11 papers:
DUXU-IXD-2015-EliasFC #game studies #interactive- Ads-on Games and Fake Brands: Interactions, Commercials and Playful Branding (HE, EF, BJAdC), pp. 251–262.
SAC-2015-OkkaliogluKP #on the- On the discovery of fake binary ratings (MO, MK, HP), pp. 901–907.
ASE-2014-TillmannHX #automation #generative #testing- Transferring an automated test generation tool to practice: from pex to fakes and code digger (NT, JdH, TX), pp. 385–396.
HT-2014-Saez-Trumper #identification #twitter- Fake tweet buster: a webtool to identify users promoting fake news ontwitter (DST), pp. 316–317.
AMT-2014-PoskittDPR #bidirectional #model transformation #towards- Towards Rigorously Faking Bidirectional Model Transformations (CMP, MD, RFP, AR), pp. 70–75.
CHI-2013-LucaZPH #using- Using fake cursors to secure on-screen password entry (ADL, EvZ, LP, HH), pp. 2399–2402.
TOOLS-EUROPE-2012-LangrTDD #c++ #runtime- Fake Run-Time Selection of Template Arguments in C++ (DL, PT, TD, JPD), pp. 140–154.
CHI-2011-BlythePC #how- F for fake: four studies on how we fall for phish (MB, HP, JAC), pp. 3469–3478.
ICPR-2008-GalballyCLMF #generative- Fake fingertip generation from a minutiae template (JG, RC, AL, DM, JFA), pp. 1–4.
SAC-2007-LinL #mining #privacy #transaction- Privacy preserving itemset mining through fake transactions (JLL, JYCL), pp. 375–379.
ICALP-1999-Cucker- Real Computations with Fake Numbers (FC), pp. 55–73.