|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 307 occurrences of 218 keywords
|
|
|
Results
Found 1875 publication records. Showing 1875 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
13 | Nguyen Van Huynh, Dinh Thai Hoang, Diep N. Nguyen, Eryk Dutkiewicz |
DeepFake: Deep Dueling-based Deception Strategy to Defeat Reactive Jammers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2005.07034, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Brian B., William Fleshman, Kevin H., Ryan Kaliszewski, Shawn R |
Deception and the Strategy of Influence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2011.01331, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Abhishek Ninad Kulkarni, Jie Fu |
A Theory of Hypergames on Graphs for Synthesizing Dynamic Cyber Defense with Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2008.03210, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Rômulo Meira-Góes, Stéphane Lafortune, Hervé Marchand |
Synthesis of Supervisors Robust Against Sensor Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2012.12932, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Wenqi Wei, Ling Liu 0001 |
Robust Deep Learning Ensemble against Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2009.06589, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Romulo Meira Goes, Eunsuk Kang, Raymond H. Kwong, Stéphane Lafortune |
Synthesis of Sensor Deception Attacks at the Supervisory Layer of Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2008.01497, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra |
Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2004.07678, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Alexandre Dey, Marc Velay, Jean-Philippe Fauvelle, Sylvain Navers |
Adversarial vs behavioural-based defensive AI with joint, continual and active learning: automated evaluation of robustness to deception, poisoning and concept drift. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2001.11821, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Joel Chacon, Sean McKeown, Richard Macfarlane |
Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2006.01849, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Iffat Anjum, Mu Zhu, Isaac Polinsky, William Enck, Michael K. Reiter, Munindar P. Singh |
Role-Based Deception in Enterprise Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2008.02979, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Moulik Choraria, Arpan Chattopadhyay, Urbashi Mitra, Erik G. Ström |
Optimal deception attack on networked vehicular cyber physical systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2002.01545, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Nikolai Vogler, Lisa Pearl |
Using linguistically defined specific details to detect deception across domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Nat. Lang. Eng. ![In: Nat. Lang. Eng. 26(3), pp. 349-373, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Wangli He, Zekun Mo, Qing-Long Han, Feng Qian 0004 |
Secure impulsive synchronization in Lipschitz-type multi-agent systems subject to deception attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE CAA J. Autom. Sinica ![In: IEEE CAA J. Autom. Sinica 7(5), pp. 1326-1334, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Jiang Wu, Yangyang Liu |
Deception detection methods incorporating discourse network metrics in synchronous computer-mediated communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Sci. ![In: J. Inf. Sci. 46(1), 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Takanori Machida, Dai Yamamoto, Yuki Unno, Hisashi Kojima |
Novel Deception Techniques for Malware Detection on Industrial Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 255, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Navdeep S. Sahni, Harikesh S. Nair |
Sponsorship Disclosure and Consumer Deception: Experimental Evidence from Native Advertising in Mobile Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mark. Sci. ![In: Mark. Sci. 39(1), pp. 5-32, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Yi Gao, Yunji Li, Li Peng 0004 |
Event-triggered fault tolerant control for a class of state saturated systems subject to deception attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Inst. Meas. Control ![In: Trans. Inst. Meas. Control 42(11), pp. 1935-1945, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Raquel Caballero-Águila, Aurora Hermoso-Carazo, Josefa Linares-Pérez |
