AIMC Topic: Deception

Clear Filters Showing 11 to 20 of 42 articles

Detecting deception with artificial intelligence: promises and perils.

Trends in cognitive sciences
Rapid advancements in artificial intelligence (AI) have driven interest in its potential application for lie detection. Unfortunately, the current approaches have primarily focused on technical aspects at the expense of a solid methodological and the...

Role play with large language models.

Nature
As dialogue agents become increasingly human-like in their performance, we must develop effective ways to describe their behaviour in high-level terms without falling into the trap of anthropomorphism. Here we foreground the concept of role play. Cas...

Deception detection with machine learning: A systematic review and statistical analysis.

PloS one
Several studies applying Machine Learning to deception detection have been published in the last decade. A rich and complex set of settings, approaches, theories, and results is now available. Therefore, one may find it difficult to identify trends, ...

Protecting world leaders against deep fakes using facial, gestural, and vocal mannerisms.

Proceedings of the National Academy of Sciences of the United States of America
Since their emergence a few years ago, artificial intelligence (AI)-synthesized media-so-called deep fakes-have dramatically increased in quality, sophistication, and ease of generation. Deep fakes have been weaponized for use in nonconsensual pornog...

Recursive Minimum-Variance Filter Design for State-Saturated Complex Networks With Uncertain Coupling Strengths Subject to Deception Attacks.

IEEE transactions on cybernetics
In this article, the recursive filtering problem is investigated for state-saturated complex networks (CNs) subject to uncertain coupling strengths (UCSs) and deception attacks. The measurement signals transmitted via the communication network may su...

IAT faking indices revisited: Aspects of replicability and differential validity.

Behavior research methods
Research demonstrates that IATs are fakeable. Several indices [either slowing down or speeding up, and increasing errors or reducing errors in congruent and incongruent blocks; Combined Task Slowing (CTS); Ratio 150-10000] have been developed to dete...

Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions.

Sensors (Basel, Switzerland)
With information systems worldwide being attacked daily, analogies from traditional warfare are apt, and deception tactics have historically proven effective as both a strategy and a technique for Defense. Defensive Deception includes thinking like a...

Event-Triggered Output Feedback Synchronization of Master-Slave Neural Networks Under Deception Attacks.

IEEE transactions on neural networks and learning systems
The problem of event-triggered synchronization of master-slave neural networks is investigated in this article. It is assumed that both communication channels from the sensor to controller and from controller to actuator are subject to stochastic dec...

Event-triggered H/passive synchronization for Markov jumping reaction-diffusion neural networks under deception attacks.

ISA transactions
The issue of H/passive master-slave synchronization for Markov jumping neural networks with reaction-diffusion terms is investigated in this paper via an event-triggered control scheme under deception attacks. To lighten the burden of limited communi...

Deepfake Detection Using the Rate of Change between Frames Based on Computer Vision.

Sensors (Basel, Switzerland)
Recently, artificial intelligence has been successfully used in fields, such as computer vision, voice, and big data analysis. However, various problems, such as security, privacy, and ethics, also occur owing to the development of artificial intelli...