Results 11 to 20 of about 75,612 (338)

A Complete Analysis on the Risk of Using Quantal Response: When Attacker Maliciously Changes Behavior under Uncertainty

open access: yesGames, 2022
In security games, the defender often has to predict the attacker’s behavior based on some observed attack data. However, a clever attacker can intentionally change its behavior to mislead the defender’s learning, leading to an ineffective defense ...
Thanh Hong Nguyen, Amulya Yadav
doaj   +1 more source

The role of conflict processing mechanism in deception responses

open access: yesScientific Reports, 2022
A considerable number of studies have described the potential neural mechanism of deception, but most deception studies have relied upon deception from experimental supervisor instruction. Experimental control (participants follow instructions to deceive
Jintao Wu   +4 more
doaj   +1 more source

Deceptive redistribution [PDF]

open access: yesReview of Economic Dynamics, 2016
Many policies enhance welfare under certain conditions, but have the potential to generate private rents at other times. This can prompt rent-seeking governments to adopt such policies excessively. If the economy's constituents can easily detect opportunistic policymaking, rent-seeking is constrained by the prospect of loosing political reputation and ...
Guillermo L. Ordoñez, Simeon D. Alder
openaire   +2 more sources

Contextual considerations for deception production and detection in forensic interviews

open access: yesFrontiers in Psychology, 2023
Most deception scholars agree that deception production and deception detection effects often display mixed results across settings. For example, some liars use more emotion than truth-tellers when discussing fake opinions on abortion, but not when ...
David M. Markowitz   +3 more
doaj   +1 more source

Research on a method of center of spreading spectrum testing deception jamming

open access: yesDianzi Jishu Yingyong, 2021
According to the problem of performance reduction even losing lock for the MIMO system threatened by deception jamming with pseudo-command, this paper presents a technology can test the deception jamming based on central part of spreading spectrum.
An Qiaojing   +5 more
doaj   +1 more source

The Dark Triad and Deception Perceptions

open access: yesFrontiers in Psychology, 2019
The present cross-sectional study (N = 205) tested the hypothesis that the Dark Triad traits – narcissism, Machiavellianism, and psychopathy – and the PID-5 maladaptive personality traits – Negative Affectivity, Detachment, Antagonism, Disinhibition, and
Benno Gerrit Wissing   +1 more
doaj   +1 more source

Synthetic Aperture Radar Interference Based on Scene Fusion and Active Cancellation

open access: yesIEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 2021
Echo cancellation is used for eliminating echo signals by signal modulation in the frequency domain and time domain. However, it depends on the high accuracy of parameter estimation.
Qizhen Zhou   +4 more
doaj   +1 more source

Mixed culture purple phototrophic bacteria is an effective fishmeal replacement in aquaculture

open access: yesWater Research X, 2019
Aquaculture is the fastest growing animal food production industry, now producing 50% of all food fish. However, aquaculture feeds remain dependent on fishmeal derived from capture fisheries, which must be reduced for continued sustainable growth. Purple
Jérôme Delamare-Deboutteville   +8 more
doaj   +1 more source

Deception in Amber Heard and Johnny Depp’s Trials

open access: yesمجلة كلية التربية للبنات, 2023
Deception is defined as a linguistic and non-linguistic behavior that is used in interaction in order to make the addressees believe what is believed to be false or lack evidence.
Nahla Mahmoud Hadi   +1 more
doaj   +1 more source

Deception Detection and Remote Physiological Monitoring: A Dataset and Baseline Experimental Results [PDF]

open access: yes2021 IEEE International Joint Conference on Biometrics (IJCB), 2021
We present the Deception Detection and Physiological Monitoring (DDPM) dataset and initial baseline results on this dataset. Our application context is an interview scenario in which the interviewee attempts to deceive the interviewer on selected ...
Jeremy Speth   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy