The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Deception with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1992 (19) 1993-1998 (18) 1999-2001 (25) 2002-2003 (32) 2004 (37) 2005 (62) 2006 (35) 2007 (40) 2008 (38) 2009 (33) 2010 (31) 2011 (27) 2012 (38) 2013 (34) 2014 (55) 2015 (70) 2016 (76) 2017 (85) 2018 (114) 2019 (149) 2020 (165) 2021 (194) 2022 (186) 2023 (244) 2024 (68)
Publication types (Num. hits)
article(941) book(4) incollection(24) inproceedings(885) phdthesis(19) proceedings(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 307 occurrences of 218 keywords

Results
Found 1875 publication records. Showing 1875 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
13Ioana Raluca Zaman, Stefan Trausan-Matu Detecting deception in conversations. Search on Bibsonomy RoCHI The full citation details ... 2021 DBLP  BibTeX  RDF
13Tommaso Fornaciari, Federico Bianchi 0001, Massimo Poesio, Dirk Hovy BERTective: Language Models and Contextual Information for Deception Detection. Search on Bibsonomy EACL The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Xueting Li, Sha Yi, Katia P. Sycara Multi-agent Deception in Attack-Defense Stochastic Game. Search on Bibsonomy DARS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Abdulhamid A. Adebayo, Danda B. Rawat Cyber Deception for Wireless Network Virtualization Using Stackelberg Game Theory. Search on Bibsonomy CCNC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Kantwon Rogers, Ayanna M. Howard Intelligent Agent Deception and the Influence on Human Trust and Interaction. Search on Bibsonomy ARSO The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13James Pavur, Ivan Martinovic On Detecting Deception in Space Situational Awareness. Search on Bibsonomy AsiaCCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Timothy Barron, Johnny So, Nick Nikiforakis Click This, Not That: Extending Web Authentication with Deception. Search on Bibsonomy AsiaCCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Hongliang Luo, Jieyi Liu, Siyuan Wu, Zhao Nie, Hao Li, Jie Wu A Semi-Supervised Deception Jamming Discrimination Method. Search on Bibsonomy CCIS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Katerina Papantoniou, Panagiotis Papadakos, Giorgos Flouris, Dimitris Plexousakis Linguistic Cues of Deception in a Multilingual April Fools' Day Context. Search on Bibsonomy CLiC-it The full citation details ... 2021 DBLP  BibTeX  RDF
13Leena Mathur, Maja J. Mataric Affect-Aware Deep Belief Network Representations for Multimodal Unsupervised Deception Detection. Search on Bibsonomy FG The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Alberto Alejandro Ceballos Delgado, William Bradley Glisson, Narasimha K. Shashidhar, Jeffrey Todd McDonald, George Grispos, Ryan Benton Deception Detection Using Machine Learning. Search on Bibsonomy HICSS The full citation details ... 2021 DBLP  BibTeX  RDF
13Debi Ashenden, Rob Black, Iain Reid, Simon Henderson Design Thinking for Cyber Deception. Search on Bibsonomy HICSS The full citation details ... 2021 DBLP  BibTeX  RDF
13Jason Landsborough, Luke Carpenter, Braulio Coronado, Sunny Fugate, Kimberly Ferguson-Walter, Dirk Van Bruggen Towards Self-Adaptive Cyber Deception for Defense. Search on Bibsonomy HICSS The full citation details ... 2021 DBLP  BibTeX  RDF
13Matt Bishop, Cliff Wang, Kimberly Ferguson-Walter, Sunny Fugate Introduction to the Minitrack on Cyber Deception and Cyber Psychology for Defense. Search on Bibsonomy HICSS The full citation details ... 2021 DBLP  BibTeX  RDF
13Frederico Araujo, Sailik Sengupta, Jiyong Jang, Adam Doupé, Kevin W. Hamlen, Subbarao Kambhampati Software Deception Steering through Version Emulation. Search on Bibsonomy HICSS The full citation details ... 2021 DBLP  BibTeX  RDF
13Sviatoslav Vasylyshyn, Ivan Opirskyy, Svitlana Shevchenko Honeypot Security Efficiency versus Deception Solution (short paper). Search on Bibsonomy CPITS II (2) The full citation details ... 2021 DBLP  BibTeX  RDF