A Two-Phase Distributed Filtering Algorithm for Networked Uncertain Systems with Fading Measurements under Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 20(22), pp. 6445, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Fengzeng Zhu, Xu Liu, Jiwei Wen, Linbo Xie, Li Peng |
Distributed Robust Filtering for Wireless Sensor Networks with Markov Switching Topologies and Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 20(7), pp. 1948, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Xinhai Wang, Gong Zhang 0002, Xiangmin Wang, Qingqing Song, Fangqing Wen |
ECCM Schemes against Deception Jamming Using OFDM Radar with Low Global PAPR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 20(7), pp. 2071, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Guoguang Wen, Xiaoqin Zhai, Zhaoxia Peng, Ahmed Rahmani |
Fault-Tolerant secure consensus tracking of delayed nonlinear multi-agent systems with deception attacks and uncertain parameters via impulsive control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. Nonlinear Sci. Numer. Simul. ![In: Commun. Nonlinear Sci. Numer. Simul. 82, pp. 105043, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Jinxia Wang, Jinfeng Gao, Tian Tan 0009, Jiaqi Wang, Miao Ma |
Event-Triggered H ∞ Filtering for Markovian Jump Neural Networks under Random Missing Measurements and Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex. ![In: Complex. 2020, pp. 4151542:1-4151542:19, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Yiming Sun, Jinyong Yu, Xinghu Yu, Huijun Gao |
Decentralized Adaptive Event-Triggered Control for a Class of Uncertain Systems With Deception Attacks and Its Application to Electronic Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. ![In: IEEE Trans. Circuits Syst. 67-I(12), pp. 5405-5416, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Sung Jin Yoo |
Neural-Network-Based Adaptive Resilient Dynamic Surface Control Against Unknown Deception Attacks of Uncertain Nonlinear Time-Delay Cyberphysical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Neural Networks Learn. Syst. ![In: IEEE Trans. Neural Networks Learn. Syst. 31(10), pp. 4341-4353, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Bo Shen 0001, Zidong Wang, Dong Wang, Qi Li 0021 |
State-Saturated Recursive Filter Design for Stochastic Time-Varying Nonlinear Complex Networks Under Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Neural Networks Learn. Syst. ![In: IEEE Trans. Neural Networks Learn. Syst. 31(10), pp. 3788-3800, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Nathan W. Twyman, Jeffrey Gainer Proudfoot, Ann-Frances Cameron, J. Eric Case, Judee K. Burgoon, Douglas P. Twitchell |
Too Busy to Be Manipulated: How Multitasking with Technology Improves Deception Detection in Collaborative Teamwork. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Manag. Inf. Syst. ![In: J. Manag. Inf. Syst. 37(2), pp. 377-395, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Amin Derakhshan, Mohammad Mikaeili, Tom Gedeon, Ali Motie Nasrabadi |
Identifying the Optimal Features in Multimodal Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multimodal Technol. Interact. ![In: Multimodal Technol. Interact. 4(2), pp. 25, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Marcus Gutierrez, Christopher Kiekintveld |
Online Learning Methods for Controlling Dynamic Cyber Deception Strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adaptive Autonomous Secure Cyber Systems ![In: Adaptive Autonomous Secure Cyber Systems., pp. 231-251, 2020, Springer, 978-3-030-33431-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Aaron Schlenker, Omkar Thakoor, Haifeng Xu, Fei Fang 0001, Milind Tambe, Phebe Vayanos |
Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adaptive Autonomous Secure Cyber Systems ![In: Adaptive Autonomous Secure Cyber Systems., pp. 183-204, 2020, Springer, 978-3-030-33431-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Sridhar Venkatesan, Shridatt Sugrim, Jason A. Youzwak, Cho-Yu Jason Chiang, Ritu Chadha |
A Framework for Studying Autonomic Computing Models in Cyber Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adaptive Autonomous Secure Cyber Systems ![In: Adaptive Autonomous Secure Cyber Systems., pp. 89-107, 2020, Springer, 978-3-030-33431-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Jun-Teng Yang, Guei-Ming Liu, Scott C.-H. Huang |
Emotion Transformation Feature: Novel Feature For Deception Detection In Videos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: IEEE International Conference on Image Processing, ICIP 2020, Abu Dhabi, United Arab Emirates, October 25-28, 2020, pp. 1726-1730, 2020, IEEE, 978-1-7281-6396-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Satyaki Nan, Swastik Brahma, Charles A. Kamhoua, Nandi O. Leslie |
