Academic literature on the topic 'Disguise techniques'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Disguise techniques.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Disguise techniques"

1

McLuhan, Arthur. "Adopting a Cloak of Incompetence: Impression Management Techniques for Feigning Lesser Selves." Sociological Theory 38, no. 2 (2020): 122–41. http://dx.doi.org/10.1177/0735275120926222.

Full text
Abstract:
The “cloak of competence” concept captures attempts to disguise limitations and exaggerate abilities. The author examines the conceptual converse: the “cloak of incompetence,” or the various ways people deliberately disregard, disguise, downplay, or diminish their personal abilities. Drawing on a comparative analysis of manifold empirical cases, the author identifies three generic competence-concealing techniques—avoidance, performance, and neutralization—and considers some of the interactional contingencies that can enhance or reduce their effectiveness. Avoidance and performance techniques a
APA, Harvard, Vancouver, ISO, and other styles
2

Basuki, Sucipto, and Reksa Anugrah. "Transaction Document Security Protection In The Form Of Image File, Jpg or Tif Interbank Transfer Using Steganography And Cryptography." IAIC Transactions on Sustainable Digital Innovation (ITSDI) 1, no. 1 (2019): 42–48. http://dx.doi.org/10.34306/itsdi.v1i1.12.

Full text
Abstract:
Information security process can be done by hiding the information on other media or by certain methods, so that other people do not realize there is some information in the media. Technique known as Steganography and Cryptography. Steganography is a technique to hide or disguise the existence of secret messages in the media reservoirs. While Cryptography disguise the meaning of a message, but do not hide that there is a message. In a bank cannot be separated in the presence of inter-bank transactions which transfer if the transfer interbank transactions done in branch offices and nominal tran
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Gang, Jun Yang, and Jun Ping Cai. "Research on Social Engineering in Network Security." Advanced Materials Research 989-994 (July 2014): 4881–84. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4881.

Full text
Abstract:
The social engineering techniques such as flattery, persuade, induce, disguise, threat, obedience and infiltration was summarized. The main methods and steps of social engineering research and the main six aspects contents such as social engineering technology analysis, social engineering case survey were also put forward. Finally, a model of social engineering attack based on complex network is built and some prevention methods aiming to social engineering attack were presented.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhou, Yang, Wei Ni, Kangfeng Zheng, Ren Ping Liu, and Yixian Yang. "Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/4651395.

Full text
Abstract:
Exploiting software-defined networking techniques, randomly and instantly mutating routes can disguise strategically important infrastructure and protect the integrity of data networks. Route mutation has been to date formulated as NP-complete constraint satisfaction problem where feasible sets of routes need to be generated with exponential computational complexities, limiting algorithmic scalability to large-scale networks. In this paper, we propose a novel node-centric route mutation method which interprets route mutation as a signature matching problem. We formulate the route mutation prob
APA, Harvard, Vancouver, ISO, and other styles
5

Karla, Grammatiki A. "Folk Narrative Techniques in the Alexander Romance." Mnemosyne 65, no. 4-5 (2012): 636–55. http://dx.doi.org/10.1163/156852512x585179.

Full text
Abstract:
Abstract A structurally-oriented analysis of the Alexander Romance demonstrates that the work is not a mere random conglomeration drawn from various sources. The author is attempting to create a work possessing unity and cohesion and to this end he employs basic motifs associated with the hero, such as the motif of world-conqueror, of the φρενήρης (‘intelligent’) and the link with Heracles and Dionysus, which run through the totality of the work and ensure its cohesion. An additional interesting technique employed by the author is that of the redeployment of a motif. For example, the archetypa
APA, Harvard, Vancouver, ISO, and other styles
6

Relf, Ian, Roberta Chow, and Marie Pirotta. "Blinding Techniques in Randomized Controlled Trials of Laser Therapy: An Overview and Possible Solution." Evidence-Based Complementary and Alternative Medicine 5, no. 4 (2008): 383–89. http://dx.doi.org/10.1093/ecam/nem085.

