The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for deception with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1992 (19) 1993-1998 (18) 1999-2001 (25) 2002-2003 (32) 2004 (37) 2005 (62) 2006 (35) 2007 (40) 2008 (38) 2009 (33) 2010 (31) 2011 (27) 2012 (38) 2013 (34) 2014 (55) 2015 (70) 2016 (76) 2017 (85) 2018 (114) 2019 (149) 2020 (165) 2021 (194) 2022 (186) 2023 (244) 2024 (68)
Publication types (Num. hits)
article(941) book(4) incollection(24) inproceedings(885) phdthesis(19) proceedings(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 307 occurrences of 218 keywords

Results
Found 1875 publication records. Showing 1875 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
13Jie Fu On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers. Search on Bibsonomy GameSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Ryan Gabrys, Mark Bilinski, Justin Mauger, Daniel Silva 0012, Sunny Fugate Casino Rationale: Countering Attacker Deception in Zero-Sum Stackelberg Security Games of Bounded Rationality. Search on Bibsonomy GameSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Siddhant Bhambri, Purv Chauhan, Frederico Araujo, Adam Doupé, Subbarao Kambhampati Using Deception in Markov Game to Understand Adversarial Behaviors Through a Capture-The-Flag Environment. Search on Bibsonomy GameSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Md. Abu Sayed, Ahmed H. Anwar, Christopher Kiekintveld, Branislav Bosanský, Charles A. Kamhoua Cyber Deception Against Zero-Day Attacks: A Game Theoretic Approach. Search on Bibsonomy GameSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Ara Mambreyan, Elena Punskaya, Hatice Gunes Dataset Bias in Deception Detection. Search on Bibsonomy ICPR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Merve Sahin, Cédric Hébert, Rocío Cabrera Lozoya An Approach to Generate Realistic HTTP Parameters for Application Layer Deception. Search on Bibsonomy ACNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Jingshi Yao, Xiang Yin 0003, Shaoyuan Li Sensor Deception Attacks Against Initial-State Privacy in Supervisory Control Systems. Search on Bibsonomy CDC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Arunava Naha, André Teixeira 0001, Anders Ahlén, Subhrakanti Dey Structural analyses of a parsimonious watermarking policy for data deception attack detection in networked control systems. Search on Bibsonomy CDC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo Web Cache Deception Escalates! Search on Bibsonomy USENIX Security Symposium The full citation details ... 2022 DBLP  BibTeX  RDF
13Yinan Bao, Qianwen Ma, Lingwei Wei, Ding Wang, Wei Zhou 0019, Songlin Hu Deception Detection Towards Multi-turn Question Answering with Context Selector Network. Search on Bibsonomy PRICAI (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Francis Rhys Ward, Francesca Toni, Francesco Belardinelli A Causal Perspective on AI Deception in Games. Search on Bibsonomy ICLP Workshops The full citation details ... 2022 DBLP  BibTeX  RDF
13Sadat Shahriar, Arjun Mukherjee, Omprakash Gnawali Deception Detection with Feature-Augmentation by Soft Domain Transfer. Search on Bibsonomy SocInfo The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Ahmed H. Anwar, Mu Zhu, Zelin Wan, Jin-Hee Cho, Charles A. Kamhoua, Munindar P. Singh Honeypot-Based Cyber Deception Against Malicious Reconnaissance via Hypergame Theory. Search on Bibsonomy GLOBECOM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Stephan D. Frisbie, Mohamed F. Younis AI-Enabled Jammer Deception Using Decoy Packets. Search on Bibsonomy GLOBECOM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Md Ali Reza Al Amin, Sachin Shetty, Charles A. Kamhoua Cyber Deception Metrics For Interconnected Complex Systems. Search on Bibsonomy WSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Masoumeh Abolfathi, Ilan Shomorony, Alireza Vahid, Jafar Haadi Jafarian A Game-Theoretically Optimal Defense Paradigm against Traffic Analysis Attacks using Multipath Routing and Deception. Search on Bibsonomy SACMAT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Kristen Moore, Cody James Christopher, David Liebowitz, Surya Nepal, Renee Selvey Modelling direct messaging networks with multiple recipients for cyber deception. Search on Bibsonomy EuroS&P The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Arlen Fan, Yuxin Ma, Michelle Mancenido, Ross Maciejewski Annotating Line Charts for Addressing Deception. Search on Bibsonomy CHI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Cathy Mengying Fang, G. R. Marvez, Neska El Haouij, Rosalind W. Picard Cardiac Arrest: Evaluating the Role of Biosignals in Gameplay Strategies and Players' Physiological Synchrony in Social Deception Games. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13N. Kalaichelvi, K. S. Easwarakumar A Comprehensive Survey on Community Deception Approaches in Social Networks. Search on Bibsonomy ICCCSP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Ying Zhang, Lei Ma 0013, Chunyu Yang 0001, Linna Zhou Formation Control for Quadrotor Swarms with Deception Attacks Via Singular Perturbation. Search on Bibsonomy ROBIO The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Petr Stejskal, Martin Faix Legal Aspects of Misattribution Caused by Cyber Deception. Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Ahmed H. Anwar, Charles A. Kamhoua Cyber Deception using Honeypot Allocation and Diversity: A Game Theoretic Approach. Search on Bibsonomy CCNC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Md Ali Reza Al Amin, Peter Foytik, Sachin Shetty, Jessica Dorismond, Marco A. Gamarra Deception for Characterizing Adversarial Strategies in Complex Networked Systems. Search on Bibsonomy CCNC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Yuantian Zhang, Feng Liu, Huashan Chen Optimal Strategy Selection for Cyber Deception via Deep Reinforcement Learning. Search on Bibsonomy SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Kevin Matthe Caramancion Using Timer Data to Conjunct Self-Reported Measures in Quantifying Deception. Search on Bibsonomy AIIoT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Shun-Wen Hsiao, Cheng-Yuan Sun Attention-Aware Multi-modal RNN for Deception Detection. Search on Bibsonomy IEEE Big Data The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Sunny Fugate, Matt Bishop, Cliff Wang, Kimberly Ferguson-Walter Introduction to the Minitrack on Cyber Deception and Cyberpsychology for Defense. Search on Bibsonomy HICSS The full citation details ... 2022 DBLP  BibTeX  RDF
13Yibo Hu 0002, Yu Lin 0002, Erick Skorupa Parolin, Latifur Khan, Kevin W. Hamlen Controllable Fake Document Infilling for Cyber Deception. Search on Bibsonomy EMNLP (Findings) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Haula Galadima, Amar Seeam, Visham Ramsurrun Cyber Deception against DDoS attack using Moving Target Defence Framework in SDN IOT-EDGE Networks. Search on Bibsonomy NextComp The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Phan The Duy, Hien Do Hoang, Nghi Hoang Khoa, Do Thi Thu Hien, Van-Hau Pham Fool Your Enemies: Enable Cyber Deception and Moving Target Defense for Intrusion Detection in SDN. Search on Bibsonomy ISCIT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Lin-Yu Lu, Shih-Wen Lin, Chia-Chi Chu, Jian-Hong Liu Generalized Deception Attack Detection of Consensus Control in Isolated AC Microgrids. Search on Bibsonomy IAS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Amal Sayari, Yacine Djemaiel, Slim Rekhis, Ali Mabrouk, Belhassen Jerbi Attack Modeling and Cyber Deception Resources Deployment Using Multi-layer Graph. Search on Bibsonomy AINA (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Maria Luce Lupetti, Maarten Van Mechelen Promoting Children's Critical Thinking Towards Robotics through Robot Deception. Search on Bibsonomy HRI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Felix O. Olowononi, Danda B. Rawat, Charles A. Kamhoua, Brian M. Sadler Deep Reinforcement Learning for Deception in IRS-assisted UAV Communications. Search on Bibsonomy MILCOM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Paolo Dario, Gastone Ciuti, Alberto Pirni, Marianna Capasso, Piercosma Bisconti Social Robots Between Trust and Deception: The Impact on Institutions and Practices. Search on Bibsonomy Robophilosophy The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Ying Wu 0014, Mou Chen, Wei Hu Event-Triggered Optimal Cooperative NN Control for UAV Systems with Deception Attacks. Search on Bibsonomy ICARM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Ronald C. Arkin Robots that Need to Mislead: Biologically-inspired Machine Deception. Search on Bibsonomy AIES The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Wiem Tounsi Cyber Deception, the Ultimate Piece of a Defensive Strategy - Proof of Concept. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Francis Rhys Ward, Francesco Belardinelli, Francesca Toni A causal perspective on AI deception in games. Search on Bibsonomy AISafety@IJCAI The full citation details ... 2022 DBLP  BibTeX  RDF