Mitigation of Jamming Attacks via Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PIMRC ![In: 31st IEEE Annual International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2020, London, United Kingdom, August 31 - September 3, 2020, pp. 1-6, 2020, IEEE, 978-1-7281-4490-0. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Joel Chacon, Sean McKeown, Richard Macfarlane |
Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020, pp. 1-8, 2020, IEEE, 978-1-7281-6428-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Tapadhir Das, Abdel Rahman Eldosouky, Shamik Sengupta |
Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020, pp. 1-8, 2020, IEEE, 978-1-7281-6428-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Dianshi Yang, Daisuke Mashima, Wei Lin, Jianying Zhou 0001 |
DecIED: Scalable k-Anonymous Deception for IEC61850-Compliant Smart Grid Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPSS@AsiaCCS ![In: Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, CPSS@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020, pp. 54-65, 2020, ACM, 978-1-4503-7608-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Jiaxuan Zhang, Sarah Ita Levitan, Julia Hirschberg |
Multimodal Deception Detection Using Automatically Extracted Acoustic, Visual, and Lexical Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTERSPEECH ![In: Interspeech 2020, 21st Annual Conference of the International Speech Communication Association, Virtual Event, Shanghai, China, 25-29 October 2020., pp. 359-363, 2020, ISCA. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Merylin Monaro, Pasquale Capuozzo, Federica Ragucci, Antonio Maffei, Antonietta Curci, Cristina Scarpazza, Alessandro Angrilli, Giuseppe Sartori |
Using Blink Rate to Detect Deception: A Study to Validate an Automatic Blink Detector and a New Dataset of Videos from Liars and Truth-Tellers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (3) ![In: Human-Computer Interaction. Human Values and Quality of Life - Thematic Area, HCI 2020, Held as Part of the 22nd International Conference, HCII 2020, Copenhagen, Denmark, July 19-24, 2020, Proceedings, Part III, pp. 494-509, 2020, Springer, 978-3-030-49064-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Eleonora Beccaluva, Antonio Chiappetta, Julian Cuellar Mangut, Luca Molteni, Marco Mores, Daniele Occhiuto, Franca Garzotto |
Deception of the "Elephant in the Room": Invisible Auditing Multi-party Conversations to Support Caregivers in Cognitive Behavioral Group Therapies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (3) ![In: Human-Computer Interaction. Human Values and Quality of Life - Thematic Area, HCI 2020, Held as Part of the 22nd International Conference, HCII 2020, Copenhagen, Denmark, July 19-24, 2020, Proceedings, Part III, pp. 3-22, 2020, Springer, 978-3-030-49064-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Huang-Cheng Chou, Chi-Chun Lee |
"Your Behavior Makes Me Think It Is a Lie": Recognizing Perceived Deception using Multimodal Data in Dialog Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSIPA ![In: Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2020, Auckland, New Zealand, December 7-10, 2020, pp. 393-402, 2020, IEEE, 978-988-14768-8-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Luan Huy Pham, Massimiliano Albanese, Ritu Chadha, Cho-Yu Jason Chiang, Sridhar Venkatesan, Charles A. Kamhoua, Nandi Leslie |
A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNS ![In: 8th IEEE Conference on Communications and Network Security, CNS 2020, Avignon, France, June 29 - July 1, 2020, pp. 1-9, 2020, IEEE, 978-1-7281-4760-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Md Sajidul Islam Sajid, Jinpeng Wei, Md Rabbi Alam, Ehsan Aghaei, Ehab Al-Shaer |
DodgeTron: Towards Autonomous Cyber Deception Using Dynamic Hybrid Analysis of Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNS ![In: 8th IEEE Conference on Communications and Network Security, CNS 2020, Avignon, France, June 29 - July 1, 2020, pp. 1-9, 2020, IEEE, 978-1-7281-4760-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Ahmed H. Anwar, Charles A. Kamhoua, Nandi Leslie |
Honeypot Allocation over Attack Graphs in Cyber Deception Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC ![In: International Conference on Computing, Networking and Communications, ICNC 2020, Big Island, HI, USA, February 17-20, 2020, pp. 502-506, 2020, IEEE, 978-1-7281-4905-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Matthew Porter, Sidhartha Dey, Arnav Joshi, Pedro Hespanhol, Anil Aswani, Matthew Johnson-Roberson, Ram Vasudevan |
