Search Results for author: Shunquan Tan

Found 9 papers, 5 papers with code

Prompt Engineering-assisted Malware Dynamic Analysis Using GPT-4

1 code implementation13 Dec 2023 Pei Yan, Shunquan Tan, Miaohui Wang, Jiwu Huang

As a significant representation of dynamic malware behavior, the API (Application Programming Interface) sequence, comprised of consecutive API calls, has progressively become the dominant feature of dynamic analysis methods.

Few-Shot Learning Language Modelling +2

Evading Detection Actively: Toward Anti-Forensics against Forgery Localization

no code implementations16 Oct 2023 Long Zhuo, Shenghai Luo, Shunquan Tan, Han Chen, Bin Li, Jiwu Huang

In adversarial training, SEAR employs a forgery localization model as a supervisor to explore tampering features and constructs a deep-learning concealer to erase corresponding traces.

Adversarial Attack Self-Supervised Learning

STD-NET: Search of Image Steganalytic Deep-learning Architecture via Hierarchical Tensor Decomposition

1 code implementation12 Jun 2022 Shunquan Tan, Qiushi Li, Laiyuan Li, Bin Li, Jiwu Huang

We propose a normalized distortion threshold to evaluate the sensitivity of each involved convolutional layer of the base model to guide STD-NET to compress target network in an efficient and unsupervised approach, and obtain two network structures of different shapes with low computation cost and similar performance compared with the original one.

Model Compression Steganalysis +1

Self-Adversarial Training incorporating Forgery Attention for Image Forgery Localization

1 code implementation6 Jul 2021 Long Zhuo, Shunquan Tan, Bin Li, Jiwu Huang

In this paper, we propose a self-adversarial training strategy and a reliable coarse-to-fine network that utilizes a self-attention mechanism to localize forged regions in forgery images.

MCTSteg: A Monte Carlo Tree Search-based Reinforcement Learning Framework for Universal Non-additive Steganography

1 code implementation25 Mar 2021 Xianbo Mo, Shunquan Tan, Bin Li, Jiwu Huang

Recent research has shown that non-additive image steganographic frameworks effectively improve security performance through adjusting distortion distribution.

Self-Learning

Image Steganography based on Iteratively Adversarial Samples of A Synchronized-directions Sub-image

no code implementations13 Jan 2021 Xinghong Qin, Shunquan Tan, Bin Li, Weixuan Tang, Jiwu Huang

In this paper, we present a novel steganography scheme denoted as ITE-SYN (based on ITEratively adversarial perturbations onto a SYNchronized-directions sub-image), by which security data is embedded with synchronizing modification directions to enhance security and then iteratively increased perturbations are added onto a sub-image to reduce loss with cover class label of the target CNN classifier.

Image Steganography Steganalysis

Detection of Deep Network Generated Images Using Disparities in Color Components

1 code implementation22 Aug 2018 Haodong Li, Bin Li, Shunquan Tan, Jiwu Huang

In this paper, we address the problem of detecting deep network generated (DNG) images by analyzing the disparities in color components between real scene images and DNG images.

Multimedia

A multi-branch convolutional neural network for detecting double JPEG compression

no code implementations16 Oct 2017 Bin Li, Hu Luo, Haoxin Zhang, Shunquan Tan, Zhongzhou Ji

In this paper, we present a CNN solution by using raw DCT (discrete cosine transformation) coefficients from JPEG images as input.

Cannot find the paper you are looking for? You can Submit a new open access paper.