Picture for Guoshun Nan

Guoshun Nan

MALSIGHT: Exploring Malicious Source Code and Benign Pseudocode for Iterative Binary Malware Summarization

Add code
Jun 26, 2024
Figure 1 for MALSIGHT: Exploring Malicious Source Code and Benign Pseudocode for Iterative Binary Malware Summarization
Figure 2 for MALSIGHT: Exploring Malicious Source Code and Benign Pseudocode for Iterative Binary Malware Summarization
Figure 3 for MALSIGHT: Exploring Malicious Source Code and Benign Pseudocode for Iterative Binary Malware Summarization
Figure 4 for MALSIGHT: Exploring Malicious Source Code and Benign Pseudocode for Iterative Binary Malware Summarization
Viaarxiv icon

ContextBLIP: Doubly Contextual Alignment for Contrastive Image Retrieval from Linguistically Complex Descriptions

Add code
May 29, 2024
Viaarxiv icon

Uncovering What, Why and How: A Comprehensive Benchmark for Causation Understanding of Video Anomaly

Add code
Apr 30, 2024
Viaarxiv icon

Semantic Entropy Can Simultaneously Benefit Transmission Efficiency and Channel Security of Wireless Semantic Communications

Add code
Feb 07, 2024
Viaarxiv icon

Can We Improve Channel Reciprocity via Loop-back Compensation for RIS-assisted Physical Layer Key Generation

Add code
Jan 31, 2024
Figure 1 for Can We Improve Channel Reciprocity via Loop-back Compensation for RIS-assisted Physical Layer Key Generation
Figure 2 for Can We Improve Channel Reciprocity via Loop-back Compensation for RIS-assisted Physical Layer Key Generation
Figure 3 for Can We Improve Channel Reciprocity via Loop-back Compensation for RIS-assisted Physical Layer Key Generation
Figure 4 for Can We Improve Channel Reciprocity via Loop-back Compensation for RIS-assisted Physical Layer Key Generation
Viaarxiv icon

Refining Latent Homophilic Structures over Heterophilic Graphs for Robust Graph Convolution Networks

Add code
Dec 27, 2023
Viaarxiv icon

DocMSU: A Comprehensive Benchmark for Document-level Multimodal Sarcasm Understanding

Add code
Dec 26, 2023
Viaarxiv icon

Passive Eavesdropping Can Significantly Slow Down RIS-Assisted Secret Key Generation

Add code
Sep 06, 2023
Figure 1 for Passive Eavesdropping Can Significantly Slow Down RIS-Assisted Secret Key Generation
Figure 2 for Passive Eavesdropping Can Significantly Slow Down RIS-Assisted Secret Key Generation
Figure 3 for Passive Eavesdropping Can Significantly Slow Down RIS-Assisted Secret Key Generation
Figure 4 for Passive Eavesdropping Can Significantly Slow Down RIS-Assisted Secret Key Generation
Viaarxiv icon

Physical-layer Adversarial Robustness for Deep Learning-based Semantic Communications

Add code
May 12, 2023
Figure 1 for Physical-layer Adversarial Robustness for Deep Learning-based Semantic Communications
Figure 2 for Physical-layer Adversarial Robustness for Deep Learning-based Semantic Communications
Figure 3 for Physical-layer Adversarial Robustness for Deep Learning-based Semantic Communications
Figure 4 for Physical-layer Adversarial Robustness for Deep Learning-based Semantic Communications
Viaarxiv icon

Boosting Physical Layer Black-Box Attacks with Semantic Adversaries in Semantic Communications

Add code
Mar 30, 2023
Figure 1 for Boosting Physical Layer Black-Box Attacks with Semantic Adversaries in Semantic Communications
Figure 2 for Boosting Physical Layer Black-Box Attacks with Semantic Adversaries in Semantic Communications
Figure 3 for Boosting Physical Layer Black-Box Attacks with Semantic Adversaries in Semantic Communications
Figure 4 for Boosting Physical Layer Black-Box Attacks with Semantic Adversaries in Semantic Communications
Viaarxiv icon