Search

Your search keyword '"Deception"' showing total 12,659 results

Search Constraints

Start Over You searched for: Descriptor "Deception" Remove constraint Descriptor: "Deception" Topic media_common Remove constraint Topic: media_common
12,659 results on '"Deception"'

Search Results

1. Impulsive-Based Almost Surely Synchronization for Neural Network Systems Subject to Deception Attacks

2. Business email compromise (BEC) attacks

3. Security-Based Passivity Analysis of Markov Jump Systems via Asynchronous Triggering Control

4. Recursive Minimum-Variance Filter Design for State-Saturated Complex Networks With Uncertain Coupling Strengths Subject to Deception Attacks

5. Registered report: The effects of incentivized lies on memory

6. LieNet: A Deep Convolution Neural Network Framework for Detecting Deception

7. Strategic Communication Before Price Haggling: A Tale of Two Orientations

8. Robust Asynchronous Filtering for Discrete-Time T–S Fuzzy Complex Dynamical Networks Against Deception Attacks

9. Psychics and the ‘other side’

10. Pathological Lying: Psychotherapists’ Experiences and Ability to Diagnose

11. Construct and Predictive Validity of an Assessment Game to Measure Honesty–Humility

12. RCIT: An RSVP-Based Concealed Information Test Framework Using EEG Signals

13. Distributed Maximum Correntropy Filtering for Stochastic Nonlinear Systems Under Deception Attacks

14. Foureye: Defensive Deception Against Advanced Persistent Threats via Hypergame Theory

15. Counterfeit diversity: How strategically misrepresenting gender diversity dampens organizations’ perceived sincerity and elevates women’s identity threat concerns

17. 2-D Moving Target Deception Against Multichannel SAR-GMTI Using Frequency Diverse Array

18. A two-event-generator scheme for event-triggered control of uncertain NCSs under deception attacks

19. TMI? Accompanying details impact statements’ perceived veracity

20. Multimodal Deception Detection Using Real-Life Trial Data

21. Adaptive Control of Second-Order Nonlinear Systems With Injection and Deception Attacks

22. Exponential synchronization of coupled neural networks under stochastic deception attacks

23. SMC for Semi-Markov Jump Cyber-Physical Systems Subject to Randomly Occurring Deception Attacks

24. Bending Our Ethics Code

25. Entropy-based network traffic anomaly classification method resilient to deception

26. Memory-based event-triggered leader-following consensus for T-S fuzzy multi-agent systems subject to deception attacks

27. Affordance-based control in deceptive and non-deceptive penalties in soccer goalkeeping: Gender matters!

28. Deception and Research

29. Susceptibility of the Self-Report Psychopathy Scale (SRP 4) to response distortion and the utility of including validity indices to detect deception

30. Attack Detection and Distributed Filtering for State-Saturated Systems Under Deception Attack

31. Deception Detection Tests: A Subdued Investigating Tool

33. Library Services from the Outside-In

34. Warning behaviors and leaked intent: Potential new avenues to prevent mass shootings

35. Negacionistas são os outros? Verdade, engano e interesse na era da pós-verdade

36. Ocular‐motor deception testing in civilly detained sexually violent persons: An alternative to <scp>post‐conviction</scp> sex offender polygraph testing?

37. Instrumental measurement of the cognitive and emotional background of deception

38. Revisiting the Relationship Between Deception and Design: A Replication and Extension of Hancock et al. (2004)

39. Deception electronic counter‐countermeasure applicable to multiple jammer sources in distributed multiple‐radar system

40. Structured groups make more accurate veracity judgements than individuals

41. Unsupervised Clustering Method to Discriminate Dense Deception Jamming for Surveillance Radar

42. Quasi-Consensus Control for a Class of Time-Varying Stochastic Nonlinear Time-Delay Multiagent Systems Subject to Deception Attacks

43. Using cognitive instructions to elicit narrative differences between children's true and false testimonies

44. Event-triggered control of networked switched systems under network attacks

46. Deception as a Bridging Concept in the Study of Disinformation, Misinformation, and Misperceptions: Toward a Holistic Framework

47. Cognitive control promotes either honesty or dishonesty, depending on one's moral default

48. Sex Differences in Response to Deception Across Mate-Value Traits of Attractiveness, Job Status, and Altruism in Online Dating

49. Detecting fake hospitality reviews through the interplay of emotional cues, cognitive cues and review valence

50. Disguises and the Origins of Clothing

Catalog

Books, media, physical & digital resources