Detecting Deception Attacks on Autonomous Vehicles via Linear Time-Varying Dynamic Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCTA ![In: 2020 IEEE Conference on Control Technology and Applications, CCTA 2020, Montreal, QC, Canada, August 24-26, 2020, pp. 1-8, 2020, IEEE, 978-1-7281-7140-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Owolafe Otasowie |
Application of Machine Learning in Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAI (3) ![In: Intelligent Computing - Proceedings of the 2020 Computing Conference, Volume 3, pp. 61-76, 2020, Springer, 978-3-030-52242-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Ryan Mills, Nicholas J. P. Race, Matthew Broadbent |
Citrus: Orchestrating Security Mechanisms via Adversarial Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: NOMS 2020 - IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, April 20-24, 2020, pp. 1-4, 2020, IEEE, 978-1-7281-4973-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Jianbang Qin, Wei Guo |
Event correlation for deception detection in long video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMV ![In: Thirteenth International Conference on Machine Vision, ICMV 2020, Rome, Italy, November 2-6, 2020, pp. 116050E, 2020, SPIE, 9781510640405. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Evgeny Hershkovitch Neiterman, Moshe Bitan, Amos Azaria |
Multilingual Deception Detection by Autonomous Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW (Companion Volume) ![In: Companion of The 2020 Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, pp. 480-484, 2020, ACM / IW3C2, 978-1-4503-7024-0. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Zheyuan Ryan Shi, Ariel D. Procaccia, Kevin S. Chan, Sridhar Venkatesan, Noam Ben-Asher, Nandi O. Leslie, Charles A. Kamhoua, Fei Fang 0001 |
Learning and Planning in the Feature Deception Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GameSec ![In: Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings, pp. 23-44, 2020, Springer, 978-3-030-64792-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Olivier Tsemogne, Yezekael Hayel, Charles A. Kamhoua, Gabriel Deugoue |
Partially Observable Stochastic Games for Cyber Deception Against Network Epidemic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GameSec ![In: Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings, pp. 312-325, 2020, Springer, 978-3-030-64792-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Ahmed H. Anwar, Charles A. Kamhoua |
Game Theory on Attack Graph for Cyber Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GameSec ![In: Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings, pp. 445-456, 2020, Springer, 978-3-030-64792-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Stephanie Milani, Weiran Shen, Kevin S. Chan, Sridhar Venkatesan, Nandi O. Leslie, Charles A. Kamhoua, Fei Fang 0001 |
Harnessing the Power of Deception in Attack Graph-Based Security Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GameSec ![In: Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings, pp. 147-167, 2020, Springer, 978-3-030-64792-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Mark Bilinski, Joe DiVita, Kimberly Ferguson-Walter, Sunny Fugate, Ryan Gabrys, Justin Mauger, Brian Souza |
Lie Another Day: Demonstrating Bias in a Multi-round Cyber Deception Game of Questionable Veracity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GameSec ![In: Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings, pp. 80-100, 2020, Springer, 978-3-030-64792-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Casper Justesen Bech |
The Need for Focused Research on Coercion, Deception and Manipulation in Persuasive Use of Social Media. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PERSUASIVE (Adjunct) ![In: 15th International Conference on Persuasive Technology, Adjunct Proceedings (PERSUASIVE 2020), Aalborg, Denmark, April 20th - 23rd, 2020., 2020, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Vibha Belavadi, Yan Zhou 0001, Jonathan Z. Bakdash, Murat Kantarcioglu, Daniel C. Krawczyk, Linda Nguyen, Jelena Rakic, Bhavani Thuraisingham |
MultiModal Deception Detection: Accuracy, Applicability and Generalizability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TPS-ISA ![In: Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2020, Atlanta, GA, USA, October 28-31, 2020, pp. 99-106, 2020, IEEE, 978-1-7281-8543-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Wenqi Wei, Ling Liu 0001, Margaret Loper, Ka Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu 0001 |
