|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 307 occurrences of 218 keywords
|
|
|
Results
Found 1875 publication records. Showing 1875 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
13 | Ying Cui, Yurong Liu, Wenbing Zhang, Fuad E. Alsaadi |
Sampled-Based Consensus for Nonlinear Multiagent Systems With Deception Attacks: The Decoupled Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Syst. ![In: IEEE Trans. Syst. Man Cybern. Syst. 51(1), pp. 561-573, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Lei Liu 0009, Hao Sun, Lifeng Ma, Jie Zhang 0034, Yuming Bo |
Quasi-Consensus Control for a Class of Time-Varying Stochastic Nonlinear Time-Delay Multiagent Systems Subject to Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Syst. ![In: IEEE Trans. Syst. Man Cybern. Syst. 51(11), pp. 6863-6873, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Prakruthi Karuna, Hemant Purohit, Sushil Jajodia, Rajesh Ganesan, Özlem Uzuner |
Fake Document Generation for Cyber Deception by Manipulating Text Comprehensibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Syst. J. ![In: IEEE Syst. J. 15(1), pp. 835-845, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Amir Afshari, Mehdi Karrari, Hamid Reza Baghaee, Gevork Babamalek-Gharehpetian |
Resilient Synchronization of Voltage/Frequency in AC Microgrids Under Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Syst. J. ![In: IEEE Syst. J. 15(2), pp. 2125-2136, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Chongyan Gu, Chip-Hong Chang, Weiqiang Liu 0001, Shichao Yu, Yale Wang, Máire O'Neill |
A Modeling Attack Resistant Deception Technique for Securing Lightweight-PUF-Based Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6), pp. 1183-1196, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Chang Zhao, James Lam, Hong Lin 0001 |
State estimation of CPSs with deception attacks: Stability analysis and approximate computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neurocomputing ![In: Neurocomputing 423, pp. 318-326, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Mu Zhu, Ahmed H. Anwar, Zelin Wan, Jin-Hee Cho, Charles A. Kamhoua, Munindar P. Singh |
A Survey of Defensive Deception: Approaches Using Game Theory and Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Surv. Tutorials ![In: IEEE Commun. Surv. Tutorials 23(4), pp. 2460-2493, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Haoliang Guan, Shunsheng Zhang, Wen-Qin Wang |
Localization deception performance of FDA signals under passive bi-satellite reconnaissance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Inf. Sci. ![In: Sci. China Inf. Sci. 64(9), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Lifeng Ma, Zidong Wang, Yun Chen 0008, Xiaojian Yi 0001 |
Probability-Guaranteed Distributed Secure Estimation for Nonlinear Systems Over Sensor Networks Under Deception Attacks on Innovations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Signal Inf. Process. over Networks ![In: IEEE Trans. Signal Inf. Process. over Networks 7, pp. 465-477, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Tian Tian, Feng Zhou 0001, Yuchen Li, Bin Sun, Weiwei Fan, Chen Gong 0001, Shuang Yang |
Performance Evaluation of Deception Against Synthetic Aperture Radar Based on Multifeature Fusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. ![In: IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 14, pp. 103-115, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Danilo Avola, Marco Cascio, Luigi Cinque, Alessio Fagioli 0001, Gian Luca Foresti |
LieToMe: An Ensemble Approach for Deception Detection from Facial Cues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Neural Syst. ![In: Int. J. Neural Syst. 31(2), pp. 2050068:1-2050068:20, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Li Zhang, Vrizlynn L. L. Thing |
Three Decades of Deception Techniques in Active Cyber Defense - Retrospect and Outlook. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2104.03594, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | David Gros, Yu Li, Zhou Yu 0005 |
The R-U-A-Robot Dataset: Helping Avoid Chatbot Deception by Detecting User Questions About Human or Non-Human Identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2106.02692, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Srijan Kumar, Chongyang Bai, V. S. Subrahmanian, Jure Leskovec |
Deception Detection in Group Video Conversations using Dynamic Interaction Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2106.06163, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Sangjun Lee, Byung-Cheol Min |