13Baohong Liu, Juntao Sun Applying Stackelberg Active Deception Game for Network Defense: From the Perspective of Imperfect Network Node Information. Search on Bibsonomy ICCIR The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Andrey Lucas Herchonvicz, Rafael de Santiago Deep Neural Network Architectures for Speech Deception Detection: A Brief Survey. Search on Bibsonomy EPIA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Lê Minh Ngô, Wei Wang, Burak Mandira, Sezer Karaoglu, Henri Bouma, Hamdi Dibeklioglu, Theo Gevers Identity Unbiased Deception Detection by 2D-to-3D Face Reconstruction. Search on Bibsonomy WACV The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Valeria Fionda, Giuseppe Pirrò Community deception in weighted networks. Search on Bibsonomy ASONAM The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Jaewan Lim, Lina Zhou, Dongsong Zhang Verbal Deception Cue Training for the Detection of Phishing Emails. Search on Bibsonomy ISI The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Katie Winkle, Praminda Caleb-Solly, Ute Leonards, Ailie J. Turton, Paul Bremner Assessing and Addressing Ethical Risk from Anthropomorphism and Deception in Socially Assistive Robots. Search on Bibsonomy HRI The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Ahmed H. Anwar, Nandi O. Leslie, Charles A. Kamhoua Honeypot Allocation for Cyber Deception in Internet of Battlefield Things Systems. Search on Bibsonomy MILCOM The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Srijan Kumar, Chongyang Bai, V. S. Subrahmanian, Jure Leskovec Deception Detection in Group Video Conversations using Dynamic Interaction Networks. Search on Bibsonomy ICWSM The full citation details ... 2021 DBLP  BibTeX  RDF
13Ali Ayub, Aldo W. Morales, Amit Banerjee Using Markov Decision Process to Model Deception for Robotic and Interactive Game Applications. Search on Bibsonomy ICCE The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Md Sajidul Islam Sajid, Jinpeng Wei, Basel Abdeen, Ehab Al-Shaer, Md. Mazharul Islam 0001, Walter Diong, Latifur Khan SODA: A System for Cyber Deception Orchestration and Automation. Search on Bibsonomy ACSAC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Nestor Hernandez, Ruben Recabarren, Bogdan Carbunar, Syed Ishtiaque Ahmed RacketStore: measurements of ASO deception in Google play via mobile and app usage. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Sarit Adhikari, Piotr J. Gmytrasiewicz Telling Friend from Foe - Towards a Bayesian Approach to Sincerity and Deception. Search on Bibsonomy TRUST@AAMAS The full citation details ... 2021 DBLP  BibTeX  RDF
13Aditya Shinde, Prashant Doshi, Omid Setayeshfar Cyber Attack Intent Recognition and Active Deception using Factored Interactive POMDPs. (PDF / PS) Search on Bibsonomy AAMAS The full citation details ... 2021 DBLP  BibTeX  RDF
13Peta Masters, Michael Kirley, Wally Smith Extended Goal Recognition: A Planning-Based Model for Strategic Deception. (PDF / PS) Search on Bibsonomy AAMAS The full citation details ... 2021 DBLP  BibTeX  RDF
13Zishan Qin, Xuanying Zhu, Tom Gedeon Examining Transfer Learning with Neural Network and Bidirectional Neural Network on Thermal Imaging for Deception Recognition. Search on Bibsonomy ICONIP (6) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Xuecheng Zhang, Xuanying Zhu Explaining Neural Network Results by Sensitivity Analysis for Deception Detection. Search on Bibsonomy ICONIP (6) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Huang-Cheng Chou, Woan-Shiuan Chien, Da-Cheng Juan, Chi-Chun Lee "Does it Matter When I Think You Are Lying?" Improving Deception Detection by Integrating Interlocutor's Judgements in Conversations. Search on Bibsonomy ACL/IJCNLP (Findings) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13David Gros, Yu Li, Zhou Yu 0005 The R-U-A-Robot Dataset: Helping Avoid Chatbot Deception by Detecting User Questions About Human or Non-Human Identity. Search on Bibsonomy ACL/IJCNLP (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Harun Bingol Yapay zeka optimizasyon algoritması temelli aldatma ve söylenti tespit yöntemi (Deception and rumor detection method based on artificial intelligence optimization algorithm) Search on Bibsonomy 2021   RDF
13Fatma Gumus Yapay öğrenme algoritmalarını kandırmak (Deception of machine learning algorithms) Search on Bibsonomy 2021   RDF
13Stefan Sarkadi Deception. Search on Bibsonomy 2021   RDF