Adversarial Deception in Deep Learning: Analysis and Mitigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TPS-ISA ![In: Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2020, Atlanta, GA, USA, October 28-31, 2020, pp. 236-245, 2020, IEEE, 978-1-7281-8543-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Yaqin Zhang, Duohe Ma, Xiaoyan Sun 0003, Kai Chen, Feng Liu 0001 |
What You See Is Not What You Get: Towards Deception-Based Data Moving Target Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: 39th IEEE International Performance Computing and Communications Conference, IPCCC 2020, Austin, TX, USA, November 6-8, 2020, pp. 1-8, 2020, IEEE, 978-1-7281-9829-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | David Weissman |
IoT Security Using Deception - Measuring Improved Risk Posture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WF-IoT ![In: 6th IEEE World Forum on Internet of Things, WF-IoT 2020, New Orleans, LA, USA, June 2-16, 2020, pp. 1-2, 2020, IEEE, 978-1-7281-5503-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Leena Mathur, Maja J. Mataric |
Introducing Representations of Facial Affect in Automated Multimodal Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMI ![In: ICMI '20: International Conference on Multimodal Interaction, Virtual Event, The Netherlands, October 25-29, 2020, pp. 305-314, 2020, ACM, 978-1-4503-7581-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Valeriya Karpova, Polina Popenova, Nadezda Glebko, Vladimir Lyashenko, Olga Perepelkina |
"Was It You Who Stole 500 Rubles?" - The Multimodal Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMI Companion ![In: Companion Publication of the 2020 International Conference on Multimodal Interaction, ICMI Companion 2020, Virtual Event, The Netherlands, October, 2020, pp. 112-119, 2020, ACM, 978-1-4503-8002-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William Robertson 0002 |
Cached and Confused: Web Cache Deception in the Wild. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020, pp. 665-682, 2020, USENIX Association, 978-1-939133-17-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Aliou Badra Sarr, Ahmed H. Anwar, Charles A. Kamhoua, Nandi Leslie, Jaime C. Acosta |
Software Diversity for Cyber Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: IEEE Global Communications Conference, GLOBECOM 2020, Virtual Event, Taiwan, December 7-11, 2020, pp. 1-6, 2020, IEEE, 978-1-7281-8298-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Pasquale Capuozzo, Ivano Lauriola, Carlo Strapparava, Fabio Aiolli, Giuseppe Sartori |
Automatic Detection of Cross-language Verbal Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CogSci ![In: Proceedings of the 42th Annual Meeting of the Cognitive Science Society - Developing a Mind: Learning in Humans, Animals, and Machines, CogSci 2020, virtual, July 29 - August 1, 2020, 2020, cognitivesciencesociety.org. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Mengwei Liu, Hui Lu, Yan Cao, Xue Bai, Rongli Xiao |
Spillover Effect of Perceived Online Products Information Deception in the Information Age. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIA (1) ![In: Cyber Security Intelligence and Analytics - Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics, CSIA 2020, Haikou, China, 28-29 February 2020, Volume 1, pp. 501-508, 2020, Springer, 978-3-030-43305-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Andrew Estornell, Sanmay Das, Yevgeniy Vorobeychik |
Deception through Half-Truths. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI ![In: The Thirty-Fourth AAAI Conference on Artificial Intelligence, AAAI 2020, The Thirty-Second Innovative Applications of Artificial Intelligence Conference, IAAI 2020, The Tenth AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2020, New York, NY, USA, February 7-12, 2020., pp. 10110-10117, 2020, AAAI Press, 978-1-57735-823-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Jiacheng Li, Chunyuan Yuan, Wei Zhou 0019, Jingli Wang, Songlin Hu |
Who Are Controlled by The Same User? Multiple Identities Deception Detection via Social Interaction Activity (Student Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI ![In: The Thirty-Fourth AAAI Conference on Artificial Intelligence, AAAI 2020, The Thirty-Second Innovative Applications of Artificial Intelligence Conference, IAAI 2020, The Tenth AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2020, New York, NY, USA, February 7-12, 2020., pp. 13853-13854, 2020, AAAI Press, 978-1-57735-823-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Thanh Hong Nguyen, Andrew Butler, Haifeng Xu |
