Alert button
Picture for Tajuddin Manhar Mohammed

Tajuddin Manhar Mohammed

Alert button

MalGrid: Visualization Of Binary Features In Large Malware Corpora

Add code
Bookmark button
Alert button
Nov 04, 2022
Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath

Figure 1 for MalGrid: Visualization Of Binary Features In Large Malware Corpora
Figure 2 for MalGrid: Visualization Of Binary Features In Large Malware Corpora
Figure 3 for MalGrid: Visualization Of Binary Features In Large Malware Corpora
Figure 4 for MalGrid: Visualization Of Binary Features In Large Malware Corpora
Viaarxiv icon

OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features

Add code
Bookmark button
Alert button
Nov 08, 2021
Lakshmanan Nataraj, Tajuddin Manhar Mohammed, Tejaswi Nanjundaswamy, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath

Figure 1 for OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features
Figure 2 for OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features
Figure 3 for OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features
Figure 4 for OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features
Viaarxiv icon

HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis

Add code
Bookmark button
Alert button
Nov 08, 2021
Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath

Figure 1 for HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis
Figure 2 for HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis
Figure 3 for HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis
Figure 4 for HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis
Viaarxiv icon

Seam Carving Detection and Localization using Two-Stage Deep Neural Networks

Add code
Bookmark button
Alert button
Sep 04, 2021
Lakshmanan Nataraj, Chandrakanth Gudavalli, Tajuddin Manhar Mohammed, Shivkumar Chandrasekaran, B. S. Manjunath

Figure 1 for Seam Carving Detection and Localization using Two-Stage Deep Neural Networks
Figure 2 for Seam Carving Detection and Localization using Two-Stage Deep Neural Networks
Figure 3 for Seam Carving Detection and Localization using Two-Stage Deep Neural Networks
Figure 4 for Seam Carving Detection and Localization using Two-Stage Deep Neural Networks
Viaarxiv icon

Holistic Image Manipulation Detection using Pixel Co-occurrence Matrices

Add code
Bookmark button
Alert button
Apr 12, 2021
Lakshmanan Nataraj, Michael Goebel, Tajuddin Manhar Mohammed, Shivkumar Chandrasekaran, B. S. Manjunath

Figure 1 for Holistic Image Manipulation Detection using Pixel Co-occurrence Matrices
Figure 2 for Holistic Image Manipulation Detection using Pixel Co-occurrence Matrices
Figure 3 for Holistic Image Manipulation Detection using Pixel Co-occurrence Matrices
Figure 4 for Holistic Image Manipulation Detection using Pixel Co-occurrence Matrices
Viaarxiv icon

Malware Detection Using Frequency Domain-Based Image Visualization and Deep Learning

Add code
Bookmark button
Alert button
Jan 26, 2021
Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath

Figure 1 for Malware Detection Using Frequency Domain-Based Image Visualization and Deep Learning
Figure 2 for Malware Detection Using Frequency Domain-Based Image Visualization and Deep Learning
Figure 3 for Malware Detection Using Frequency Domain-Based Image Visualization and Deep Learning
Figure 4 for Malware Detection Using Frequency Domain-Based Image Visualization and Deep Learning
Viaarxiv icon

Detection, Attribution and Localization of GAN Generated Images

Add code
Bookmark button
Alert button
Jul 20, 2020
Michael Goebel, Lakshmanan Nataraj, Tejaswi Nanjundaswamy, Tajuddin Manhar Mohammed, Shivkumar Chandrasekaran, B. S. Manjunath

Figure 1 for Detection, Attribution and Localization of GAN Generated Images
Figure 2 for Detection, Attribution and Localization of GAN Generated Images
Figure 3 for Detection, Attribution and Localization of GAN Generated Images
Figure 4 for Detection, Attribution and Localization of GAN Generated Images
Viaarxiv icon

Detecting GAN generated Fake Images using Co-occurrence Matrices

Add code
Bookmark button
Alert button
Mar 15, 2019
Lakshmanan Nataraj, Tajuddin Manhar Mohammed, B. S. Manjunath, Shivkumar Chandrasekaran, Arjuna Flenner, Jawadul H. Bappy, Amit K. Roy-Chowdhury

Figure 1 for Detecting GAN generated Fake Images using Co-occurrence Matrices
Figure 2 for Detecting GAN generated Fake Images using Co-occurrence Matrices
Figure 3 for Detecting GAN generated Fake Images using Co-occurrence Matrices
Figure 4 for Detecting GAN generated Fake Images using Co-occurrence Matrices
Viaarxiv icon

Resampling Forgery Detection Using Deep Learning and A-Contrario Analysis

Add code
Bookmark button
Alert button
Mar 01, 2018
Arjuna Flenner, Lawrence Peterson, Jason Bunk, Tajuddin Manhar Mohammed, Lakshmanan Nataraj, B. S. Manjunath

Figure 1 for Resampling Forgery Detection Using Deep Learning and A-Contrario Analysis
Figure 2 for Resampling Forgery Detection Using Deep Learning and A-Contrario Analysis
Figure 3 for Resampling Forgery Detection Using Deep Learning and A-Contrario Analysis
Figure 4 for Resampling Forgery Detection Using Deep Learning and A-Contrario Analysis
Viaarxiv icon

Boosting Image Forgery Detection using Resampling Features and Copy-move analysis

Add code
Bookmark button
Alert button
Feb 19, 2018
Tajuddin Manhar Mohammed, Jason Bunk, Lakshmanan Nataraj, Jawadul H. Bappy, Arjuna Flenner, B. S. Manjunath, Shivkumar Chandrasekaran, Amit K. Roy-Chowdhury, Lawrence Peterson

Figure 1 for Boosting Image Forgery Detection using Resampling Features and Copy-move analysis
Figure 2 for Boosting Image Forgery Detection using Resampling Features and Copy-move analysis
Figure 3 for Boosting Image Forgery Detection using Resampling Features and Copy-move analysis
Figure 4 for Boosting Image Forgery Detection using Resampling Features and Copy-move analysis
Viaarxiv icon