Picture for Shivkumar Chandrasekaran

Shivkumar Chandrasekaran

CIMGEN: Controlled Image Manipulation by Finetuning Pretrained Generative Models on Limited Data

Add code
Jan 23, 2024
Viaarxiv icon

MalGrid: Visualization Of Binary Features In Large Malware Corpora

Add code
Nov 04, 2022
Figure 1 for MalGrid: Visualization Of Binary Features In Large Malware Corpora
Figure 2 for MalGrid: Visualization Of Binary Features In Large Malware Corpora
Figure 3 for MalGrid: Visualization Of Binary Features In Large Malware Corpora
Figure 4 for MalGrid: Visualization Of Binary Features In Large Malware Corpora
Viaarxiv icon

CNNs are Myopic

Add code
Jun 01, 2022
Figure 1 for CNNs are Myopic
Figure 2 for CNNs are Myopic
Figure 3 for CNNs are Myopic
Figure 4 for CNNs are Myopic
Viaarxiv icon

OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features

Add code
Nov 08, 2021
Figure 1 for OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features
Figure 2 for OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features
Figure 3 for OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features
Figure 4 for OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features
Viaarxiv icon

HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis

Add code
Nov 08, 2021
Figure 1 for HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis
Figure 2 for HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis
Figure 3 for HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis
Figure 4 for HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis
Viaarxiv icon

Seam Carving Detection and Localization using Two-Stage Deep Neural Networks

Add code
Sep 04, 2021
Figure 1 for Seam Carving Detection and Localization using Two-Stage Deep Neural Networks
Figure 2 for Seam Carving Detection and Localization using Two-Stage Deep Neural Networks
Figure 3 for Seam Carving Detection and Localization using Two-Stage Deep Neural Networks
Figure 4 for Seam Carving Detection and Localization using Two-Stage Deep Neural Networks
Viaarxiv icon

SeeTheSeams: Localized Detection of Seam Carving based Image Forgery in Satellite Imagery

Add code
Aug 28, 2021
Figure 1 for SeeTheSeams: Localized Detection of Seam Carving based Image Forgery in Satellite Imagery
Figure 2 for SeeTheSeams: Localized Detection of Seam Carving based Image Forgery in Satellite Imagery
Figure 3 for SeeTheSeams: Localized Detection of Seam Carving based Image Forgery in Satellite Imagery
Figure 4 for SeeTheSeams: Localized Detection of Seam Carving based Image Forgery in Satellite Imagery
Viaarxiv icon

Holistic Image Manipulation Detection using Pixel Co-occurrence Matrices

Add code
Apr 12, 2021
Figure 1 for Holistic Image Manipulation Detection using Pixel Co-occurrence Matrices
Figure 2 for Holistic Image Manipulation Detection using Pixel Co-occurrence Matrices
Figure 3 for Holistic Image Manipulation Detection using Pixel Co-occurrence Matrices
Figure 4 for Holistic Image Manipulation Detection using Pixel Co-occurrence Matrices
Viaarxiv icon

Adversarially Optimized Mixup for Robust Classification

Add code
Mar 22, 2021
Figure 1 for Adversarially Optimized Mixup for Robust Classification
Figure 2 for Adversarially Optimized Mixup for Robust Classification
Figure 3 for Adversarially Optimized Mixup for Robust Classification
Figure 4 for Adversarially Optimized Mixup for Robust Classification
Viaarxiv icon

Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions

Add code
Mar 19, 2021
Figure 1 for Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions
Figure 2 for Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions
Figure 3 for Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions
Figure 4 for Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions
Viaarxiv icon