Distributed Control of Multi-Robot Systems in the Presence of Deception and Denial of Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2102.00098, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Leena Mathur, Maja J. Mataric |
Affect-Aware Deep Belief Network Representations for Multimodal Unsupervised Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2108.07897, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Jun-Teng Yang, Guei-Ming Liu, Scott C.-H. Huang |
Multimodal Deception Detection in Videos via Analyzing Emotional State-based Feature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2104.08373, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Maria Glenski, Ellyn Ayton, Robin Cosbey, Dustin Arendt, Svitlana Volkova |
Evaluating Deception Detection Model Robustness To Linguistic Variation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2104.11729, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Leena Mathur, Maja J. Mataric |
Unsupervised Audio-Visual Subspace Alignment for High-Stakes Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2102.03673, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Katerina Papantoniou, Panagiotis Papadakos, Giorgos Flouris, Dimitris Plexousakis |
Linguistic Cues of Deception in a Multilingual April Fools' Day Context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2111.03913, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Galen Weld, Ellyn Ayton, Tim Althoff, Maria Glenski |
Leveraging Community and Author Context to Explain the Performance and Bias of Text-Based Deception Detection Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2104.13490, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Nestor Hernandez, Ruben Recabarren, Bogdan Carbunar, Syed Ishtiaque Ahmed |
RacketStore: Measurements of ASO Deception in Google Play via Mobile and App Usage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2111.10400, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Kristen Moore, Cody James Christopher, David Liebowitz, Surya Nepal, Renee Selvey |
Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2111.11932, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Konstantinos Ntemos, Virginia Bordignon, Stefan Vlaski, Ali H. Sayed |
Deception in Social Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2103.14729, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Maxine Major, Brian Souza, Joseph DiVita, Kimberly Ferguson-Walter |
Informing Autonomous Deception Systems with Cyber Expert Performance Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2109.00066, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Katerina Papantoniou, Panagiotis Papadakos, Theodore Patkos, Giorgos Flouris, Ion Androutsopoulos, Dimitris Plexousakis |
Deception detection in text and its relation to the cultural dimension of individualism/collectivism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2105.12530, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Mohcine El Baroudi |
A Stylistic Analysis of Honest Deception: The Case of Seinfeld TV Series Sitcom. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2104.08599, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Daniel Reti, David Klaaßen, Simon Duque Antón, Hans Dieter Schotten |
Secure (S)Hell: Introducing an SSH Deception Proxy Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2104.03666, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Mu Zhu, Ahmed H. Anwar, Zelin Wan, Jin-Hee Cho, Charles A. Kamhoua, Munindar P. Singh |
Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2101.10121, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Yen-Chen Liu, Kai-Yuan Liu, Zhuoyuan Song |
Resilient Time-Varying Formation Tracking for Mobile Robot Networks under Deception Attacks on Positioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2110.10678, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Hampei Sasahara, Henrik Sandberg |
Epistemic Signaling Games for Cyber Deception with Asymmetric Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2103.03287, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Ahmed Alharbi, Hai Dong, Xun Yi, Zahir Tari, Ibrahim Khalil |
Social Media Identity Deception Detection: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2103.04673, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Junlin Wu 0001, Charles A. Kamhoua, Murat Kantarcioglu, Yevgeniy Vorobeychik |
