Results 111 to 120 of about 5,088 (260)

Deception Analysis with Artificial Intelligence: An Interdisciplinary Perspective [PDF]

open access: yesarXiv
Humans and machines interact more frequently than ever and our societies are becoming increasingly hybrid. A consequence of this hybridisation is the degradation of societal trust due to the prevalence of AI-enabled deception. Yet, despite our understanding of the role of trust in AI in the recent years, we still do not have a computational theory to ...
arxiv  

Susceptibility of LoRa Communications to Intentional Electromagnetic Interference with Different Sweep Periods. [PDF]

open access: yesSensors (Basel), 2022
De São José AN   +5 more
europepmc   +1 more source

The challenge of policing minorities in a liberal society

open access: yes, 2023
Journal of Political Philosophy, EarlyView.
Joseph Heath
wiley   +1 more source

Banal Deception Human-AI Ecosystems: A Study of People's Perceptions of LLM-generated Deceptive Behaviour [PDF]

open access: yesarXiv
Large language models (LLMs) can provide users with false, inaccurate, or misleading information, and we consider the output of this type of information as what Natale (2021) calls `banal' deceptive behaviour. Here, we investigate peoples' perceptions of ChatGPT-generated deceptive behaviour and how this affects peoples' own behaviour and trust.
arxiv  

Evaluating International Agreements: The Voluntarist Reply and Its Limits

open access: yes, 2023
Journal of Political Philosophy, EarlyView.
Oisin Suttle
wiley   +1 more source

Angle inversion based on anti‐jamming against deceptive multiple false targets [PDF]

open access: gold, 2019
Kaiqiang Liu   +4 more
openalex   +1 more source

WiP: Deception-in-Depth Using Multiple Layers of Deception [PDF]

open access: yesarXiv
Deception is being increasingly explored as a cyberdefense strategy to protect operational systems. We are studying implementation of deception-in-depth strategies with initially three logical layers: network, host, and data. We draw ideas from military deception, network orchestration, software deception, file deception, fake honeypots, and moving ...
arxiv  

Home - About - Disclaimer - Privacy