Picture for Jiwu Huang

Jiwu Huang

Prompt Engineering-assisted Malware Dynamic Analysis Using GPT-4

Add code
Dec 13, 2023
Viaarxiv icon

Evading Detection Actively: Toward Anti-Forensics against Forgery Localization

Add code
Oct 16, 2023
Viaarxiv icon

Forgery-aware Adaptive Vision Transformer for Face Forgery Detection

Add code
Sep 20, 2023
Viaarxiv icon

Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection

Add code
Apr 24, 2023
Viaarxiv icon

ReLoc: A Restoration-Assisted Framework for Robust Image Tampering Localization

Add code
Nov 08, 2022
Viaarxiv icon

Forensicability Assessment of Questioned Images in Recapturing Detection

Add code
Sep 05, 2022
Figure 1 for Forensicability Assessment of Questioned Images in Recapturing Detection
Figure 2 for Forensicability Assessment of Questioned Images in Recapturing Detection
Figure 3 for Forensicability Assessment of Questioned Images in Recapturing Detection
Figure 4 for Forensicability Assessment of Questioned Images in Recapturing Detection
Viaarxiv icon

STD-NET: Search of Image Steganalytic Deep-learning Architecture via Hierarchical Tensor Decomposition

Add code
Jun 12, 2022
Figure 1 for STD-NET: Search of Image Steganalytic Deep-learning Architecture via Hierarchical Tensor Decomposition
Figure 2 for STD-NET: Search of Image Steganalytic Deep-learning Architecture via Hierarchical Tensor Decomposition
Figure 3 for STD-NET: Search of Image Steganalytic Deep-learning Architecture via Hierarchical Tensor Decomposition
Figure 4 for STD-NET: Search of Image Steganalytic Deep-learning Architecture via Hierarchical Tensor Decomposition
Viaarxiv icon

Universal Deep Network for Steganalysis of Color Image based on Channel Representation

Add code
Nov 24, 2021
Viaarxiv icon

Robust Privacy-Preserving Motion Detection and Object Tracking in Encrypted Streaming Video

Add code
Aug 30, 2021
Figure 1 for Robust Privacy-Preserving Motion Detection and Object Tracking in Encrypted Streaming Video
Figure 2 for Robust Privacy-Preserving Motion Detection and Object Tracking in Encrypted Streaming Video
Figure 3 for Robust Privacy-Preserving Motion Detection and Object Tracking in Encrypted Streaming Video
Figure 4 for Robust Privacy-Preserving Motion Detection and Object Tracking in Encrypted Streaming Video
Viaarxiv icon

Self-Adversarial Training incorporating Forgery Attention for Image Forgery Localization

Add code
Jul 06, 2021
Figure 1 for Self-Adversarial Training incorporating Forgery Attention for Image Forgery Localization
Figure 2 for Self-Adversarial Training incorporating Forgery Attention for Image Forgery Localization
Figure 3 for Self-Adversarial Training incorporating Forgery Attention for Image Forgery Localization
Figure 4 for Self-Adversarial Training incorporating Forgery Attention for Image Forgery Localization
Viaarxiv icon