Full text
Abstract:
Low-level laser therapy has evidence accumulating about its effectiveness in a variety of medical conditions. We reviewed 51 double blind randomized controlled trials (RCTs) of laser treatment. Analysis revealed 58% of trials showed benefit of laser over placebo. However, less than 5% of the trials had addressed beam disguise or allocation concealment in the laser machines used. Many of the trials used blinding methods that rely on staff cooperation and are therefore open to interference or bias. This indicates significant deficiencies in laser trial methodology. We report the development and
APA, Harvard, Vancouver, ISO, and other styles
7

khan, Amara. "Indian Woman and her Sexuality: An Investigation Through Heterogeneous Application of Symbolic Masks in Girish Karnad’s Hayavadana." Global Regional Review V, no. I (2020): 279–89. http://dx.doi.org/10.31703/.2020(v-i).31.

Full text
Abstract:
A critical look at the masks of different characters of Girish Karnad’s play Hayavadana (1971) shows that they serve two significant purposes; of both hiding and supporting the truth, which in itself is a relative phenomenon. I, here, focus on the objectives, techniques and types of mask usage in terms of disguise and revelation at the physical, emotional and psychological levels. The paper further highlights the power that the characters enjoy over other characters by using specific masks. By highlighting the theme of incompleteness in the play, the playwright seems to question Hindu religiou
APA, Harvard, Vancouver, ISO, and other styles
8

Khan, Amara. "Indian Woman and her Sexuality: An Investigation Through Heterogeneous Application of Symbolic Masks in Girish Karnad’s Hayavadana." Global Regional Review V, no. I (2020): 279–89. http://dx.doi.org/10.31703/grr.2020(v-i).31.

Full text
Abstract:
A critical look at the masks of different characters of Girish Karnad’s play Hayavadana (1971) shows that they serve two significant purposes; of both hiding and supporting the truth, which in itself is a relative phenomenon. I, here, focus on the objectives, techniques and types of mask usage in terms of disguise and revelation at the physical, emotional and psychological levels. The paper further highlights the power that the characters enjoy over other characters by using specific masks. By highlighting the theme of incompleteness in the play, the playwright seems to question Hindu religiou
APA, Harvard, Vancouver, ISO, and other styles
9

Bailey, Roderick. "Special operations: a hidden chapter in the histories of facial surgery and human enhancement." Medical Humanities 46, no. 2 (2020): 115–23. http://dx.doi.org/10.1136/medhum-2019-011792.

Full text
Abstract:
During the Second World War, Britain’s Special Operations Executive (SOE), a secret service established to encourage resistance and carry out sabotage, employed various techniques of enhancing the ability of its personnel to operate undetected in enemy territory. One of these methods was surgery. Drawing on recently declassified records, this article illuminates SOE’s reasons for commissioning this procedure, the needs and wants of those who received it, and the surgeons employed to carry it out. It also aims to underline the role of context in shaping perceptions of facial surgery, and the po
APA, Harvard, Vancouver, ISO, and other styles
10

Khan, Amara. "Vision of Gender in Girish Karnad's Hayavadana: Functions of Multiplexed Corporal Masks." Global Social Sciences Review VI, no. I (2021): 148–57. http://dx.doi.org/10.31703/gssr.2021(vi-i).15.

Full text
Abstract:
Through the integration of the local Yakshagana and the western Brechtian Epic theatre practices, Girish Karnad through Hayavadana (1971) has formed a brilliant theatre show. One theatrical device, apart from the folk-theatre motifs, is the utilization of physical masks on stage. The reading examines different techniques used by Karnad, which provide the staging of masks successful in theatre. It furthermore focuses on the objectives, techniques, and types of mask treatment in expressions of disguise and revelation at the physical level. The purpose of this exploration is to make a complete st
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Disguise techniques"

1

Mahmoud, Maher Taha Hosnah. "Masque et pouvoir : les techniques du camouflage dans le théâtre comique." Thesis, Lyon 2, 2012. http://www.theses.fr/2012LYO20023.