13Zhiyang Ju, Hui Zhang 0019, Ying Tan 0001 Distributed Deception Attack Detection in Platoon-Based Connected Vehicle Systems. Search on Bibsonomy IEEE Trans. Veh. Technol. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Deqing Li, Eugene Santos Jr. Discriminating deception from truth and misinformation: an intent-level approach. Search on Bibsonomy J. Exp. Theor. Artif. Intell. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Rosemonde Ausseil, Ridvan Gedik, Amy E. Bednar, Mark A. Cowan Identifying sufficient deception in military logistics. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Nicholas Cifranic, Roger A. Hallman, Jose Romero-Mariona, Brian Souza, Trevor Calton, Giancarlo Coca Decepti-SCADA: A cyber deception framework for active defense of networked critical infrastructures. Search on Bibsonomy Internet Things The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Qingyang Sun, Ting Shu, Mang Tang, Kai-Bor Yu, Wenxian Yu Effective Moving Target Deception Jamming Against Multichannel SAR-GMTI Based on Multiple Jammers. Search on Bibsonomy IEEE Geosci. Remote. Sens. Lett. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Bang Huang, Wen-Qin Wang, Shunsheng Zhang, Hui Wang, Ronghua Gui, Zheng Lu A Novel Approach for Spaceborne SAR Scattered-Wave Deception Jamming Using Frequency Diverse Array. Search on Bibsonomy IEEE Geosci. Remote. Sens. Lett. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Max Ismailov, Michail Tsikerdekis, Sherali Zeadally Vulnerabilities to Online Social Network Identity Deception Detection Research and Recommendations for Mitigation. Search on Bibsonomy Future Internet The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Stephen Cameron Skalicky, Nicholas D. Duran, Scott A. Crossley Please, Please, Just Tell Me: The Linguistic Features of Humorous Deception. Search on Bibsonomy Dialogue Discourse The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Marzieh Daneshi Kohan, Ali Motie Nasrabadi, Mohammad Bagher Shamsollahi, Ali Sharifi EEG/PPG effective connectivity fusion for analyzing deception in interview. Search on Bibsonomy Signal Image Video Process. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Zifan Gao, Dawei Zhang 0004, Shuqian Zhu, Jun-e Feng Distributed active disturbance rejection control for Ackermann steering of a four-in-wheel motor drive vehicle with deception attacks on controller area networks. Search on Bibsonomy Inf. Sci. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Michael Franke, Giulio Dulcinati, Nausicaa Pouscoulous Strategies of Deception: Under-Informativity, Uninformativity, and Lies - Misleading With Different Kinds of Implicature. Search on Bibsonomy Top. Cogn. Sci. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Linda M. Geven, Gershon Ben-Shakhar, Merel Kindt, Bruno Verschuere Memory-Based Deception Detection: Extending the Cognitive Signature of Lying From Instructed to Self-Initiated Cheating. Search on Bibsonomy Top. Cogn. Sci. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Junghee Lee, Jione Choi, Gyuho Lee, Shin-Woo Shim, Taekyu Kim PhantomFS: File-Based Deception Technology for Thwarting Malicious Users. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Shuo Wang, Qingqi Pei, Jianhua Wang, Guangming Tang, Yuchen Zhang, Xiaohu Liu An Intelligent Deployment Policy for Deception Resources Based on Reinforcement Learning. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Hongqian Lu, Yahan Deng, Yao Xu, Wuneng Zhou Event-Triggered H∞ Filtering for Networked Systems Under Hybrid Probability Deception Attacks. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Gareth Frazer, Alessio Balleri, George Jacob Deception Jamming Against Doppler Beam Sharpening Radars. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Yiming Wu 0001, Ming Xu 0001, Ning Zheng 0001, Xiongxiong He Event-Triggered Resilient Consensus for Multi-Agent Networks Under Deception Attacks. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Yiming Wu 0001, Xiongxiong He Finite-Time Consensus-Based Clock Synchronization Under Deception Attacks. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Shen Yan, Zhou Gu, Sing Kiong Nguang, Fan Yang, Liruo Zhang Co-Design of Event-Triggered Scheme and H∞ Output Control for Markov Jump Systems Against Deception Attacks. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Bin Rao, Zhaoyu Gu, Yuanping Nie Deception Approach to Track-to-Track Radar Fusion Using Noncoherent Dual-Source Jamming. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Hui Wang, Shunsheng Zhang, Wen-Qin Wang, Bang Huang, Zhi Zheng 0001, Zheng Lu Multi-Scene Deception Jamming on SAR Imaging With FDA Antenna. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Paula Fraga-Lamas, Tiago M. Fernández-Caramés Fake News, Disinformation, and Deepfakes: Leveraging Distributed Ledger Technologies and Blockchain to Combat Digital Deception and Counterfeit Reality. Search on Bibsonomy IT Prof. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Michail Tsikerdekis, Sherali Zeadally Detecting Online Content Deception. Search on Bibsonomy IT Prof. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13George Loukas, Charalampos Z. Patrikakis, Linda Wilbanks Digital Deception: Cyber Fraud and Online Misinformation. Search on Bibsonomy IT Prof. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Zhiyang Ju, Hui Zhang 0019, Ying Tan 0001 Deception Attack Detection and Estimation for a Local Vehicle in Vehicle Platooning Based on a Modified UFIR Estimator. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Javier Sánchez-Junquera, Luis Villaseñor Pineda, Manuel Montes-y-Gómez, Paolo Rosso, Efstathios Stamatatos Masking domain-specific information for cross-domain deception detection. Search on Bibsonomy Pattern Recognit. Lett. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Danilo Avola, Luigi Cinque, Maria De Marsico, Alessio Fagioli 0001, Gian Luca Foresti LieToMe: Preliminary study on hand gestures for deception detection via Fisher-LSTM. Search on Bibsonomy Pattern Recognit. Lett. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Weiming Fu, Jiahu Qin, Yang Shi 0001, Wei Xing Zheng 0001, Yu Kang 0001 Resilient Consensus of Discrete-Time Complex Cyber-Physical Networks Under Deception Attacks. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Ning Tai, Huan Lin, Chao Wei, Yongwei Lu, Chao Wang, Kaibo Cui A Wideband Real-Time Deception Jamming Method for Countering ISAR Based on Parallel Convolution. Search on Bibsonomy IEICE Trans. Commun. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Yi-Gang Li, Guang-Hong Yang Optimal deception attacks against remote state estimation in cyber-physical systems. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Liang Zhao, Guang-Hong Yang Cooperative adaptive fault-tolerant control for multi-agent systems with deception attacks. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Jiancun Wu, Chen Peng 0001, Jin Zhang 0015, Bao-Lin Zhang 0001 Event-triggered finite-time H∞ filtering for networked systems under deception attacks. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Jinfeng Gao, Zhen Zhao 0007, Jinxia Wang, Tian Tan 0009, Miao Ma Event-triggered output feedback control for discrete Markov jump systems under deception attack. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Magdi Sadek Mahmoud, Mutaz M. Hamdan, Uthman A. Baroudi Secure control of cyber physical systems subject to stochastic distributed DoS and deception attacks. Search on Bibsonomy Int. J. Syst. Sci. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Weilu Chen, Jun Hu 0004, Zhihui Wu, Xiaoyang Yu, Dongyan Chen Finite-time memory fault detection filter design for nonlinear discrete systems with deception attacks. Search on Bibsonomy Int. J. Syst. Sci. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13John Danaher Robot Betrayal: a guide to the ethics of robotic deception. Search on Bibsonomy Ethics Inf. Technol. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Shunyuan Xiao, Qing-Long Han, Xiaohua Ge, Yijun Zhang 0001 Secure Distributed Finite-Time Filtering for Positive Systems Over Sensor Networks Under Deception Attacks. Search on Bibsonomy IEEE Trans. Cybern. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Kun Liu 0002, Hang Guo, Qirui Zhang 0003, Yuanqing Xia Distributed Secure Filtering for Discrete-Time Systems Under Round-Robin Protocol and Deception Attacks. Search on Bibsonomy IEEE Trans. Cybern. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Engang Tian, Chen Peng 0001 Memory-Based Event-Triggering H∞ Load Frequency Control for Power Systems Under Deception Attacks. Search on Bibsonomy IEEE Trans. Cybern. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Nan Hou, Zidong Wang, Daniel W. C. Ho, Hongli Dong Robust Partial-Nodes-Based State Estimation for Complex Networks Under Deception Attacks. Search on Bibsonomy IEEE Trans. Cybern. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Qirui Zhang 0003, Kun Liu 0002, Yuanqing Xia, Aoyun Ma Optimal Stealthy Deception Attack Against Cyber-Physical Systems. Search on Bibsonomy IEEE Trans. Cybern. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Di Zhao, Zidong Wang, Guoliang Wei, Qing-Long Han A dynamic event-triggered approach to observer-based PID security control subject to deception attacks. Search on Bibsonomy Autom. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Rômulo Meira-Góes, Eunsuk Kang, Raymond H. Kwong, Stéphane Lafortune Synthesis of sensor deception attacks at the supervisory layer of Cyber-Physical Systems. Search on Bibsonomy Autom. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Kemi Ding, Xiaoqiang Ren, Daniel E. Quevedo, Subhrakanti Dey, Ling Shi Defensive deception against reactive jamming attacks in remote state estimation. Search on Bibsonomy Autom. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Ángel Hernández-Castañeda, René Arnulfo García-Hernández, Yulia Ledeneva, Christian Eduardo Millán-Hernández The Impact of Key Ideas on Automatic Deception Detection in Text. Search on Bibsonomy Computación y Sistemas The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Dawei Zhang 0004, Jiyang Xie 0004, Boda Ning Network-based filtering for positive systems with random communication delays and deception attacks. Search on Bibsonomy Neurocomputing The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Yilian Zhang, Yanfei Zhu, Qinqin Fan A novel set-membership estimation approach for preserving security in networked control systems under deception attacks. Search on Bibsonomy Neurocomputing The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Johnathan Mell, Gale M. Lucas, Sharon Mozgai, Jonathan Gratch The Effects of Experience on Deception in Human-Agent Negotiation. Search on Bibsonomy J. Artif. Intell. Res. The full citation details ... 2020 DBLP  BibTeX  RDF
13Imene Zerdazi, Mohamed Fezari, Mahdi Ouziala Detection of Deception Attacks in Supervisory Control Systems Using Bond Graph. Search on Bibsonomy Autom. Control. Comput. Sci. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Yang Li 0125, Hefu Liu, Matthew Lee 0005, Qian Huang 0001 Information privacy concern and deception in online retailing. Search on Bibsonomy Internet Res. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Xi (Leslie) Chen, Sarah Ita Levitan, Michelle Levine, Marko Mandic, Julia Hirschberg Acoustic-Prosodic and Lexical Cues to Deception and Trust: Deciphering How People Detect Lies. Search on Bibsonomy Trans. Assoc. Comput. Linguistics The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Bennett Kleinberg, Bruno Verschuere How human judgment impairs automated deception detection performance. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
13Benjamin Doerr, Martin S. Krejca The Univariate Marginal Distribution Algorithm Copes Well With Deception and Epistasis. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
13Abhishek Ninad Kulkarni, Huan Luo, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu Deceptive Labeling: Hypergames on Graphs for Stealthy Deception. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
13Matthew DelVecchio, Vanessa Arndorfer, William C. Headley Investigating a Spectral Deception Loss Metric for Training Machine Learning-based Evasion Attacks. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
13Linan Huang, Quanyan Zhu Game of Duplicity: A Proactive Automated Defense Mechanism by Deception Design. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
13Zhuo Lu, Cliff Wang, Shangqing Zhao Cyber Deception for Computer and Network Security: Survey and Challenges. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
13Jie Fu, Abhishek Ninad Kulkarni, Huan Luo, Nandi O. Leslie, Charles A. Kamhoua Secure-by-synthesis network with active deception and temporal logic specifications. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
13Shahryar Baki, Rakesh M. Verma, Arjun Mukherjee, Omprakash Gnawali Less is More: Exploiting Social Trust to Increase the Effectiveness of a Deception Attack. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
13Aditya Shinde, Prashant Doshi, Omid Setayeshfar Active Deception using Factored Interactive POMDPs to Recognize Cyber Attacker's Intent. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
13Leena Mathur, Maja J. Mataric Introducing Representations of Facial Affect in Automated Multimodal Deception Detection. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
13Matthew Porter, Sidhartha Dey, Arnav Joshi, Pedro Hespanhol, Anil Aswani, Matthew Johnson-Roberson, Ram Vasudevan Detecting Deception Attacks on Autonomous Vehicles via Linear Time-Varying Dynamic Watermarking. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
13Mohammad Qasem, Hussain M. J. Almohri An efficient deception architecture for cloud-based virtual networks. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
Displaying result #801 - #900 of 1875 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license