Results 11 to 20 of about 75,612 (338)
In security games, the defender often has to predict the attacker’s behavior based on some observed attack data. However, a clever attacker can intentionally change its behavior to mislead the defender’s learning, leading to an ineffective defense ...
Thanh Hong Nguyen, Amulya Yadav
doaj +1 more source
The role of conflict processing mechanism in deception responses
A considerable number of studies have described the potential neural mechanism of deception, but most deception studies have relied upon deception from experimental supervisor instruction. Experimental control (participants follow instructions to deceive
Jintao Wu +4 more
doaj +1 more source
Deceptive redistribution [PDF]
Many policies enhance welfare under certain conditions, but have the potential to generate private rents at other times. This can prompt rent-seeking governments to adopt such policies excessively. If the economy's constituents can easily detect opportunistic policymaking, rent-seeking is constrained by the prospect of loosing political reputation and ...
Guillermo L. Ordoñez, Simeon D. Alder
openaire +2 more sources
Contextual considerations for deception production and detection in forensic interviews
Most deception scholars agree that deception production and deception detection effects often display mixed results across settings. For example, some liars use more emotion than truth-tellers when discussing fake opinions on abortion, but not when ...
David M. Markowitz +3 more
doaj +1 more source
Research on a method of center of spreading spectrum testing deception jamming
According to the problem of performance reduction even losing lock for the MIMO system threatened by deception jamming with pseudo-command, this paper presents a technology can test the deception jamming based on central part of spreading spectrum.
An Qiaojing +5 more
doaj +1 more source
The Dark Triad and Deception Perceptions
The present cross-sectional study (N = 205) tested the hypothesis that the Dark Triad traits – narcissism, Machiavellianism, and psychopathy – and the PID-5 maladaptive personality traits – Negative Affectivity, Detachment, Antagonism, Disinhibition, and
Benno Gerrit Wissing +1 more
doaj +1 more source
Synthetic Aperture Radar Interference Based on Scene Fusion and Active Cancellation
Echo cancellation is used for eliminating echo signals by signal modulation in the frequency domain and time domain. However, it depends on the high accuracy of parameter estimation.
Qizhen Zhou +4 more
doaj +1 more source
Mixed culture purple phototrophic bacteria is an effective fishmeal replacement in aquaculture
Aquaculture is the fastest growing animal food production industry, now producing 50% of all food fish. However, aquaculture feeds remain dependent on fishmeal derived from capture fisheries, which must be reduced for continued sustainable growth. Purple
Jérôme Delamare-Deboutteville +8 more
doaj +1 more source
Deception in Amber Heard and Johnny Depp’s Trials
Deception is defined as a linguistic and non-linguistic behavior that is used in interaction in order to make the addressees believe what is believed to be false or lack evidence.
Nahla Mahmoud Hadi +1 more
doaj +1 more source
Deception Detection and Remote Physiological Monitoring: A Dataset and Baseline Experimental Results [PDF]
We present the Deception Detection and Physiological Monitoring (DDPM) dataset and initial baseline results on this dataset. Our application context is an interview scenario in which the interviewee attempts to deceive the interviewer on selected ...
Jeremy Speth +5 more
semanticscholar +1 more source