Learning Generative Deception Strategies in Combinatorial Masking Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2109.11637, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Palvi Aggarwal, Yinuo Du, Kuldeep Singh 0005, Cleotilde Gonzalez |
Decoys in Cybersecurity: An Exploratory Study to Test the Effectiveness of 2-sided Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2108.11037, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Jeremy Speth, Nathan Vance, Adam Czajka, Kevin W. Bowyer, Diane Wright, Patrick J. Flynn |
Deception Detection and Remote Physiological Monitoring: A Dataset and Baseline Experimental Results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2106.06583, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Paul Chelarescu |
Deception in Social Learning: A Multi-Agent Reinforcement Learning Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2106.05402, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Maria Glenski, Ellyn Ayton, Robin Cosbey, Dustin Arendt, Svitlana Volkova |
Towards Trustworthy Deception Detection: Benchmarking Model Robustness across Domains, Modalities, and Languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2104.11761, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Nguyen Van Huynh, Diep N. Nguyen, Dinh Thai Hoang, Thang X. Vu, Eryk Dutkiewicz, Symeon Chatzinotas |
Defeating Super-Reactive Jammers With Deception Strategy: Modeling, Signal Detection, and Performance Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2105.01308, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Sadat Shahriar, Arjun Mukherjee, Omprakash Gnawali |
A Domain-Independent Holistic Approach to Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2111.10711, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Domen Vres, Marko Robnik-Sikonja |
Better sampling in explanation methods can prevent dieselgate-like deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2101.11702, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Zelin Wan, Jin-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles A. Kamhoua, Munindar P. Singh |
Foureye: Defensive Deception based on Hypergame Theory Against Advanced Persistent Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2101.02863, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Erich Walter, Kimberly Ferguson-Walter, Ahmad Ridley |
Incorporating Deception into CyberBattleSim for Autonomous Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2108.13980, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Hammad Ud Din Ahmed, Usama Ijaz Bajwa, Fan Zhang, Muhammad Waqas Anwar |
Deception Detection in Videos using the Facial Action Coding System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2105.13659, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Craig Bakker, Arnab Bhattacharya 0008, Samrat Chatterjee, Draguna L. Vrabie |
Metagames and Hypergames for Deception-Robust Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Cyber Phys. Syst. ![In: ACM Trans. Cyber Phys. Syst. 5(3), pp. 23:1-23:25, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Yue Yuan, Gangyi Tu, Ben Wang, Ling-ling Wang |
Calculation of deception probability of netted radar based on non-central chi-square distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Distributed Sens. Networks ![In: Int. J. Distributed Sens. Networks 17(7), pp. 155014772110337, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Hui Lu 0005, Chengjie Jin, Xiaohan Helu, Chunsheng Zhu, Nadra Guizani, Zhihong Tian |
AutoD: Intelligent Blockchain Application Unpacking Based on JNI Layer Deception Call. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Netw. ![In: IEEE Netw. 35(2), pp. 215-221, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Lingshu Li, Jiangxing Wu, Wei Zeng, Xiaotao Cheng |
A Cyber Deception Method Based on Container Identity Information Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 104-D(6), pp. 893-896, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Xinghua Liu, Dandan Bai, Yunling Lv, Rui Jiang 0003, Shuzhi Sam Ge |
UKF-Based Vehicle Pose Estimation under Randomly Occurring Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2021, pp. 5572186:1-5572186:12, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Jinwoo Kim, Jaehyun Nam, Suyeol Lee, Vinod Yegneswaran, Phillip A. Porras, Seungwon Shin |
BottleNet: Hiding Network Bottlenecks Using SDN-Based Topology Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 16, pp. 3138-3153, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Linan Huang, Quanyan Zhu |
