware Detection on Industrial Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Process. ![In: J. Inf. Process. 29, pp. 559-571, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Suchi Kumari, Riteshkumar Jayprakash Yadav, Suyel Namasudra, Ching-Hsien Hsu |
Intelligent deception techniques against adversarial attack on the industrial system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Intell. Syst. ![In: Int. J. Intell. Syst. 36(5), pp. 2412-2437, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Nguyen Van Huynh, Dinh Thai Hoang, Diep N. Nguyen, Eryk Dutkiewicz |
DeepFake: Deep Dueling-Based Deception Strategy to Defeat Reactive Jammers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 20(10), pp. 6898-6914, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Benjamin Doerr, Martin S. Krejca |
The Univariate Marginal Distribution Algorithm Copes Well with Deception and Epistasis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Evol. Comput. ![In: Evol. Comput. 29(4), pp. 543-563, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Weihao Song, Zidong Wang, Jianan Wang, Jiayuan Shan |
Particle filtering for a class of cyber-physical systems under Round-Robin protocol subject to randomly occurring deception attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 544, pp. 298-307, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Jianwen Feng, Jiaming Xie, Jingyi Wang 0001, Yi Zhao 0002 |
Secure synchronization of stochastic complex networks subject to deception attack with nonidentical nodes and internal disturbance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 547, pp. 514-525, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Zhanjie Li, Jun Zhao 0002 |
Resilient adaptive control of switched nonlinear cyber-physical systems under uncertain deception attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 543, pp. 398-409, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Hui Zhao 0017, Xuewu Dai |
Event-triggered adaptive control for multiple high-speed trains with deception attacks in bottleneck sections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 547, pp. 470-481, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Zhiying Wu, Junlin Xiong, Min Xie 0001 |
Dynamic event-triggered L∞ control for networked control systems under deception attacks: a switching method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 561, pp. 168-180, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Xiang Sun, Zhou Gu, Fan Yang, Shen Yan |
Memory-event-trigger-based secure control of cloud-aided active suspension systems against deception attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 543, pp. 1-17, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Hongping Zhou, Chengcheng Dong, Ruowu Wu, Xiong Xu, Zhongyi Guo |
Feature Fusion Based on Bayesian Decision Theory for Radar Deception Jamming Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 16296-16304, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Abdul Basit Ajmal, Masoom Alam, Awais Abdul Khaliq, Shawal Khan, Zakria Qadir, M. A. Parvez Mahmud |
Last Line of Defense: Reliability Through Inducing Cyber Threat Hunting With Deception in SCADA Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 126789-126800, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Lizhang Wang, Chunxiao Fan 0001, Cong Xie, Wei Zhou |
Leader-Following Consensus of Multiple Euler-Lagrange Systems Under Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 100548-100557, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Sinead V. Fernandes, Muhammad Sana Ullah |
Use of Machine Learning for Deception Detection From Spectral and Cepstral Features of Speech Signals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 78925-78935, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Tingting Yin, Zhou Gu |
Security Control for Adaptive Event-Triggered Networked Control Systems Under Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 10789-10796, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles A. Kamhoua |
Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 49662-49682, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Mang Tang, Qingyang Sun, Ting Shu, Kai-Bor Yu, Wenxian Yu, Changqing Xu |
A Moving Target Deception Jamming Method Based on Fast Azimuth-Domain Block EM Calculation Against SAR-GMTI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 133641-133649, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra |
Online Social Deception and Its Countermeasures: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 1770-1806, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | M. Sathishkumar, Yen-Chen Liu |
Resilient Annular Finite-Time Bounded and Adaptive Event-Triggered Control for Networked Switched Systems With Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 92288-92299, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Henrik Skaug Sætra |
Social robot deception and the culture of trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Paladyn J. Behav. Robotics ![In: Paladyn J. Behav. Robotics 12(1), pp. 276-286, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Di Wang, Jiahao Huang, Yang Tang, Fangfei Li |
A Watermarking Strategy Against Linear Deception Attacks on Remote State Estimation Under K-L Divergence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 17(5), pp. 3273-3281, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Benjamin Litherland |
Ludosity, Radical Contextualism, and a New Games History: Pleasure, Truth, and Deception in the Mid-20th-Century London Arcade. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Games Cult. ![In: Games Cult. 16(2), pp. 139-159, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Yuyan Wu, Jun Cheng 0004, Xia Zhou, Jinde Cao, Mengzhuo Luo |
Asynchronous filtering for nonhomogeneous Markov jumping systems with deception attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 394, pp. 125790, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Mingqi Xing, Yanqian Wang, Guangming Zhuang, Fu Chen |
Event-based asynchronous and resilient filtering for singular Markov jump LPV systems against deception attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 403, pp. 126176, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Dongji Wang, Fei Chen, Bo Meng, Xingliu Hu, Jing Wang 0071 |
Event-based secure H∞ load frequency control for delayed power systems subject to deception attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 394, pp. 125788, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Dong Ding, Ze Tang, Yan Wang 0049, Zhicheng Ji |
Secure synchronization of complex networks under deception attacks against vulnerable nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 399, pp. 126017, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Yuanbo Fang, Hongliang Fu, Huawei Tao, Ruiyu Liang, Li Zhao 0003 |
