Analysis and Modelling of the Working Principle of the Deceptive Infrared Jammer [PDF]
Kai Zhang+3 more
openalex +1 more source
Deception Analysis with Artificial Intelligence: An Interdisciplinary Perspective [PDF]
Humans and machines interact more frequently than ever and our societies are becoming increasingly hybrid. A consequence of this hybridisation is the degradation of societal trust due to the prevalence of AI-enabled deception. Yet, despite our understanding of the role of trust in AI in the recent years, we still do not have a computational theory to ...
arxiv
Susceptibility of LoRa Communications to Intentional Electromagnetic Interference with Different Sweep Periods. [PDF]
De São José AN+5 more
europepmc +1 more source
The challenge of policing minorities in a liberal society
Journal of Political Philosophy, EarlyView.
Joseph Heath
wiley +1 more source
Banal Deception Human-AI Ecosystems: A Study of People's Perceptions of LLM-generated Deceptive Behaviour [PDF]
Large language models (LLMs) can provide users with false, inaccurate, or misleading information, and we consider the output of this type of information as what Natale (2021) calls `banal' deceptive behaviour. Here, we investigate peoples' perceptions of ChatGPT-generated deceptive behaviour and how this affects peoples' own behaviour and trust.
arxiv
Satellite Navigation Spoofing Interference Detection and Direction Finding Based on Array Antenna. [PDF]
Yang H, Jin R, Xu W, Che L, Zhen W.
europepmc +1 more source
Evaluating International Agreements: The Voluntarist Reply and Its Limits
Journal of Political Philosophy, EarlyView.
Oisin Suttle
wiley +1 more source
Angle inversion based on anti‐jamming against deceptive multiple false targets [PDF]
Kaiqiang Liu+4 more
openalex +1 more source
WiP: Deception-in-Depth Using Multiple Layers of Deception [PDF]
Deception is being increasingly explored as a cyberdefense strategy to protect operational systems. We are studying implementation of deception-in-depth strategies with initially three logical layers: network, host, and data. We draw ideas from military deception, network orchestration, software deception, file deception, fake honeypots, and moving ...
arxiv
D-CEWS: DEVS-Based Cyber-Electronic Warfare M&S Framework for Enhanced Communication Effectiveness Analysis in Battlefield. [PDF]
Seo S, Han S, Kim D.
europepmc +1 more source