13Ron Alford, Lukás Chrpa, Mauro Vallati, Andy Applebaum Knowledge Reformulation and Deception as a Defense Against Automated Cyber Adversaries. Search on Bibsonomy FLAIRS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Francielle Alves Vargas, Jonas D'Alessandro, Zohar Rabinovich, Fabrício Benevenuto, Thiago A. S. Pardo Rhetorical Structure Approach for Online Deception Detection: A Survey. Search on Bibsonomy LREC The full citation details ... 2022 DBLP  BibTeX  RDF
13Subhadarshi Panda, Sarah Ita Levitan Improving Cross-domain, Cross-lingual and Multi-modal Deception Detection. Search on Bibsonomy ACL (student) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Subhadarshi Panda Deception Detection Across Domains, Languages and Modalities. Search on Bibsonomy 2022   RDF
13Serge Kamguia Game Theory for Cyber Deception against Network SIR Epidemics. (Théorie des jeux et cybertromperie contre les épidémies réseau de type SIR). Search on Bibsonomy 2022   RDF
13Abhishek Ninad Kulkarni, Huan Luo, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu Deceptive Labeling: Hypergames on Graphs for Stealthy Deception. Search on Bibsonomy IEEE Control. Syst. Lett. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Weiming Fu, Jiahu Qin, Wei Xing Zheng 0001, Yuhang Chen, Yu Kang 0001 Resilient Cooperative Source Seeking of Double-Integrator Multi-Robot Systems Under Deception Attacks. Search on Bibsonomy IEEE Trans. Ind. Electron. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Jing-Ming Guo, Chih-Hsien Hsia, Li-Wei Hsiao, Chen-Chieh Yao Contactless Deception Detection System with Hybrid Facial Features. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2021 DBLP  BibTeX  RDF
13Eoin Conroy, Magdalena Kowal, Adam J. Toth, Mark John Campbell Boosting: Rank and skill deception in esports. Search on Bibsonomy Entertain. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Tom McVey Trickbot re-emerges with fresh deception techniques. Search on Bibsonomy Netw. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Raúl Rodríguez-Ferrándiz, Cande Sánchez-Olmos, Tatiana Hidalgo-Marí, Estela Saquete Boró Memetics of Deception: Spreading Local Meme Hoaxes during COVID-19 1st Year. Search on Bibsonomy Future Internet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Takanori Machida, Dai Yamamoto, Yuki Unno, Hisashi Kojima Novel Deception Techniques for Malware Detection on Industrial Control Systems. Search on Bibsonomy J. Inf. Process. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Suchi Kumari, Riteshkumar Jayprakash Yadav, Suyel Namasudra, Ching-Hsien Hsu Intelligent deception techniques against adversarial attack on the industrial system. Search on Bibsonomy Int. J. Intell. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Nguyen Van Huynh, Dinh Thai Hoang, Diep N. Nguyen, Eryk Dutkiewicz DeepFake: Deep Dueling-Based Deception Strategy to Defeat Reactive Jammers. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Benjamin Doerr, Martin S. Krejca The Univariate Marginal Distribution Algorithm Copes Well with Deception and Epistasis. Search on Bibsonomy Evol. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Weihao Song, Zidong Wang, Jianan Wang, Jiayuan Shan Particle filtering for a class of cyber-physical systems under Round-Robin protocol subject to randomly occurring deception attacks. Search on Bibsonomy Inf. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Jianwen Feng, Jiaming Xie, Jingyi Wang 0001, Yi Zhao 0002 Secure synchronization of stochastic complex networks subject to deception attack with nonidentical nodes and internal disturbance. Search on Bibsonomy Inf. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Zhanjie Li, Jun Zhao 0002 Resilient adaptive control of switched nonlinear cyber-physical systems under uncertain deception attacks. Search on Bibsonomy Inf. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Hui Zhao 0017, Xuewu Dai Event-triggered adaptive control for multiple high-speed trains with deception attacks in bottleneck sections. Search on Bibsonomy Inf. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Zhiying Wu, Junlin Xiong, Min Xie 0001 Dynamic event-triggered L∞ control for networked control systems under deception attacks: a switching method. Search on Bibsonomy Inf. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Xiang Sun, Zhou Gu, Fan Yang, Shen Yan Memory-event-trigger-based secure control of cloud-aided active suspension systems against deception attacks. Search on Bibsonomy Inf. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Hongping Zhou, Chengcheng Dong, Ruowu Wu, Xiong Xu, Zhongyi Guo Feature Fusion Based on Bayesian Decision Theory for Radar Deception Jamming Recognition. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Abdul Basit Ajmal, Masoom Alam, Awais Abdul Khaliq, Shawal Khan, Zakria Qadir, M. A. Parvez Mahmud Last Line of Defense: Reliability Through Inducing Cyber Threat Hunting With Deception in SCADA Networks. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Lizhang Wang, Chunxiao Fan 0001, Cong Xie, Wei Zhou Leader-Following Consensus of Multiple Euler-Lagrange Systems Under Deception Attacks. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Sinead V. Fernandes, Muhammad Sana Ullah Use of Machine Learning for Deception Detection From Spectral and Cepstral Features of Speech Signals. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Tingting Yin, Zhou Gu Security Control for Adaptive Event-Triggered Networked Control Systems Under Deception Attacks. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles A. Kamhoua Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Mang Tang, Qingyang Sun, Ting Shu, Kai-Bor Yu, Wenxian Yu, Changqing Xu A Moving Target Deception Jamming Method Based on Fast Azimuth-Domain Block EM Calculation Against SAR-GMTI. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra Online Social Deception and Its Countermeasures: A Survey. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13M. Sathishkumar, Yen-Chen Liu Resilient Annular Finite-Time Bounded and Adaptive Event-Triggered Control for Networked Switched Systems With Deception Attacks. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Henrik Skaug Sætra Social robot deception and the culture of trust. Search on Bibsonomy Paladyn J. Behav. Robotics The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Di Wang, Jiahao Huang, Yang Tang, Fangfei Li A Watermarking Strategy Against Linear Deception Attacks on Remote State Estimation Under K-L Divergence. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Benjamin Litherland Ludosity, Radical Contextualism, and a New Games History: Pleasure, Truth, and Deception in the Mid-20th-Century London Arcade. Search on Bibsonomy Games Cult. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Yuyan Wu, Jun Cheng 0004, Xia Zhou, Jinde Cao, Mengzhuo Luo Asynchronous filtering for nonhomogeneous Markov jumping systems with deception attacks. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Mingqi Xing, Yanqian Wang, Guangming Zhuang, Fu Chen Event-based asynchronous and resilient filtering for singular Markov jump LPV systems against deception attacks. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Dongji Wang, Fei Chen, Bo Meng, Xingliu Hu, Jing Wang 0071 Event-based secure H∞ load frequency control for delayed power systems subject to deception attacks. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Dong Ding, Ze Tang, Yan Wang 0049, Zhicheng Ji Secure synchronization of complex networks under deception attacks against vulnerable nodes. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Yuanbo Fang, Hongliang Fu, Huawei Tao, Ruiyu Liang, Li Zhao 0003 A Novel Hybrid Network Model Based on Attentional Multi-Feature Fusion for Deception Detection. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2021 DBLP  BibTeX  RDF
