Lakshmanan Nataraj
Lakshmanan Nataraj
Trimble Inc.
Zweryfikowany adres z trimble.com - Strona główna
Cytowane przez
Cytowane przez
Malware images: visualization and automatic classification
L Nataraj, S Karthikeyan, G Jacob, BS Manjunath
Proceedings of the 8th International Symposium on Visualization for Cyber …, 2011
A comparative assessment of malware classification using binary texture analysis and dynamic analysis
L Nataraj, V Yegneswaran, P Porras, J Zhang
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence …, 2011
Hybrid lstm and encoder–decoder architecture for detection of image forgeries
JH Bappy, C Simons, L Nataraj, BS Manjunath, AK Roy-Chowdhury
IEEE Transactions on Image Processing 28 (7), 3286-3300, 2019
Exploiting spatial structure for localizing manipulated image regions
JH Bappy, AK Roy-Chowdhury, J Bunk, L Nataraj, BS Manjunath
Proceedings of the IEEE international conference on computer vision, 4970-4979, 2017
Detection and localization of image forgeries using resampling features and deep learning
J Bunk, JH Bappy, TM Mohammed, L Nataraj, A Flenner, BS Manjunath, ...
2017 IEEE conference on computer vision and pattern recognition workshops …, 2017
Detecting GAN generated fake images using co-occurrence matrices
L Nataraj, TM Mohammed, BS Manjunath, S Chandrasekaran, A Flenner, ...
Electronic Imaging 2019 (5), 532-1-532-7, 2019
Detection of seam carving and localization of seam insertions in digital images
A Sarkar, L Nataraj, BS Manjunath
Proceedings of the 11th ACM workshop on Multimedia and security, 107-116, 2009
SigMal: A Static Signal Processing Based Malware Triage
D Kirat, L Nataraj, G Vigna, BS Manjunath
Annual Computer Security Applications Conference (ACSAC) 2013, 2013
Digital image forgery detection using artificial neural network and auto regressive coefficients
ES Gopi, N Lakshmanan, T Gokul, S KumaraGanesh
2006 Canadian Conference on Electrical and Computer Engineering, 194-197, 2006
SPAM: Signal Processing to Analyze Malware
L Nataraj, BS Manjunath
IEEE Signal Processing Magazine 33 (2), 105-117, 2016
SARVAM: Search And RetrieVAl of Malware
L Nataraj, D Kirat, BS Manjunath, G Vigna
Annual Computer Security Applications Conference (ACSAC) Workshop on Next …, 2013
Adding gaussian noise to “denoise” JPEG for detecting image resizing
L Nataraj, A Sarkar, BS Manjunath
2009 16th IEEE International Conference on Image Processing (ICIP), 1493-1496, 2009
Boosting Image Forgery Detection using Resampling Features and Copy-move analysis
TM Mohammed, J Bunk, L Nataraj, JH Bappy, A Flenner, BS Manjunath, ...
Electronic Imaging 2018, 2018
Improving re-sampling detection by adding noise
L Nataraj, A Sarkar, BS Manjunath
Media Forensics and Security II 7541, 177-187, 2010
SATTVA: SpArsiTy inspired classificaTion of malware VAriants
L Nataraj, S Karthikeyan, BS Manjunath
ACM Workshop on Information Hiding and Multimedia Security (IH and MMSEC) 2015, 2015
Detection, attribution and localization of gan generated images
M Goebel, L Nataraj, T Nanjundaswamy, TM Mohammed, ...
Electronic Imaging 2021 (4), 276-1-276-11, 2021
A signal processing approach to malware analysis
L Nataraj
University of California, Santa Barbara, 2015
Resampling forgery detection using deep learning and a-contrario analysis
A Flenner, L Peterson, J Bunk, TM Mohammed, L Nataraj, BS Manjunath
Electronic Imaging 2018 (7), 212-1-212-7, 2018
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS-a randomized block based hiding scheme
A Sarkar, L Nataraj, BS Manjunath, U Madhow
2008 15th IEEE International Conference on Image Processing, 1292-1295, 2008
Brain computer interface analysis using wavelet transforms and auto regressive coefficients
ES Gopi, RS Vijay, V Rangarajan, L Nataraj
2006 International Conference on Electrical and Computer Engineering, 169-172, 2006
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20