Results 331 to 340 of about 71,438 (359)
Some of the next articles are maybe not open access.
Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation
IEEE Transactions on Control of Network Systems, 2018In this paper, a security problem in cyberphysical systems (CPS) is studied. A remote state estimation process using multiple sensors is considered. The measurement innovation packets from each sensor, which may be modified by a malicious attacker, are ...
Yuzhe Li, Ling Shi, Tongwen Chen
semanticscholar +1 more source
THE UBIQUITY OF DECEPTION AND THE ETHICS OF DECEPTIVE RESEARCH
Bioethics, 2008ABSTRACTDoes the fact that deception is widely practised – even though there is a general prohibition against deception – provide insight into the ethics of deceptive methods in research, especially for social‐behavioral research?I answer in the affirmative.
openaire +3 more sources
Hastings Center Report, 2005
PB, a middle-aged man, has suffered from Crohn's proctitis, an autoimmune disorder, for most of his life. To treat it, he undergoes a nonemergent colostomy and proctectomy; he had also undergone several bowel resections at other hospitals prior to this with no complications. Before surgery, he meets twice with the surgeon to discuss surgical risks such
Katrina A. Bramstedt, Robert Macauley
openaire +3 more sources
PB, a middle-aged man, has suffered from Crohn's proctitis, an autoimmune disorder, for most of his life. To treat it, he undergoes a nonemergent colostomy and proctectomy; he had also undergone several bowel resections at other hospitals prior to this with no complications. Before surgery, he meets twice with the surgeon to discuss surgical risks such
Katrina A. Bramstedt, Robert Macauley
openaire +3 more sources
A Deep Learning Approach for Multimodal Deception Detection
Conference on Intelligent Text Processing and Computational Linguistics, 2018Automatic deception detection is an important task that has gained momentum in computational linguistics due to its potential applications. In this paper, we propose a simple yet tough to beat multi-modal neural model for deception detection.
Gangeshwar Krishnamurthy+3 more
semanticscholar +1 more source
Bag-of-Lies: A Multimodal Dataset for Deception Detection
2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2019Deception detection is a pervasive issue in security. It has been widely studied using traditional modalities, such as video, audio and transcripts; however, there has been a lack of investigation in using modalities such as EEG and Gaze data due to the ...
Viresh Gupta+5 more
semanticscholar +1 more source
The Philosophical Quarterly, 1983
Philosophical work on self-deception revolves around a trio of questions. What is self-deception? Is self-deception possible? How are instances of self-deception to be explained? The extent to which self-deception is analogous to interpersonal deception is controversial, partly because certain analogies threaten to render the possibility of self ...
openaire +1 more source
Philosophical work on self-deception revolves around a trio of questions. What is self-deception? Is self-deception possible? How are instances of self-deception to be explained? The extent to which self-deception is analogous to interpersonal deception is controversial, partly because certain analogies threaten to render the possibility of self ...
openaire +1 more source
Journal of the American Psychoanalytic Association, 1995
Three characteristic transference configurations are identified that frequently emerge in the analyses of patients for whom deception and inauthenticity are central themes. These configurations are la beled (1) imposturous, (2) psychopathic-paranoid, and (3) psycho pathic-unreal.
openaire +3 more sources
Three characteristic transference configurations are identified that frequently emerge in the analyses of patients for whom deception and inauthenticity are central themes. These configurations are la beled (1) imposturous, (2) psychopathic-paranoid, and (3) psycho pathic-unreal.
openaire +3 more sources
BMJ, 2013
Everyone lies. In their CVs, job applicants always were the captain of the football, hockey, or something-else team at school; played three musical instruments, normally at the same time; enjoyed debating; were head boy or girl; and had also done good work in Africa (a continent overflowing with poorly constructed toilet blocks built by hapless ...
openaire +3 more sources
Everyone lies. In their CVs, job applicants always were the captain of the football, hockey, or something-else team at school; played three musical instruments, normally at the same time; enjoyed debating; were head boy or girl; and had also done good work in Africa (a continent overflowing with poorly constructed toilet blocks built by hapless ...
openaire +3 more sources
1992
This chapter examines how the relations between the military junta and its allies, particularly communists and the Muslim Brotherhood, deteriorated. The Democratic Movement for National Liberation (DMNL), the largest and least doctrinaire communist movement in Egypt, and Muslim Brotherhood had collaborated with the Free Officers and played significant ...
openaire +1 more source
This chapter examines how the relations between the military junta and its allies, particularly communists and the Muslim Brotherhood, deteriorated. The Democratic Movement for National Liberation (DMNL), the largest and least doctrinaire communist movement in Egypt, and Muslim Brotherhood had collaborated with the Free Officers and played significant ...
openaire +1 more source