Full text
Abstract:
Il y aurait interaction constante entre théâtre comique, masque et pouvoir que nous examinons à travers une lecture intertextuelle et comparative des pièces françaises, francophones et égyptiennes des XIXe et XXe siècles, en mettant l’accent sur les techniques de camouflage et leurs objectifs, témoins d’une continuité entre les cultures. Nous démontrons que la distanciation, bien que rattachée au monde sérieux de la dramaturgie brechtienne, excelle surtout dans le théâtre comique du masque. Ce projet comporte en fait trois parties. Dans une première partie, nous passons en revue dans le premie
APA, Harvard, Vancouver, ISO, and other styles
2

Caputo, Livio. "Perspectives autour de l'exercice d'un corps au cinéma." Thesis, Sorbonne Paris Cité, 2016. http://www.theses.fr/2016USPCA009.

Full text
Abstract:
Le corps du spectateur est au centre d’une antinomie récurrente dans les théories de l’art, l’œuvre doit d’abord émouvoir l’esprit et, dans la relation qu’elle établit avec son observateur, le corps n’est qu’un intermédiaire qui ne doit pas être trop sollicité. Cependant, certaines œuvres semblent remettre en cause cette relation et altérer le statut du spectateur en cherchant à surprendre l’esprit pour émouvoir le corps. Définir le cinéma comme paradigme d’un dispositif d’immersion fictionnel s’inscrivant dans une chronologie en dehors de toute spécificité historique, permet alors de considér
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Disguise techniques"

1

Mazzuki, Arabella. Undercover disguise methods for investigators: Quick-change techniques for both men and women. Charles C Thomas, Publisher, Ltd., 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

López, Rosa Ana Escalonilla. La dramaturgia del disfraz en Calderón. Ediciones Universidad de Navarra, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Disguise Techniques. Citadel Press, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ganeri, Jonardon. Self and Subjectivity. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198702603.003.0034.

Full text
Abstract:
This chapter investigates the concept of yati, the wandering ascetic of the Mānavadharmaśāstra. It highlights the phenomenology of the yati’s experience in relation to the overall architecture of the Manu cosmology. The wandering ascetic, having paid three debts, has his mind set on renunciation. The yati’s aim is to avoid being brought down by the collapse of the body as one nears death, but not to avoid death. Manu notes two spiritual exercises. One of imagined disembodiment: that is, one imagines the collapse and the fall into the alligator’s jaws, being brought down by old age and disease,
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Disguise techniques"

1

Beta, Simone. "The Riddles of the Fourteenth Book of the Palatine Anthology." In Greek Epigram from the Hellenistic to the Early Byzantine Era. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198836827.003.0008.

Full text
Abstract:
Chapter 8 deals with the riddling epigrams of Book 14 of the Greek Anthology and discusses the common methods employed by the poets to disguise the solution of the aenigmata. It traces the origins of some riddles, together with their specific techniques, back to comedy and contextualizes the epigrams within the Greek and Latin ‘riddling tradition’. The comparative study of the most relevant sources (the Greek Anthology, Athenaeus’ Deipnosophists, and some manuscripts whose content still needs to be explored) leads to the conclusion that the Byzantine poets who composed riddling epigrams (Cristopher of Mytilene, John Mauropous, John Geometres, Michael Psellus, Basil Megalomytes, and Eustathius Macrembolites) could have been inspired by lost anthologies of riddles composed at different periods.
APA, Harvard, Vancouver, ISO, and other styles
2

Adams, Jade Broughton. "‘The One about Sitting on His Top Hat and Climbing up His Shirt Front’: Fitzgerald and Musical Theatre." In F. Scott Fitzgerald's Short Fiction. Edinburgh University Press, 2019. http://dx.doi.org/10.3366/edinburgh/9781474424684.003.0005.