13William Steingartner, Darko Galinec, Andrija Kozina Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model. Search on Bibsonomy Symmetry The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Bao-Lin Zhang 0001, En-Zhi Cao, Zhihui Cai, Hao Su, Gong-You Tang Event-triggered H∞ control for networked spar-type floating production platforms with active tuned heave plate mechanisms and deception attacks. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Zhipei Hu, Feiqi Deng, Yongkang Su, Jin Zhang 0015, Songlin Hu Security control of networked systems with deception attacks and packet dropouts: A discrete-time approach. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Zhiying Wu, Junlin Xiong, Min Xie 0001 Improved event-triggered control for networked control systems subject to deception attacks. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Xia Zhou, Yanfang Tang, Jun Cheng 0004, Jinde Cao, Changfeng Xue, Dong Yan Nonstationary quantized control for discrete-time Markov jump singularly perturbed systems against deception attacks. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Yue Yang, Jiangshuai Huang, Xiaojie Su, Benmin Deng Adaptive control of cyber-physical systems under deception and injection attacks. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Bin Wei, Engang Tian, Jinliang Liu, Xia Zhao Probabilistic-constrained tracking control for stochastic time-varying systems under deception attacks: A Round-Robin protocol. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Caiyun Wang, Jiahao Huang, Di Wang, Fangfei Li A secure strategy for a cyber physical system with multi-sensor under linear deception attack. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Wei Wang 0016, Zhen Han, Kexin Liu, Jinhu Lü Distributed Adaptive Resilient Formation Control of Uncertain Nonholonomic Mobile Robots Under Deception Attacks. Search on Bibsonomy IEEE Trans. Circuits Syst. I Regul. Pap. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Jie Lian 0001, Yuchen Han Switching-Like Event-Triggered Control for Networked Markovian Jump Systems Under Deception Attack. Search on Bibsonomy IEEE Trans. Circuits Syst. II Express Briefs The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Wei Yao 0005, Jiajun Nan, Yifan Zhao, Jiakun Fang, Xiaomeng Ai, Wenping Zuo, Jinyu Wen, Shijie Cheng Resilient Wide-Area Damping Control for Inter-Area Oscillations to Tolerate Deception Attacks. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Ali Kazemy, James Lam, Zhao Chang Adaptive event-triggered mechanism for networked control systems under deception attacks with uncertain occurring probability. Search on Bibsonomy Int. J. Syst. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Jinnan Zhang, Jinbo Song, Jiahui Li, Fei Han 0003, Hongbin Zhang Observer-based non-fragile H∞-consensus control for multi-agent systems under deception attacks. Search on Bibsonomy Int. J. Syst. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Yang Xu 0050, Yuan Yuan 0006, Hongjiu Yang, Dalin Zhou The safety region-based model predictive control for discrete-time systems under deception attacks. Search on Bibsonomy Int. J. Syst. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Zehua Yu, Jun Li 0007, Qinghua Guo 0001 Message Passing Based Target Localization Under Range Deception Jamming in Distributed MIMO Radar. Search on Bibsonomy IEEE Signal Process. Lett. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Libing Huang, Zhulin Zong, Shunsheng Zhang, Wen-Qin Wang Joint Two-Dimensional Deception Countering ISAR via Frequency Diverse Array. Search on Bibsonomy IEEE Signal Process. Lett. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Amanda J. C. Sharkey, Noel E. Sharkey We need to talk about deception in social robotics! Search on Bibsonomy Ethics Inf. Technol. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Jun Wang 0083, Baocang Ding, Jianchen Hu Security Control for LPV System With Deception Attacks via Model Predictive Control: A Dynamic Output Feedback Approach. Search on Bibsonomy IEEE Trans. Autom. Control. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Rômulo Meira-Góes, Stéphane Lafortune, Hervé Marchand Synthesis of Supervisors Robust Against Sensor Deception Attacks. Search on Bibsonomy IEEE Trans. Autom. Control. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Huanruo Li, Yunfei Guo, Shumin Huo, Yuehang Ding EDGE: An Enticing Deceptive-content GEnerator as Defensive Deception. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Edward A. Cranford, Cleotilde Gonzalez, Palvi Aggarwal, Milind Tambe, Sarah Cooney, Christian Lebiere Towards a Cognitive Theory of Cyber Deception. Search on Bibsonomy Cogn. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Manvi Kamboj, Christian Hessler, Priyanka Asnani, Kais Riani, Mohamed Abouelenien Multimodal Political Deception Detection. Search on Bibsonomy IEEE Multim. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 1875 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license