Tackling Imitative Attacker Deception in Repeated Bayesian Stackelberg Security Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECAI ![In: ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020 - Including 10th Conference on Prestigious Applications of Artificial Intelligence (PAIS 2020), pp. 187-194, 2020, IOS Press, 978-1-64368-100-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Thanh Hong Nguyen, Nam Vu, Amulya Yadav, Uy Nguyen |
Decoding the Imitation Security Game: Handling Attacker Imitative Behavior Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECAI ![In: ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020 - Including 10th Conference on Prestigious Applications of Artificial Intelligence (PAIS 2020), pp. 179-186, 2020, IOS Press, 978-1-64368-100-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Benjamin Doerr, Martin S. Krejca |
The Univariate Marginal Distribution Algorithm Copes Well with Deception and Epistasis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EvoCOP ![In: Evolutionary Computation in Combinatorial Optimization - 20th European Conference, EvoCOP 2020, Held as Part of EvoStar 2020, Seville, Spain, April 15-17, 2020, Proceedings, pp. 51-66, 2020, Springer, 978-3-030-43679-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Jaime C. Acosta, Anjon Basak, Christopher Kiekintveld, Nandi Leslie, Charles A. Kamhoua |
Cybersecurity Deception Experimentation System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecDev ![In: IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020, pp. 34-40, 2020, IEEE, 978-1-7281-8388-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Amirhossein Asgharnia, Howard M. Schwartz 0001, Mohamed M. Atia |
Deception In The Game of Guarding Multiple Territories: A Machine Learning Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: 2020 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2020, Toronto, ON, Canada, October 11-14, 2020, pp. 381-388, 2020, IEEE, 978-1-7281-8526-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Benjamin Doerr, Martin S. Krejca |
The univariate marginal distribution algorithm copes well with deception and epistasis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO Companion ![In: GECCO '20: Genetic and Evolutionary Computation Conference, Companion Volume, Cancún, Mexico, July 8-12, 2020, pp. 17-18, 2020, ACM, 978-1-4503-7127-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Abdulhamid Adebayo, Danda B. Rawat |
Deceptor-in-the-Middle (DitM): Cyber Deception for Security in Wireless Network Virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: IEEE 17th Annual Consumer Communications & Networking Conference, CCNC 2020, Las Vegas, NV, USA, January 10-13, 2020, pp. 1-6, 2020, IEEE, 978-1-7281-3893-0. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Emily Saldanha, Aparna Garimella, Svitlana Volkova |
Understanding and Explicitly Measuring Linguistic and Stylistic Properties of Deception via Generation and Translation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INLG ![In: Proceedings of the 13th International Conference on Natural Language Generation, INLG 2020, Dublin, Ireland, December 15-18, 2020, pp. 216-226, 2020, Association for Computational Linguistics, 978-1-952148-54-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Anastasia Danilova, Alena Naiakshina, Johanna Deuter, Matthew Smith 0001 |
Replication: On the Ecological Validity of Online Security Developer Studies: Exploring Deception in a Password-Storage Study with Freelancers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS @ USENIX Security Symposium ![In: Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020., pp. 165-183, 2020, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Hua Wu 0004, Yu Gu, Guang Cheng 0001, Yuyang Zhou |
Effectiveness Evaluation Method for Cyber Deception Based on Dynamic Bayesian Attack Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE ![In: CSSE 2020: 3rd International Conference on Computer Science and Software Engineering, Beijing, China, May 22-24, 2020, pp. 1-9, 2020, ACM, 978-1-4503-7552-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Gazi Naven, Taylan K. Sen, Luke Gerstner, Kurtis Haut, Melissa Wen, Ehsan Hoque 0001 |
Leveraging Shared and Divergent Facial Expression Behavior Between Genders in Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FG ![In: 15th IEEE International Conference on Automatic Face and Gesture Recognition, FG 2020, Buenos Aires, Argentina, November 16-20, 2020, pp. 428-435, 2020, IEEE, 978-1-7281-3079-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Liping He, Xunbing Shen, Zhencai Chen, Keding Li, Zhennan Liu, Ruirui Zhuo |