Duplicity Games for Deception Design With an Application to Insider Threat Mitigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 16, pp. 4843-4856, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Donghan Shi, Pengfeng Lin, Yu Wang 0071, Chia-Chi Chu, Yan Xu 0005, Peng Wang 0017 |
Deception Attack Detection of Isolated DC Microgrids Under Consensus- Based Distributed Voltage Control Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Emerg. Sel. Topics Circuits Syst. ![In: IEEE J. Emerg. Sel. Topics Circuits Syst. 11(1), pp. 155-167, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Suying Sheng, Xiaomei Zhang, Yue Lu, Guoping Lu |
Consensus-Based Estimation for Type-2 Fuzzy Time-Delay Systems Under Deception Attacks and Partial Information Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Fuzzy Syst. ![In: Int. J. Fuzzy Syst. 23(5), pp. 1462-1477, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Zhuan Shen, Fan Yang, Jing Chen, Jingxiang Zhang, Aihua Hu, Manfeng Hu |
Adaptive Event-Triggered Synchronization of Uncertain Fractional Order Neural Networks with Double Deception Attacks and Time-Varying Delay. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entropy ![In: Entropy 23(10), pp. 1291, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Li Zhang, Vrizlynn L. L. Thing |
Three decades of deception techniques in active cyber defense - Retrospect and outlook. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 106, pp. 102288, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Ye Fan, Rugui Yao, Ang Li 0003, Xuewen Liao, Victor C. M. Leung |
Robust Deception Scheme for Secure Interference Exploitation Under PSK Modulations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Commun. ![In: IEEE Trans. Commun. 69(8), pp. 5425-5440, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Zhidong Liu, Qun Zhang 0001, Kaiming Li |
An Anti-Jamming Method against Two-Dimensional Deception Jamming by Spatial Location Feature Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 21(22), pp. 7702, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Xiao Zhang, Fan Yang, Xiang Sun |
Resilient Adaptive Event-Triggered Load Frequency Control of Network-Based Power Systems against Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 21(21), pp. 7047, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Constantinos-Giovanni Xarhoulacos, Argiro Anagnostopoulou, George Stergiopoulos, Dimitris Gritzalis |
Misinformation vs. Situational Awareness: The Art of Deception and the Need for Cross-Domain Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 21(16), pp. 5496, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Rosa A. Rossi-Goldthorpe, Yuan Chang Leong, Pantelis Leptourgos, Philip R. Corlett |
Paranoia, self-deception and overconfidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLoS Comput. Biol. ![In: PLoS Comput. Biol. 17(10), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Li Li 0050, Huan Yang, Yuanqing Xia, Cui Zhu |
Attack Detection and Distributed Filtering for State-Saturated Systems Under Deception Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Control. Netw. Syst. ![In: IEEE Trans. Control. Netw. Syst. 8(4), pp. 1918-1929, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Seungyong Han, Suneel Kumar Kommuri, Sang-Moon Lee 0001 |
Affine Transformed IT2 Fuzzy Event-Triggered Control Under Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Fuzzy Syst. ![In: IEEE Trans. Fuzzy Syst. 29(2), pp. 322-335, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Nannan Rong, Zhanshan Wang |
Event-Based Impulsive Control of IT2 T-S Fuzzy Interconnected System Under Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Fuzzy Syst. ![In: IEEE Trans. Fuzzy Syst. 29(6), pp. 1615-1628, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Siwei Qiao, Xinghua Liu, Gaoxi Xiao, Shuzhi Sam Ge |
Observer-Based Sliding Mode Load Frequency Control of Power Systems under Deception Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex. ![In: Complex. 2021, pp. 8092206:1-8092206:11, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Guobao Liu, Shibin Shen, Xianglei Jia |
Dissipative Filter Design for Nonlinear Time-Varying-Delay Singular Systems against Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex. ![In: Complex. 2021, pp. 2260753:1-2260753:15, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Zhou Gu, Tingting Yin, Zhengtao Ding |
