Picture for Jonathan Pan

Jonathan Pan

Automating Security Audit Using Large Language Model based Agent: An Exploration Experiment

Add code
May 15, 2025
Viaarxiv icon

Probing Latent Subspaces in LLM for AI Security: Identifying and Manipulating Adversarial States

Add code
Mar 12, 2025
Viaarxiv icon

Audio Simulation for Sound Source Localization in Virtual Evironment

Add code
Apr 02, 2024
Viaarxiv icon

Enhancing Reasoning Capacity of SLM using Cognitive Enhancement

Add code
Apr 01, 2024
Viaarxiv icon

A Review on the effectiveness of Dimensional Reduction with Computational Forensics: An Application on Malware Analysis

Add code
Jan 15, 2023
Viaarxiv icon

Active Meta-Learner for Log Analysis

Add code
Mar 18, 2022
Figure 1 for Active Meta-Learner for Log Analysis
Figure 2 for Active Meta-Learner for Log Analysis
Figure 3 for Active Meta-Learner for Log Analysis
Figure 4 for Active Meta-Learner for Log Analysis
Viaarxiv icon

Blackbox Trojanising of Deep Learning Models : Using non-intrusive network structure and binary alterations

Add code
Aug 02, 2020
Figure 1 for Blackbox Trojanising of Deep Learning Models : Using non-intrusive network structure and binary alterations
Figure 2 for Blackbox Trojanising of Deep Learning Models : Using non-intrusive network structure and binary alterations
Figure 3 for Blackbox Trojanising of Deep Learning Models : Using non-intrusive network structure and binary alterations
Viaarxiv icon

IoT Network Behavioral Fingerprint Inference with Limited Network Trace for Cyber Investigation: A Meta Learning Approach

Add code
Feb 08, 2020
Figure 1 for IoT Network Behavioral Fingerprint Inference with Limited Network Trace for Cyber Investigation: A Meta Learning Approach
Figure 2 for IoT Network Behavioral Fingerprint Inference with Limited Network Trace for Cyber Investigation: A Meta Learning Approach
Figure 3 for IoT Network Behavioral Fingerprint Inference with Limited Network Trace for Cyber Investigation: A Meta Learning Approach
Figure 4 for IoT Network Behavioral Fingerprint Inference with Limited Network Trace for Cyber Investigation: A Meta Learning Approach
Viaarxiv icon

Physical Integrity Attack Detection of Surveillance Camera with Deep Learning Based Video Frame Interpolation

Add code
Jun 15, 2019
Figure 1 for Physical Integrity Attack Detection of Surveillance Camera with Deep Learning Based Video Frame Interpolation
Figure 2 for Physical Integrity Attack Detection of Surveillance Camera with Deep Learning Based Video Frame Interpolation
Figure 3 for Physical Integrity Attack Detection of Surveillance Camera with Deep Learning Based Video Frame Interpolation
Figure 4 for Physical Integrity Attack Detection of Surveillance Camera with Deep Learning Based Video Frame Interpolation
Viaarxiv icon