Results 311 to 320 of about 71,438 (359)
Some of the next articles are maybe not open access.

Secure Distributed Finite-Time Filtering for Positive Systems Over Sensor Networks Under Deception Attacks

IEEE Transactions on Cybernetics, 2020
This paper is concerned with secure ${\ell _{1}}$ -gain performance analysis and distributed finite-time filter design for a positive discrete-time linear system over a sensor network in the presence of deception attacks.
Shunyuan Xiao   +3 more
semanticscholar   +1 more source

Accuracy of Deception Judgments

Personality and Social Psychology Review, 2006
We analyze the accuracy of deception judgments, synthesizing research results from 206 documents and 24,483 judges. In relevant studies, people attempt to discriminate lies from truths in real time with no special aids or training. In these circumstances,
C. F. Bond, B. DePaulo
semanticscholar   +1 more source

Deception: The Role of Consequences

, 2005
Deception is part of many economic interactions. Business people, politicians, diplomats, lawyers, and students in the experimental laboratory who make use of private information do not always do so honestly.
U. Gneezy
semanticscholar   +1 more source

Robust Partial-Nodes-Based State Estimation for Complex Networks Under Deception Attacks

IEEE Transactions on Cybernetics, 2020
In this paper, the partial-nodes-based state estimators (PNBSEs) are designed for a class of uncertain complex networks subject to finite-distributed delays, stochastic disturbances, as well as randomly occurring deception attacks (RODAs).
Nan Hou, Zidong Wang, D. Ho, Hongli Dong
semanticscholar   +1 more source

Resilient control of networked control systems under deception attacks: A memory‐event‐triggered communication scheme

International Journal of Robust and Nonlinear Control, 2019
This paper considers resilient event‐triggered control problem for a class of networked systems subject to randomly occurring deception attacks. First, a new memory event‐triggered scheme (METS) is proposed to reduce the utilization of communication ...
Kunyu Wang   +4 more
semanticscholar   +1 more source

Secure impulsive synchronization in Lipschitz-type multi-agent systems subject to deception attacks

IEEE/CAA Journal of Automatica Sinica, 2020
Cyber attacks pose severe threats on synchronization of multi-agent systems. Deception attack, as a typical type of cyber attack, can bypass the surveillance of the attack detection mechanism silently, resulting in a heavy loss. Therefore, the problem of
Wangli He, Zekun Mo, Q. Han, F. Qian
semanticscholar   +1 more source

Distributed Deception Attack Detection in Platoon-Based Connected Vehicle Systems

IEEE Transactions on Vehicular Technology, 2020
This article investigates the distributed sensor deception attack and estimation for a class of platoon-based connected vehicles. In these systems, the information of each vehicle's position and its relative distances with respect to its neighbours plays
Zhiyang Ju, Hui Zhang, Ying Tan
semanticscholar   +1 more source

State-Saturated Recursive Filter Design for Stochastic Time-Varying Nonlinear Complex Networks Under Deception Attacks

IEEE Transactions on Neural Networks and Learning Systems, 2019
This article tackles the recursive filtering problem for a class of stochastic nonlinear time-varying complex networks (CNs) suffering from both the state saturations and the deception attacks.
Bo Shen, Zidong Wang, Dong Wang, Qi Li
semanticscholar   +1 more source

Deception Attack Detection and Estimation for a Local Vehicle in Vehicle Platooning Based on a Modified UFIR Estimator

IEEE Internet of Things Journal, 2020
In this article, the position sensor deception attack detection and estimation problem is investigated for a local vehicle in a vehicle platoon. In a platoon system, the position measurement is critical as the distances between neighboring vehicles are ...
Zhiyang Ju, Hui Zhang, Ying Tan
semanticscholar   +1 more source

The Detection of Deception

Neurologic Clinics, 1995
In clinical situations patient honesty and self-interest usually coincide; however, in legal circumstances patients may be motivated to deceive and may be skilled in doing so. Research raises doubts about the capacity of health professionals to detect malingering, particularly when there is less known about conditions or expected symptom patterns, more
openaire   +4 more sources

Home - About - Disclaimer - Privacy