Picture for Shunquan Tan

Shunquan Tan

Prompt Engineering-assisted Malware Dynamic Analysis Using GPT-4

Add code
Dec 13, 2023
Figure 1 for Prompt Engineering-assisted Malware Dynamic Analysis Using GPT-4
Figure 2 for Prompt Engineering-assisted Malware Dynamic Analysis Using GPT-4
Figure 3 for Prompt Engineering-assisted Malware Dynamic Analysis Using GPT-4
Figure 4 for Prompt Engineering-assisted Malware Dynamic Analysis Using GPT-4
Viaarxiv icon

Evading Detection Actively: Toward Anti-Forensics against Forgery Localization

Add code
Oct 16, 2023
Figure 1 for Evading Detection Actively: Toward Anti-Forensics against Forgery Localization
Figure 2 for Evading Detection Actively: Toward Anti-Forensics against Forgery Localization
Figure 3 for Evading Detection Actively: Toward Anti-Forensics against Forgery Localization
Figure 4 for Evading Detection Actively: Toward Anti-Forensics against Forgery Localization
Viaarxiv icon

STD-NET: Search of Image Steganalytic Deep-learning Architecture via Hierarchical Tensor Decomposition

Add code
Jun 12, 2022
Figure 1 for STD-NET: Search of Image Steganalytic Deep-learning Architecture via Hierarchical Tensor Decomposition
Figure 2 for STD-NET: Search of Image Steganalytic Deep-learning Architecture via Hierarchical Tensor Decomposition
Figure 3 for STD-NET: Search of Image Steganalytic Deep-learning Architecture via Hierarchical Tensor Decomposition
Figure 4 for STD-NET: Search of Image Steganalytic Deep-learning Architecture via Hierarchical Tensor Decomposition
Viaarxiv icon

Universal Deep Network for Steganalysis of Color Image based on Channel Representation

Add code
Nov 24, 2021
Viaarxiv icon

Self-Adversarial Training incorporating Forgery Attention for Image Forgery Localization

Add code
Jul 06, 2021
Figure 1 for Self-Adversarial Training incorporating Forgery Attention for Image Forgery Localization
Figure 2 for Self-Adversarial Training incorporating Forgery Attention for Image Forgery Localization
Figure 3 for Self-Adversarial Training incorporating Forgery Attention for Image Forgery Localization
Figure 4 for Self-Adversarial Training incorporating Forgery Attention for Image Forgery Localization
Viaarxiv icon

MCTSteg: A Monte Carlo Tree Search-based Reinforcement Learning Framework for Universal Non-additive Steganography

Add code
Mar 25, 2021
Figure 1 for MCTSteg: A Monte Carlo Tree Search-based Reinforcement Learning Framework for Universal Non-additive Steganography
Figure 2 for MCTSteg: A Monte Carlo Tree Search-based Reinforcement Learning Framework for Universal Non-additive Steganography
Figure 3 for MCTSteg: A Monte Carlo Tree Search-based Reinforcement Learning Framework for Universal Non-additive Steganography
Figure 4 for MCTSteg: A Monte Carlo Tree Search-based Reinforcement Learning Framework for Universal Non-additive Steganography
Viaarxiv icon

Image Steganography based on Iteratively Adversarial Samples of A Synchronized-directions Sub-image

Add code
Jan 13, 2021
Figure 1 for Image Steganography based on Iteratively Adversarial Samples of A Synchronized-directions Sub-image
Figure 2 for Image Steganography based on Iteratively Adversarial Samples of A Synchronized-directions Sub-image
Figure 3 for Image Steganography based on Iteratively Adversarial Samples of A Synchronized-directions Sub-image
Figure 4 for Image Steganography based on Iteratively Adversarial Samples of A Synchronized-directions Sub-image
Viaarxiv icon

A multi-branch convolutional neural network for detecting double JPEG compression

Add code
Oct 16, 2017
Figure 1 for A multi-branch convolutional neural network for detecting double JPEG compression
Figure 2 for A multi-branch convolutional neural network for detecting double JPEG compression
Figure 3 for A multi-branch convolutional neural network for detecting double JPEG compression
Figure 4 for A multi-branch convolutional neural network for detecting double JPEG compression
Viaarxiv icon