A Novel Hybrid Network Model Based on Attentional Multi-Feature Fusion for Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(3), pp. 622-626, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | William Steingartner, Darko Galinec, Andrija Kozina |
Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 13(4), pp. 597, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Bao-Lin Zhang 0001, En-Zhi Cao, Zhihui Cai, Hao Su, Gong-You Tang |
Event-triggered H∞ control for networked spar-type floating production platforms with active tuned heave plate mechanisms and deception attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Frankl. Inst. ![In: J. Frankl. Inst. 358(7), pp. 3554-3584, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Zhipei Hu, Feiqi Deng, Yongkang Su, Jin Zhang 0015, Songlin Hu |
Security control of networked systems with deception attacks and packet dropouts: A discrete-time approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Frankl. Inst. ![In: J. Frankl. Inst. 358(16), pp. 8193-8206, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Zhiying Wu, Junlin Xiong, Min Xie 0001 |
Improved event-triggered control for networked control systems subject to deception attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Frankl. Inst. ![In: J. Frankl. Inst. 358(4), pp. 2229-2252, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Xia Zhou, Yanfang Tang, Jun Cheng 0004, Jinde Cao, Changfeng Xue, Dong Yan |
Nonstationary quantized control for discrete-time Markov jump singularly perturbed systems against deception attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Frankl. Inst. ![In: J. Frankl. Inst. 358(6), pp. 2915-2932, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Yue Yang, Jiangshuai Huang, Xiaojie Su, Benmin Deng |
Adaptive control of cyber-physical systems under deception and injection attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Frankl. Inst. ![In: J. Frankl. Inst. 358(12), pp. 6174-6194, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Bin Wei, Engang Tian, Jinliang Liu, Xia Zhao |
Probabilistic-constrained tracking control for stochastic time-varying systems under deception attacks: A Round-Robin protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Frankl. Inst. ![In: J. Frankl. Inst. 358(17), pp. 9135-9157, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Caiyun Wang, Jiahao Huang, Di Wang, Fangfei Li |
A secure strategy for a cyber physical system with multi-sensor under linear deception attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Frankl. Inst. ![In: J. Frankl. Inst. 358(13), pp. 6666-6683, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Wei Wang 0016, Zhen Han, Kexin Liu, Jinhu Lü |
Distributed Adaptive Resilient Formation Control of Uncertain Nonholonomic Mobile Robots Under Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. I Regul. Pap. ![In: IEEE Trans. Circuits Syst. I Regul. Pap. 68(9), pp. 3822-3835, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Jie Lian 0001, Yuchen Han |
Switching-Like Event-Triggered Control for Networked Markovian Jump Systems Under Deception Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. II Express Briefs ![In: IEEE Trans. Circuits Syst. II Express Briefs 68(10), pp. 3271-3275, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Wei Yao 0005, Jiajun Nan, Yifan Zhao, Jiakun Fang, Xiaomeng Ai, Wenping Zuo, Jinyu Wen, Shijie Cheng |
Resilient Wide-Area Damping Control for Inter-Area Oscillations to Tolerate Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Smart Grid ![In: IEEE Trans. Smart Grid 12(5), pp. 4238-4249, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Ali Kazemy, James Lam, Zhao Chang |
Adaptive event-triggered mechanism for networked control systems under deception attacks with uncertain occurring probability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Syst. Sci. ![In: Int. J. Syst. Sci. 52(7), pp. 1426-1439, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Jinnan Zhang, Jinbo Song, Jiahui Li, Fei Han 0003, Hongbin Zhang |
Observer-based non-fragile H∞-consensus control for multi-agent systems under deception attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Syst. Sci. ![In: Int. J. Syst. Sci. 52(6), pp. 1223-1236, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Yang Xu 0050, Yuan Yuan 0006, Hongjiu Yang, Dalin Zhou |
The safety region-based model predictive control for discrete-time systems under deception attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Syst. Sci. ![In: Int. J. Syst. Sci. 52(10), pp. 2144-2160, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Zehua Yu, Jun Li 0007, Qinghua Guo 0001 |
Message Passing Based Target Localization Under Range Deception Jamming in Distributed MIMO Radar. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Signal Process. Lett. ![In: IEEE Signal Process. Lett. 28, pp. 1858-1862, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Libing Huang, Zhulin Zong, Shunsheng Zhang, Wen-Qin Wang |
Joint Two-Dimensional Deception Countering ISAR via Frequency Diverse Array. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Signal Process. Lett. ![In: IEEE Signal Process. Lett. 28, pp. 773-777, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Amanda J. C. Sharkey, Noel E. Sharkey |
We need to talk about deception in social robotics! ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ethics Inf. Technol. ![In: Ethics Inf. Technol. 23(3), pp. 309-316, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Jun Wang 0083, Baocang Ding, Jianchen Hu |
Security Control for LPV System With Deception Attacks via Model Predictive Control: A Dynamic Output Feedback Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Autom. Control. ![In: IEEE Trans. Autom. Control. 66(2), pp. 760-767, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Rômulo Meira-Góes, Stéphane Lafortune, Hervé Marchand |
Synthesis of Supervisors Robust Against Sensor Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Autom. Control. ![In: IEEE Trans. Autom. Control. 66(10), pp. 4990-4997, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Huanruo Li, Yunfei Guo, Shumin Huo, Yuehang Ding |
EDGE: An Enticing Deceptive-content GEnerator as Defensive Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 15(5), pp. 1891-1908, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Edward A. Cranford, Cleotilde Gonzalez, Palvi Aggarwal, Milind Tambe, Sarah Cooney, Christian Lebiere |
Towards a Cognitive Theory of Cyber Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cogn. Sci. ![In: Cogn. Sci. 45(7), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Manvi Kamboj, Christian Hessler, Priyanka Asnani, Kais Riani, Mohamed Abouelenien |
Multimodal Political Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Multim. ![In: IEEE Multim. 28(1), pp. 94-102, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 1875 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|