Results 131 to 140 of about 4,207,378 (350)

Target Prediction Under Deceptive Switching Strategies via Outlier-Robust Filtering of Partially Observed Incomplete Trajectories [PDF]

open access: yesarXiv
Motivated by a study on deception and counter-deception, this paper addresses the problem of identifying an agent's target as it seeks to reach one of two targets in a given environment. In practice, an agent may initially follow a strategy to aim at one target but decide to switch to another midway.
arxiv  

Features of Separator Configuration in Determining the Cycle Life of Zn Metal Anode

open access: yesBattery Energy, EarlyView.
The separator configuration in zinc‐metal batteries significantly impacts cycle life by influencing internal short circuits from Zn dendrite growth and charge transfer deterioration. This study reveals that the failure mechanism varies with cycling current density and capacity.
Jiangpeng Wang   +3 more
wiley   +1 more source

Among Us: A Sandbox for Agentic Deception [PDF]

open access: yesarXiv
Studying deception in AI agents is important and difficult due to the lack of model organisms and sandboxes that elicit the behavior without asking the model to act under specific conditions or inserting intentional backdoors. Extending upon $\textit{AmongAgents}$, a text-based social-deduction game environment, we aim to fix this by introducing Among ...
arxiv  

Factor analysis of risk perceptions of using digital and social media in dental education and profession

open access: yesJournal of Dental Education, Volume 87, Issue 1, Page 118-129, January 2023., 2023
Abstract Purpose This study explored how dental students and dental professionals perceive risks of using digital and social media (DSM) in a dental professional context and validated a questionnaire to measure DSM perceived risks specifically among dental students and dental professionals. Methods A cross‐sectional survey study was carried out amongst
Rayan Sharka   +3 more
wiley   +1 more source

Lie prevalence, lie characteristics and strategies of self-reported good liars.

open access: yesPLoS ONE, 2019
Meta-analytic findings indicate that the success of unmasking a deceptive interaction relies more on the performance of the liar than on that of the lie detector.
Brianna L Verigin   +3 more
doaj   +1 more source

Quickest detection of deception attacks on cyber-physical systems with a parsimonious watermarking policy [PDF]

open access: yesat - Automatisierungstechnik, 2022
Arunava Naha   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy