Sign in

Modeling and Analysis of Leaky Deception Using Signaling Games With Evidence.

Jeffrey PawlickEdward ColbertQuanyan Zhu
Published in: IEEE Trans. Inf. Forensics Secur. (2019)
Keyphrases
  • image analysis
  • genetic algorithm
  • game theory
  • data sets
  • neural network
  • computer vision
  • information systems
  • website
  • data analysis
  • computer games
  • empirical evidence