×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Arts ... [5]
Faculty of Busin... [4]
Faculty of Healt... [3]
ASIA-PACIFIC ACA... [2]
INSTITUTE OF COL... [2]
Faculty of Scien... [2]
More...
Authors
BENJAMIN IAN WIN... [4]
YUAN ZHEN [3]
FONG HOC NANG [2]
LAW CHUN HUNG RO... [2]
CARLOS JORGE FER... [1]
NEVIA DOLCINI [1]
More...
Document Type
Journal article [9]
Presentation [4]
Book chapter [1]
Conference paper [1]
Date Issued
2024 [5]
2023 [1]
2022 [4]
2021 [1]
2019 [1]
2018 [1]
More...
Language
英語English [12]
Source Publication
International Jo... [2]
Annals of Touris... [1]
Frontiers in Hum... [1]
IEEE Transaction... [1]
IEEE Transaction... [1]
International Jo... [1]
More...
Indexed By
SSCI [5]
SCIE [4]
CPCI-S [1]
ESCI [1]
Funding Organization
Funding Project
Knowing and Expr... [3]
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-10 of 15
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submit date Ascending
Submit date Descending
Issue Date Ascending
Issue Date Descending
Author Ascending
Author Descending
Title Ascending
Title Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Secure Distributed Control for Demand Response in Power Systems Against Deception Cyber-Attacks With Arbitrary Patterns
Journal article
Yang, Shaohua, Lao, Keng Weng, Hui, Hongxun, Chen, Yulin. Secure Distributed Control for Demand Response in Power Systems Against Deception Cyber-Attacks With Arbitrary Patterns[J]. IEEE Transactions on Power Systems, 2024, 39(6), 7277-7290.
Authors:
Yang, Shaohua
;
Lao, Keng Weng
;
Hui, Hongxun
;
Chen, Yulin
Favorite
|
TC[WOS]:
8
TC[Scopus]:
18
IF:
6.5
/
7.4
|
Submit date:2024/05/16
Demand Response
Deception Cyber-attack
Arbitrary Attack Pattern
Secure Distributed Control
Lyapunov Theorem
The Overriding Threat of Self-Deception
Presentation
会议地点: La Sapienza University, 会议日期: August 6th, 2024, 报告日期: 2024-08-01
Authors:
BENJAMIN IAN WINOKUR
Favorite
|
|
Submit date:2024/08/29
Self-knowledge
Self-belief
Self-deception
Privileged Access
Epistemic Defeaters
Defeaters for Privileged Access?
Presentation
会议地点: Huaqiao University, 会议日期: 05/04/2024, 报告日期: 2024-05-01
Authors:
BENJAMIN IAN WINOKUR
Favorite
|
|
Submit date:2024/08/29
Self-knowledge
Privileged Access
Self-deception
Epistemic Defeat
Defeaters for Privileged Access?
Presentation
会议地点: Tokyo University, 会议日期: February 5th, 2024, 报告日期: 2024-02-01
Authors:
BENJAMIN IAN WINOKUR
Favorite
|
|
Submit date:2024/08/29
Self-knowledge
Privileged Access
Self-deception
Epistemic Defeat
Defeaters for Privileged Access?
Presentation
会议地点: University of Connecticut (Online), 会议日期: February 29th, 2024, 报告日期: 2024-02-01
Authors:
BENJAMIN IAN WINOKUR
Favorite
|
|
Submit date:2024/08/29
Self-knowledge
Privileged Access
Self-deception
Epistemic Defeat
Assessing Credibility in Online Arbitration Hearings: Determining Facts and Justice by Zoom
Journal article
Moreira, João Ilhão, Zhang, Liwen. Assessing Credibility in Online Arbitration Hearings: Determining Facts and Justice by Zoom[J]. International Journal for the Semiotics of Law, 2023, 37(3), 887–901.
Authors:
Moreira, João Ilhão
;
Zhang, Liwen
Favorite
|
TC[WOS]:
3
TC[Scopus]:
2
IF:
0.9
/
0.7
|
Submit date:2024/02/22
Arbitration
Online Hearings
Deception Detection
Nonverbal Cues
Credibility Assessment
A Recursive Algorithm for Secure Filtering for Two-Dimensional State-Saturated Systems Under Network-Based Deception Attacks
Journal article
Wang, Fan, Wang, Zidong, Liang, Jinling, Silvestre, Carlos. A Recursive Algorithm for Secure Filtering for Two-Dimensional State-Saturated Systems Under Network-Based Deception Attacks[J]. IEEE Transactions on Network Science and Engineering, 2022, 9(2), 678-688.
Authors:
Wang, Fan
;
Wang, Zidong
;
Liang, Jinling
;
Silvestre, Carlos
Favorite
|
TC[WOS]:
15
TC[Scopus]:
16
IF:
6.7
/
6.0
|
Submit date:2022/05/17
Deception Attacks
Performance Analysis
Recursive Filtering
State Saturation
Two-dimensional Systems
Unmasking the imposter: Do fake hotel reviewers show their faces in profile pictures?
Journal article
Fong, Lawrence Hoc Nang, Ye, Ben Haobin, Leung, Daniel, Leung, Xi Yu. Unmasking the imposter: Do fake hotel reviewers show their faces in profile pictures?[J]. Annals of Tourism Research, 2022, 93, 103321.
Authors:
Fong, Lawrence Hoc Nang
;
Ye, Ben Haobin
;
Leung, Daniel
;
Leung, Xi Yu
Favorite
|
TC[WOS]:
7
TC[Scopus]:
7
IF:
10.4
/
11.2
|
Submit date:2022/03/28
Deception
Fake Reviews
Online Reviews
Profile Picture
Yelp
Detecting fake hospitality reviews through the interplay of emotional cues, cognitive cues and review valence
Journal article
Wang, Erin Yirun, Fong, Lawrence Hoc Nang, Law, Rob. Detecting fake hospitality reviews through the interplay of emotional cues, cognitive cues and review valence[J]. International Journal of Contemporary Hospitality Management, 2022, 34(1), 184-200.
Authors:
Wang, Erin Yirun
;
Fong, Lawrence Hoc Nang
;
Law, Rob
Favorite
|
TC[WOS]:
25
TC[Scopus]:
27
IF:
9.1
/
8.9
|
Submit date:2021/11/17
Deception
Fake Online Review
Interactive Effect
Linguistic Cue
Detecting fake hospitality reviews through the interplay of emotional cues, cognitive cues, and review valence.
Journal article
Wang, Erin Yirun, Fong, Lawrence Hoc Nang, Law, Rob. Detecting fake hospitality reviews through the interplay of emotional cues, cognitive cues, and review valence.[J]. International Journal of Contemporary Hospitality Management, 2022, 34(1), 184-200.
Authors:
Wang, Erin Yirun
;
Fong, Lawrence Hoc Nang
;
Law, Rob
Favorite
|
TC[WOS]:
25
TC[Scopus]:
27
IF:
9.1
/
8.9
|
Submit date:2022/08/24
Fake Online Review
Interactive Effect
Linguistic Cue
Deception