Path Tracking Control of Autonomous Vehicles Subject to Deception Attacks via a Learning-Based Event-Triggered Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Neural Networks Learn. Syst. ![In: IEEE Trans. Neural Networks Learn. Syst. 32(12), pp. 5644-5653, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Zongmin Liu, Guangming Wang, Jun Yang, Chao Zhou, Chao Ma |
Position and time deception based on satellite navigation technology and experimental verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Electron. Express ![In: IEICE Electron. Express 18(21), pp. 20210366, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Tanmoy Chakraborty 0002, Sushil Jajodia, Jonathan Katz, Antonio Picariello, Giancarlo Sperlì, V. S. Subrahmanian |
A Fake Online Repository Generation Engine for Cyber Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 18(2), pp. 518-533, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Wenqi Wei, Ling Liu 0001 |
Robust Deep Learning Ensemble Against Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 18(4), pp. 1513-1527, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Xin Huang, Fei Yan, Liqiang Zhang, Kai Wang |
HoneyGadget: A Deception Based Approach for Detecting Code Reuse Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 23(2), pp. 269-283, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Hao Wang 0082, Qing Chang 0003, Yong Xu |
Deception Jamming Detection Based on Beam Scanning for Satellite Navigation Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Lett. ![In: IEEE Commun. Lett. 25(8), pp. 2703-2707, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Valeria Fionda, Giuseppe Pirrò |
Community Deception in Networks: Where We Are and Where We Should Go. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPLEX NETWORKS ![In: Complex Networks & Their Applications X - Volume 2, Proceedings of the Tenth International Conference on Complex Networks and Their Applications COMPLEX NETWORKS 2021, Madrid, Spain, November 30 - December 2, 2021, pp. 144-155, 2021, Springer, 978-3-030-93413-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Jeremy Speth, Nathan Vance, Adam Czajka, Kevin W. Bowyer, Diane Wright, Patrick J. Flynn |
Deception Detection and Remote Physiological Monitoring: A Dataset and Baseline Experimental Results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCB ![In: International IEEE Joint Conference on Biometrics, IJCB 2021, Shenzhen, China, August 4-7, 2021, pp. 1-8, 2021, IEEE, 978-1-6654-3780-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Sadat Shahriar, Arjun Mukherjee, Omprakash Gnawali |
A Domain-Independent Holistic Approach to Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RANLP ![In: Proceedings of the International Conference on Recent Advances in Natural Language Processing (RANLP 2021), Held Online, 1-3 September, 2021, pp. 1308-1317, 2021, INCOMA Ltd.. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Fei Fang 0001 |
Game Theoretic Models for Cyber Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MTD@CCS ![In: MTD@CCS 2021: Proceedings of the 8th ACM Workshop on Moving Target Defense, Virtual Event, Republic of Korea, 15 November 2021, pp. 23-24, 2021, ACM, 978-1-4503-8658-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Christina Rajagulasingam, Jacqui Taylor |
The roles of self-control, need for cognition, impulsivity and viewing time in deception detection using a realistic e-mail phishing task. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: APWG Symposium on Electronic Crime Research, eCrime 2021, Boston, MA, USA, December 1-3, 2021, pp. 1-5, 2021, IEEE, 978-1-6654-8029-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Ismail Lotfi, Dusit Niyato, Sumei Sun, Dinh Thai Hoang, Dong In Kim, Ying-Chang Liang |
Jamming Mitigation in JRC Systems via Deep Reinforcement Learning and Backscatter-supported Intelligent Deception Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCS ![In: 6th IEEE International Conference on Computer and Communication Systems, ICCCS 2021, Chengdu, China, April 23-26, 2021, pp. 1053-1058, 2021, IEEE, 978-1-6654-1256-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Iffat Anjum, Mu Zhu, Isaac Polinsky, William Enck, Michael K. Reiter, Munindar P. Singh |
Role-Based Deception in Enterprise Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021, pp. 65-76, 2021, ACM, 978-1-4503-8143-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Md. Mazharul Islam 0001, Ashutosh Dutta, Md Sajidul Islam Sajid, Ehab Al-Shaer, Jinpeng Wei, Sadegh Farhang |