Full text
Abstract:
This chapter shows how Fitzgerald drew upon musical comedies of the stage and screen to inform his characterisation, plotting, and integration of song with dramatic action. Using his ‘playlet’, ‘Porcelain and Pink’, as a case study, this chapter shows how Fitzgerald’s use of song underscores themes of concealed identity and satirises the consumption and advertising practices of his era. This chapter argues that the intersection of morality and entertainment, depicted in the iconic flapper figure, characterises much of Fitzgerald’s presentation of popular culture. Though he did not continue his undergraduate occupation of writing libretti for Princeton’s Triangle Club, Fitzgerald continued to allude to songs from musicals throughout his career. This chapter explores how Fitzgerald’s use of the disguise motif, amongst other literary techniques, has analogues in musical comedies, and argues for certain of his stories, like ‘The Captured Shadow’, to be read in the context of the stage and film musicals Fitzgerald enjoyed, such as those featuring Irving Berlin’s work. It is argued that it is Fitzgerald’s fascination with the theatre that fuels his lifelong interest in participative, even immersive, media. This chapter analyses the influence of film musicals on Fitzgerald’s aesthetics, particularly in terms of their lavish visual spectacle.
APA, Harvard, Vancouver, ISO, and other styles
3

Taylor, Peter. "Catastrophes and insurance." In Global Catastrophic Risks. Oxford University Press, 2008. http://dx.doi.org/10.1093/oso/9780198570509.003.0012.

Full text
Abstract:
This chapter explores the way financial losses associated with catastrophes can be mitigated by insurance. It covers what insurers mean by catastrophe and risk, and how computer modelling techniques have tamed the problem of quantitative estimation of many hitherto intractable extreme risks. Having assessed where these techniques work well, it explains why they can be expected to fall short in describing emerging global catastrophic risks such as threats from biotechnology. The chapter ends with some pointers to new techniques, which offer some promise in assessing such emerging risks. Catastrophic risks annually cause tens of thousands of deaths and tens of billions of dollars worth of losses. The figures available from the insurance industry (see, for instance, the Swiss Re [2007] Sigma report) show that mortality has been fairly consistent, whilst the number of recognized catastrophic events, and even more, the size of financial losses, has increased. The excessive rise in financial losses, and with this the number of recognized ‘catastrophes’, primarily comes from the increase in asset values in areas exposed to natural catastrophe. However, the figures disguise the size of losses affecting those unable to buy insurance and the relative size of losses in developing countries. For instance, Swiss Re estimated that of the estimated $46 billion losses due to catastrophe in 2006, which was a very mild year for catastrophe losses, only some $16 billion was covered by insurance. In 2005, a much heavier year for losses, Swiss Re estimated catastrophe losses at $230 billion, of which $83 billion was insured. Of the $230 billion, Swiss Re estimated that $210 billion was due to natural catastrophes and, of this, some $173 billion was due to the US hurricanes, notably Katrina ($135 billion). The huge damage from the Pakistan earthquake, though, caused relatively low losses in monetary terms (around $5 billion mostly uninsured), reflecting the low asset values in less-developed countries. In capitalist economies, insurance is the principal method of mitigating potential financial loss from external events in capitalist economies. However, in most cases, insurance does not directly mitigate the underlying causes and risks themselves, unlike, say, a flood prevention scheme.
APA, Harvard, Vancouver, ISO, and other styles
4

Ferenczi, Sándor, John Rickman, and Jane Isabel Suttie. "Disgust for Breakfast 1." In Further Contributions to the Theory and Technique of Psycho-Analysis. Routledge, 2018. http://dx.doi.org/10.4324/9780429475245-50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Belen, Rahime, and Tugba Taskaya Temizel. "A Framework to Detect Disguised Missing Data." In Data Mining. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2455-9.ch030.

