Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 3 |
Descriptor
Accuracy | 3 |
Computer Security | 3 |
Information Security | 3 |
Artificial Intelligence | 2 |
Deception | 2 |
Identification | 2 |
Social Media | 2 |
Active Learning | 1 |
Audiences | 1 |
Computational Linguistics | 1 |
Computer Software | 1 |
More ▼ |
Author
Bryson R. Payne | 1 |
Cathryn Allen | 1 |
Chuck Robertson | 1 |
Kishor Datta Gupta | 1 |
Mbaziira, Alex Vincent | 1 |
Tamirat Abegaz | 1 |
Publication Type
Dissertations/Theses -… | 2 |
Journal Articles | 1 |
Reports - Research | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Cathryn Allen; Bryson R. Payne; Tamirat Abegaz; Chuck Robertson – Journal of Cybersecurity Education, Research and Practice, 2024
Research indicates that deceitful videos tend to spread rapidly online and influence people's opinions and ideas. Because of this, video misinformation via deepfake video manipulation poses a significant online threat. This study aims to discover what factors can influence viewers' capability to distinguish deepfake videos from genuine video…
Descriptors: Deception, Information Security, Video Technology, Computer Security
Kishor Datta Gupta – ProQuest LLC, 2021
Defenses against adversarial attacks are essential to ensure the reliability of machine learning models as their applications are expanding in different domains. Existing ML defense techniques have several limitations in practical use. I proposed a trustworthy framework that employs an adaptive strategy to inspect both inputs and decisions. In…
Descriptors: Artificial Intelligence, Cybernetics, Information Processing, Information Security
Mbaziira, Alex Vincent – ProQuest LLC, 2017
Cybercriminals are increasingly using Internet-based text messaging applications to exploit their victims. Incidents of deceptive cybercrime in text-based communication are increasing and include fraud, scams, as well as favorable and unfavorable fake reviews. In this work, we use a text-based deception detection approach to train models for…
Descriptors: Crime, Information Security, Models, Networks