CHIMERA: Autonomous Planning and Orchestration for Malware Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNS ![In: IEEE Conference on Communications and Network Security, CNS 2021, Tempe, AZ, USA, October 4-6, 2021, pp. 173-181, 2021, IEEE, 978-1-6654-4496-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | James E. Gaskin 0001, Mark J. Keith, Tom Meservy, Nathan W. Twyman, Taylor Wells |
Crowdfunding Deception Perception: What Makes Would-Be Contributors Perceive Fakeness in Crowdfunding Campaigns? ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMCIS ![In: 27th Americas Conference on Information Systems, AMCIS 2021, Virtual Conference, August 9-13, 2021, 2021, Association for Information Systems. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Xinran Wang, Saiying Ge, Xunyu Chen, Bradley L. Walls |
Deception Detection with Nonverbal Behaviors from Silence and Speech Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMCIS ![In: 27th Americas Conference on Information Systems, AMCIS 2021, Virtual Conference, August 9-13, 2021, 2021, Association for Information Systems. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Do Thi Thu Hien, Hien Do Hoang, Van-Hau Pham |
Empirical Study on Reconnaissance Attacks in SDN-aware Network for Evaluating Cyber Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RIVF ![In: RIVF International Conference on Computing and Communication Technologies, RIVF 2021, Hanoi, Vietnam, August 19-21, 2021, pp. 1-6, 2021, IEEE, 978-1-6654-0435-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Chungang Gao, Yongjie Wang, Xinli Xiong |
Comparison of Defense Effectiveness between Moving Target Defense and Cyber Deception Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSIT ![In: DSIT 2021: 4th International Conference on Data Science and Information Technology, Shanghai, China, July 23 - 25, 2021, pp. 119-124, 2021, ACM, 978-1-4503-9024-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Junlin Wu 0001, Charles A. Kamhoua, Murat Kantarcioglu, Yevgeniy Vorobeychik |
Learning Generative Deception Strategies in Combinatorial Masking Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GameSec ![In: Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings, pp. 98-117, 2021, Springer, 978-3-030-90369-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Nguyen Van Huynh, Diep N. Nguyen, Dinh Thai Hoang, Eryk Dutkiewicz |
Defeating Reactive Jammers with Deep Dueling-based Deception Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: ICC 2021 - IEEE International Conference on Communications, Montreal, QC, Canada, June 14-23, 2021, pp. 1-6, 2021, IEEE, 978-1-7281-7122-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Jieling Liu, Zhiliang Wang, Jiahai Yang 0001, Bo Wang 0066, Lin He 0004, Guanglei Song, Xinran Liu |
Deception Maze: A Stackelberg Game-Theoretic Defense Mechanism for Intranet Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: ICC 2021 - IEEE International Conference on Communications, Montreal, QC, Canada, June 14-23, 2021, pp. 1-6, 2021, IEEE, 978-1-7281-7122-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Felipe Galarza-Jimenez, Jorge I. Poveda, Gianluca Bianchin, Emiliano Dall'Anese |
Extremum Seeking Under Persistent Gradient Deception: A Switching Systems Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACC ![In: 2021 American Control Conference, ACC 2021, New Orleans, LA, USA, May 25-28, 2021, pp. 3806-3811, 2021, IEEE, 978-1-6654-4197-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Leena Mathur, Maja J. Mataric |
Unsupervised Audio-Visual Subspace Alignment for High-Stakes Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP ![In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2021, Toronto, ON, Canada, June 6-11, 2021, pp. 2255-2259, 2021, IEEE, 978-1-7281-7606-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Daniel Reti, David Klaaßen, Simon Duque Antón, Hans Dieter Schotten |
Secure (S)Hell: Introducing an SSH Deception Proxy Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSA ![In: International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA 2021, Dublin, Ireland, June 14-18, 2021, pp. 1-6, 2021, IEEE, 978-1-6654-2529-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Arunava Naha, André Teixeira 0001, Anders Ahlén, Subhrakanti Dey |
Deception Attack Detection using Reduced Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECC ![In: 2021 European Control Conference, ECC 2021, Virtual Event / Delft, The Netherlands, June 29 - July 2, 2021, pp. 74-80, 2021, IEEE, 978-9-4638-4236-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | David Liebowitz, Surya Nepal, Kristen Moore, Cody James Christopher, Salil S. Kanhere, David D. Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar |
Deception for Cyber Defence: Challenges and Opportunities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TPS-ISA ![In: 3rd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2021, Atlanta, GA, USA, December 13-15, 2021, pp. 173-182, 2021, IEEE, 978-1-6654-1623-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Jaime C. Acosta, Anjon Basak, Christopher Kiekintveld, Charles A. Kamhoua |
Lightweight On-Demand Honeypot Deployment for Cyber Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDF2C ![In: Digital Forensics and Cyber Crime - 12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings, pp. 294-312, 2021, Springer, 978-3-031-06364-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Mengze Yu, Wei Wang 0016, Jing Zhou 0002, Yongxin Tong |
Adaptive Backstepping based Secure Control for P-normal Form of Second-Order Nonlinear Systems Against Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDC ![In: 2021 60th IEEE Conference on Decision and Control (CDC), Austin, TX, USA, December 14-17, 2021, pp. 1802-1807, 2021, IEEE, 978-1-6654-3659-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Maria Glenski, Ellyn Ayton, Robin Cosbey, Dustin Arendt, Svitlana Volkova |
Evaluating Deception Detection Model Robustness To Linguistic Variation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SocialNLP@NAACL ![In: Proceedings of the Ninth International Workshop on Natural Language Processing for Social Media, SocialNLP@NAACL 2021, Online, June 10, 2021, pp. 70-80, 2021, Association for Computational Linguistics, 978-1-954085-32-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Kimberly Ferguson-Walter, Maxine Major, Chelsea K. Johnson, Daniel H. Muhleman |
Examining the Efficacy of Decoy-based and Psychological Cyber Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, pp. 1127-1144, 2021, USENIX Association, 978-1-939133-24-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Ka Ho Chow, Ling Liu 0001 |
Robust Object Detection Fusion Against Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Virtual Event, Singapore, August 14-18, 2021, pp. 2703-2713, 2021, ACM, 978-1-4503-8332-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Mingjun Feng, Buqiong Xiao, Bo Yu, Jianguo Qian, Xinxin Zhang, Peidong Chen, Bo Li |
A Novel Deception Defense-Based Honeypot System for Power Grid Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SmartCom ![In: Smart Computing and Communication - 6th International Conference, SmartCom 2021, New York City, NY, USA, December 29-31, 2021, Proceedings, pp. 297-307, 2021, Springer, 978-3-030-97773-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Felix O. Olowononi, Ahmed H. Anwar, Danda B. Rawat, Jaime C. Acosta, Charles A. Kamhoua |
Deep Learning for Cyber Deception in Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: 17th International Conference on Mobility, Sensing and Networking, MSN 2021, Exeter, United Kingdom, December 13-15, 2021, pp. 551-558, 2021, IEEE, 978-1-6654-0668-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Prithwiraj Roy, Shameek Bhattacharjee, Hussein Alsheakh, Sajal K. Das 0001 |
Resilience Against Bad Mouthing Attacks in Mobile Crowdsensing Systems via Cyber Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 22nd IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2021, Pisa, Italy, June 7-11, 2021, pp. 169-178, 2021, IEEE, 978-1-6654-2263-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Leena Mathur |
Affect-Aware Machine Learning Models for Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI ![In: Thirty-Fifth AAAI Conference on Artificial Intelligence, AAAI 2021, Thirty-Third Conference on Innovative Applications of Artificial Intelligence, IAAI 2021, The Eleventh Symposium on Educational Advances in Artificial Intelligence, EAAI 2021, Virtual Event, February 2-9, 2021, pp. 15968-15969, 2021, AAAI Press, 978-1-57735-866-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Yu Xia, Jian Xie 0005, Wei Liu 0059, Ming Xu 0016, Rong Luo, Shunren Hu, Xiaoyu Dang, Daqing Huang |
Deception and Asymmetry of Low-Power Links in UAV Assisted Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: IEEE Wireless Communications and Networking Conference, WCNC 2021, Nanjing, China, March 29 - April 1, 2021, pp. 1-7, 2021, IEEE, 978-1-7281-9505-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
|
|