The Ability to Recognize Microexpression and Detect Deception in the Elderly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FG ![In: 15th IEEE International Conference on Automatic Face and Gesture Recognition, FG 2020, Buenos Aires, Argentina, November 16-20, 2020, pp. 761-764, 2020, IEEE, 978-1-7281-3079-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Mohammad Sujan Miah, Marcus Gutierrez, Oscar Veliz, Omkar Thakoor, Christopher Kiekintveld |
Concealing Cyber-Decoys using Two-Sided Feature Deception Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 53rd Hawaii International Conference on System Sciences, HICSS 2020, Maui, Hawaii, USA, January 7-10, 2020, pp. 1-10, 2020, ScholarSpace. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Jafar Haadi Jafarian, Amirreza Niakanlahiji |
A Deception Planning Framework for Cyber Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 53rd Hawaii International Conference on System Sciences, HICSS 2020, Maui, Hawaii, USA, January 7-10, 2020, pp. 1-10, 2020, ScholarSpace. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Edward A. Cranford, Cleotilde Gonzalez, Palvi Aggarwal, Sarah Cooney, Milind Tambe, Christian Lebiere |
Adaptive Cyber Deception: Cognitively Informed Signaling for Cyber Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 53rd Hawaii International Conference on System Sciences, HICSS 2020, Maui, Hawaii, USA, January 7-10, 2020, pp. 1-10, 2020, ScholarSpace. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Cleotilde Gonzalez, Palvi Aggarwal, Christian Lebiere, Edward A. Cranford |
Design of Dynamic and Personalized Deception: A Research Framework and New Insights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 53rd Hawaii International Conference on System Sciences, HICSS 2020, Maui, Hawaii, USA, January 7-10, 2020, pp. 1-10, 2020, ScholarSpace. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Rob Black, Iain Reid |
Toward a Holistic Model of Deception: Subject Matter Expert Validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 53rd Hawaii International Conference on System Sciences, HICSS 2020, Maui, Hawaii, USA, January 7-10, 2020, pp. 1-10, 2020, ScholarSpace. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Kimberly Ferguson-Walter, Sunny Fugate, Cliff Wang |
Introduction to the Minitrack on Cyber Deception for Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 53rd Hawaii International Conference on System Sciences, HICSS 2020, Maui, Hawaii, USA, January 7-10, 2020, pp. 1-2, 2020, ScholarSpace. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Temmie Shade, Andrew Rogers, Kimberly Ferguson-Walter, Sara Beth Elsen, Daniel Fayette, Kristin E. Heckman |
The Moonraker Study: An Experimental Evaluation of Host-Based Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 53rd Hawaii International Conference on System Sciences, HICSS 2020, Maui, Hawaii, USA, January 7-10, 2020, pp. 1-10, 2020, ScholarSpace. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Amirreza Niakanlahiji, Jafar Haadi Jafarian, Bei-Tseng Chu, Ehab Al-Shaer |
HoneyBug: Personalized Cyber Deception for Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 53rd Hawaii International Conference on System Sciences, HICSS 2020, Maui, Hawaii, USA, January 7-10, 2020, pp. 1-10, 2020, ScholarSpace. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Ngoc-Dau Mai, Trung-Hau Nguyen, Wan-Young Chung |
Deception Detection Using a Multichannel Custom-Design EEG System and Multiple Variants of Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IHCI (1) ![In: Intelligent Human Computer Interaction - 12th International Conference, IHCI 2020, Daegu, South Korea, November 24-26, 2020, Proceedings, Part I, pp. 104-109, 2020, Springer, 978-3-030-68448-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Keeley A. Crockett, James O'Shea, Wasiq Khan |
Automated Deception Detection of Males and Females From Non-Verbal Facial Micro-Gestures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: 2020 International Joint Conference on Neural Networks, IJCNN 2020, Glasgow, United Kingdom, July 19-24, 2020, pp. 1-7, 2020, IEEE, 978-1-7281-6926-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Noora Al Roken, Maryam Al Abdooli, Sumaya Khoory, Hakim Hacid |
SpeculoLab: A Protocol and a Tool for Identity Deception Experimentation in Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASONAM ![In: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2020, The Hague, Netherlands, December 7-10, 2020, pp. 952-955, 2020, IEEE, 978-1-7281-1056-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | David Nam, Jerin Yasmin, Farhana H. Zulkernine |