Full text
Abstract:
Many manually populated very large databases suffer from data quality problems such as missing, inaccurate data and duplicate entries. A recently recognized data quality problem is that of disguised missing data which arises when an explicit code for missing data such as NA (Not Available) is not provided and a legitimate data value is used instead. Presence of these values may affect the outcome of data mining tasks severely such that association mining algorithms or clustering techniques may result in biased inaccurate association rules and invalid clusters respectively. Detection and elimination of these values are necessary but burdensome to be carried out manually. In this chapter, the methods to detect disguised missing values by visual inspection are explained first. Then, the authors describe the methods used to detect these values automatically. Finally, the framework to detect disguised missing data is proposed and a demonstration of the framework on spatial and categorical data sets is provided.
APA, Harvard, Vancouver, ISO, and other styles
6

Jenkins, Roy. "Setter and Breaker." In Colossus. Oxford University Press, 2006. http://dx.doi.org/10.1093/oso/9780192840554.003.0029.

Full text
Abstract:
There were two sections which worked on the German military cipher known as ‘Fish’. One was called Mr Newman’s section and consisted mainly of civilian mathematicians assisted by Wrens and by the embryonic computers. Their task was to strip the first layer of disguise off the intercepted messages. This they did purely by the techniques of probability mathematics, for their product had no more obvious meaning than their raw material. Having got this far they sent the half-deciphered messages over to us in Major Tester’s section. (The Major existed, but was always a shadowy figure, neither much encouraging nor admonishing, nor indeed performing great feats of cryptography himself.) We were a more mixed bag, army officers if we were already so, RSMs (Warrant Officer Class I) if not (this saved time; the rank, at least equally well paid, could be conferred without officer training), one American lieutenant, and a few civilians who were nominally on the strength of some section of the Foreign Office. We were assisted by ATS girls, but by no analytical machines, for our task was the more intuitive one of seeing the clear German (or at least German obscured only by Wehrmacht jargon) under the second layer of cipher, and this was thought to be beyond the help of machines. I would guess, however, that what we did could now be easily computerised. Another retrospective reflection from the perspective of half a century on is that it was very odd that in both sections, despite the fact that the processes called for no strength of physique or even exercise of authority, the question of giving women other than subordinate jobs simply never arose. Tester’s section was divided into two parts. There were the ‘breakers’ and the ‘setters’. The breakers were obviously the elite. They were like matadors compared with picadors, except that they did their work first. Setting was relatively routine. You had to know all the properties of the cipher which had been discovered during the past three years or so, and work with logic and precision. But, if you did this, output for any individual was more or less predictable.
APA, Harvard, Vancouver, ISO, and other styles
7

White, Robert E. "Soil and the Environment." In Soils for Fine Wines. Oxford University Press, 2003. http://dx.doi.org/10.1093/oso/9780195141023.003.0003.

Full text
Abstract:
English has no exact translation for the French word terroir. But terroir is one of the few words to evoke passion in any discussion about soils. One reason may be that wine is one product of the land where the consumer can ascribe a direct link between subtle variations in the character of the product and the soil on which it was grown. Wine writers and commentators now use the term terroir routinely, as they might such words as rendezvous, liaison, and café, which are completely at home in the English language. French vignerons and scientists have been more passionate than most in pro­moting the concept of terroir (although some such as Pinchon (1996) believe that the word terroir has been abused for marketing, sentimental, and political pur­poses). Their views range from the metaphysical—that “alone, in the plant king­dom, does the vine make known to us the true taste of the earth” (quoted by Han­cock 1999, p. 43)—to the factual: “terroir viticole is a complex notion which integrates several factors . . . of the natural environment (soil, climate, topogra­phy), biological (variety, rootstock), and human (of wine, wine-making, and his­tory)” (translated from van Leeuwen 1996, p. 1). Others recognize terroir as a dy­namic concept of site characterization that comprises permanent factors (e.g., geology, soil, environment) and temporary factors (variety, cultural methods, wine­making techniques). Iacano et al. (2000) point out that if the temporary factors vary too much, the expression of the permanent factors in the wine (the essence of terroir) can be masked. The difference between wines from particular vineyards cannot be detected above the “background noise” (Martin 2000). A basic aim of good vineyard management is not to disguise, but to amplify, the natural terroir of a site. Terroir therefore denotes more than simply the relationship between soil and wine. Most scientists admit they cannot express quantitatively the relationship be­tween a particular terroir and the characteristics of wine produced from that ter­roir. Nevertheless, the concept of terroir underpins the geographical demarcation of French viticultural areas: the Appellation d’Origine Contrôllée (AOC) system, which is based on many years’ experience of the character and quality of individ­ual wines from specific areas.
APA, Harvard, Vancouver, ISO, and other styles
8

Rajendiran, Kishore, Kumar Kannan, and Yongbin Yu. "Applications of Machine Learning in Cyber Forensics." In Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-4900-1.ch002.

Full text
Abstract:
Nowadays, individuals and organizations experience an increase in cyber-attacks. Combating such cybercrimes has become the greatest struggle for individual persons and organizations. Furthermore, the battle has heightened as cybercriminals have gone a step ahead, employing the complicated cyber-attack technique. These techniques are minute and unobtrusive in nature and habitually disguised as authentic requests and commands. The cyber-secure professionals and digital forensic investigators enforce by collecting large and complex pools of data to reveal the potential digital evidence (PDE) to combat these attacks and helps investigators to arrive at particular conclusions and/or decisions. In cyber forensics, the challenging issue is hard for the investigators to make conclusions as the big data often comes from multiple sources and in different file formats. The objective is to explore the possible applications of machine learning (ML) in cyber forensics and to discuss the various research issues, the solutions of which will serve out to provide better predictions for cyber forensics.
APA, Harvard, Vancouver, ISO, and other styles
9

"Introduction." In Casebook of Interpersonal Psychotherapy, edited by John C. Markowitz and Myrna M. Weissman. Oxford University Press, 2012. http://dx.doi.org/10.1093/med:psych/9780199746903.003.0001.

Full text
Abstract:
Chapter 1 introduces the goal of this resource, and supplements available clinical illustrations of treatment techniques, providing a wealth of additional clinical material. It provides detailed narratives from master clinicians, specialists in particular areas and adaptations of IPT, in action with actual (appropriately disguised) patients. It describes the goal of this title, which is to put the reader in the office with the practitioner, to observe and to understand the process of IPT cases over expert shoulders and to let these experts teach through demonstration.
APA, Harvard, Vancouver, ISO, and other styles
10

Cipolla-Ficarra, Francisco V., and Valeria M. Ficarra. "Art, Future, and New Technologies." In Advanced Research and Trends in New Technologies, Software, Human-Computer Interaction, and Communicability. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4490-8.ch026.

Full text
Abstract:
The authors present the first results of a heuristic evaluation of online content and the social networks that allows the detection of the manipulators of the mass media communication, the universities, and the research centers in the Iberian Peninsula. They present the strategies used in a technique of heuristic evaluation called CASTE – Computer Art, Software, and Technology Evaluation. Finally, a first graphic is presented that shows the results of applying CASTE and the manipulating extension in other territories of the disguised research business in art and new technologies.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Disguise techniques"