Effects of Pre-trained Word Embeddings on Text-based Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASC/PiCom/CBDCom/CyberSciTech ![In: IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2020, Calgary, AB, Canada, August 17-22, 2020, pp. 437-443, 2020, IEEE, 978-1-7281-6609-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Haissam Badih, Yasamin Alagrash, Julian L. Rrushi |
A Blockchain and Defensive Deception Co-design for Webcam Spyware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASC/PiCom/CBDCom/CyberSciTech ![In: IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2020, Calgary, AB, Canada, August 17-22, 2020, pp. 593-600, 2020, IEEE, 978-1-7281-6609-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Safa Chebbi, Sofia Ben Jebara |
An Audio-Visual based Feature Level Fusion Approach Applied to Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VISIGRAPP (4: VISAPP) ![In: Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, VISIGRAPP 2020, Volume 4: VISAPP, Valletta, Malta, February 27-29, 2020., pp. 197-205, 2020, SCITEPRESS, 978-989-758-402-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Safa Chebbi, Sofia Ben Jebara |
Towards Detecting Simultaneous Fear Emotion and Deception Behavior in Speech. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VISIGRAPP (5: VISAPP) ![In: Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, VISIGRAPP 2020, Volume 5: VISAPP, Valletta, Malta, February 27-29, 2020., pp. 712-720, 2020, SCITEPRESS, 978-989-758-402-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Matteo Cardaioli, Merylin Monaro, Giuseppe Sartori, Mauro Conti |
Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AHFE (19) ![In: Advances in Human Factors in Cybersecurity - AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA, pp. 41-48, 2020, Springer, 978-3-030-52580-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Sinead V. Fernandes, Muhammad Sana Ullah |
Phychoacoustic Masking of Delta and Time -Difference Cepstrum Features for Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UEMCON ![In: 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, UEMCON 2020, New York City, NY, USA, October 28-31, 2020, pp. 213-217, 2020, IEEE, 978-1-7281-9656-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Thanh Hong Nguyen, Arunesh Sinha, He He |
Partial Adversarial Behavior Deception in Security Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCAI ![In: Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, IJCAI 2020, pp. 283-289, 2020, ijcai.org. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Amirhossein Asgharnia, Howard M. Schwartz 0001, Mohamed M. Atia |
Deception in A Multi-agent Adversarial Game: The Game of Guarding Several Territories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSCI ![In: 2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020, Canberra, Australia, December 1-4, 2020, pp. 1321-1327, 2020, IEEE, 978-1-7281-2547-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Abdullah Aydeger, Nico Saputro, Kemal Akkaya |
Cloud-based Deception against Network Reconnaissance Attacks using SDN and NFV. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 45th IEEE Conference on Local Computer Networks, LCN 2020, Sydney, Australia, November 16-19, 2020, pp. 279-285, 2020, IEEE, 978-1-7281-7158-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Pasquale Capuozzo, Ivano Lauriola, Carlo Strapparava, Fabio Aiolli, Giuseppe Sartori |
DecOp: A Multilingual and Multi-domain Corpus For Detecting Deception In Typed Text. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LREC ![In: Proceedings of The 12th Language Resources and Evaluation Conference, LREC 2020, Marseille, France, May 11-16, 2020, pp. 1423-1430, 2020, European Language Resources Association, 979-10-95546-34-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Matthew DelVecchio, Vanessa Arndorfer, William C. Headley |
Investigating a spectral deception loss metric for training machine learning-based evasion attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WiseML@WiSec ![In: Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, WiseML@WiSec 2020, Linz, Austria, July 13, 2020, pp. 43-48, 2020, ACM, 978-1-4503-8007-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Mehmet Umut Sen |
Multi-modal deception detection from videos (Videolardan çoklu-modalite ile aldatmaca kestirimi) ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
RDF |
|
|
|