1

Boas, Simon. "No in disguise." In SIGGRAPH '19: Special Interest Group on Computer Graphics and Interactive Techniques Conference. ACM, 2019. http://dx.doi.org/10.1145/3306211.3320144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cavaleri, Rob, Michael Knapp, Matt Simmons, et al. ""Spies in Disguise"." In SIGGRAPH '20: Special Interest Group on Computer Graphics and Interactive Techniques Conference. ACM, 2020. http://dx.doi.org/10.1145/3368850.3383435.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dwivedi, Ravindra, Heather Brown, Joe Antonuccio, Julia Correnti, and Ai King. "Performance Based Melting in Spies In Disguise." In SIGGRAPH '20: Special Interest Group on Computer Graphics and Interactive Techniques Conference. ACM, 2020. http://dx.doi.org/10.1145/3388767.3407366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hinz, Cristian. "Spies in Disguise: Creating a Gooey Kimura." In SIGGRAPH '20: Special Interest Group on Computer Graphics and Interactive Techniques Conference. ACM, 2020. http://dx.doi.org/10.1145/3388767.3407381.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Evans, Mason, Cole Clark, Erin Elliott, and Will Moten. "Blending In - The Crowds of Spies In Disguise." In SIGGRAPH '20: Special Interest Group on Computer Graphics and Interactive Techniques Conference. ACM, 2020. http://dx.doi.org/10.1145/3388767.3407322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Staroniewicz, Piotr. "Influence of Natural Voice Disguise Techniques on Automatic Speaker Recognition." In 2018 Joint Conference - Acoustics. IEEE, 2018. http://dx.doi.org/10.1109/acoustics.2018.8502372.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Quanjin, Jingyang Li, and Yanping Li. "Forensic identification for electronic disguised voice based on supervector and statistical analysis." In 2016 Conference of The Oriental Chapter of International Committee for Coordination and Standardization of Speech Databases and Assessment Techniques (O-COCOSDA). IEEE, 2016. http://dx.doi.org/10.1109/icsda.2016.7919001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Goodge, Adam, Bryan Hooi, See Kiong Ng, and Wee Siong Ng. "Robustness of Autoencoders for Anomaly Detection Under Adversarial Impact." In Twenty-Ninth International Joint Conference on Artificial Intelligence and Seventeenth Pacific Rim International Conference on Artificial Intelligence {IJCAI-PRICAI-20}. International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/ijcai.2020/173.

Full text
Abstract:
Detecting anomalies is an important task in a wide variety of applications and domains. Deep learning methods have achieved state-of-the-art performance in anomaly detection in recent years; unsupervised methods being particularly popular. However, deep learning methods can be fragile to small perturbations in the input data. This can be exploited by an adversary to deliberately hinder model performance; an adversarial attack. This phenomena has been widely studied in the context of supervised image classification since its discovery, however such studies for an anomaly detection setting are s
APA, Harvard, Vancouver, ISO, and other styles
9

Talero-Sarmiento, Leonardo Hernán, Julián A. Durán-Peña, Kevin A. Salcedo-Rugeles, and Sergio M. Garcia-Franco. "The identification of improvement strategies in continuous assessment using sentiment analysis in the Operational Research course." In INNODOCT 2019. Universitat Politècnica de València, 2019. http://dx.doi.org/10.4995/inn2019.2019.10246.

Full text
Abstract:
The University aims is to graduate professionals with high levels of competence to impact society positively. In consequence, the institutions apply different educational strategies to focus on improving the curricular competences until mastery the whole competences topics. An alternative highly applied is continuous assessment, which is a form of educational examination that evaluates the progress of a student throughout a prescribed course. A critical course in the engineer formation is Operational Research; this course focuses on scientific management supported by mathematical models such a
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Disguise techniques"

1

Yatsymirska, Mariya. SOCIAL EXPRESSION IN MULTIMEDIA TEXTS. Ivan Franko National University of Lviv, 2021. http://dx.doi.org/10.30970/vjo.2021.49.11072.

Full text
Abstract:
The article investigates functional techniques of extralinguistic expression in multimedia texts; the effectiveness of figurative expressions as a reaction to modern events in Ukraine and their influence on the formation of public opinion is shown. Publications of journalists, broadcasts of media resonators, experts, public figures, politicians, readers are analyzed. The language of the media plays a key role in shaping the worldview of the young political elite in the first place. The essence of each statement is a focused thought that reacts to events in the world or in one’s own country. Th
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!