Lakshmanan Nataraj
Cited by
Cited by
Malware images: visualization and automatic classification
L Nataraj, S Karthikeyan, G Jacob, BS Manjunath
Proceedings of the 8th International Symposium on Visualization for Cyber …, 2011
A comparative assessment of malware classification using binary texture analysis and dynamic analysis
L Nataraj, V Yegneswaran, P Porras, J Zhang
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence …, 2011
Detection and localization of image forgeries using resampling features and deep learning
J Bunk, JH Bappy, TM Mohammed, L Nataraj, A Flenner, BS Manjunath, ...
2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops …, 2017
Detection of seam carving and localization of seam insertions in digital images
A Sarkar, L Nataraj, BS Manjunath
Proceedings of the 11th ACM workshop on Multimedia and security, 107-116, 2009
Exploiting spatial structure for localizing manipulated image regions
JH Bappy, AK Roy-Chowdhury, J Bunk, L Nataraj, BS Manjunath
Proceedings of the IEEE international conference on computer vision, 4970-4979, 2017
Detecting GAN generated fake images using co-occurrence matrices
L Nataraj, TM Mohammed, BS Manjunath, S Chandrasekaran, A Flenner, ...
Electronic Imaging 2019 (5), 532-1-532-7, 2019
Hybrid LSTM and encoder–decoder architecture for detection of image forgeries
JH Bappy, C Simons, L Nataraj, BS Manjunath, AK Roy-Chowdhury
IEEE Transactions on Image Processing 28 (7), 3286-3300, 2019
Digital image forgery detection using artificial neural network and auto regressive coefficients
ES Gopi, N Lakshmanan, T Gokul, S KumaraGanesh
2006 Canadian Conference on Electrical and Computer Engineering, 194-197, 2006
SigMal: A Static Signal Processing Based Malware Triage
D Kirat, L Nataraj, G Vigna, BS Manjunath
Annual Computer Security Applications Conference (ACSAC) 2013, 2013
Adding gaussian noise to “denoise” JPEG for detecting image resizing
L Nataraj, A Sarkar, BS Manjunath
2009 16th IEEE International Conference on Image Processing (ICIP), 1493-1496, 2009
SPAM: Signal Processing to Analyze Malware
L Nataraj, BS Manjunath
IEEE Signal Processing Magazine 33 (2), 105-117, 2016
SARVAM: Search And RetrieVAl of Malware
L Nataraj, D Kirat, BS Manjunath, G Vigna
Annual Computer Security Applications Conference (ACSAC) Workshop on Next …, 2013
Improving re-sampling detection by adding noise
L Nataraj, A Sarkar, BS Manjunath
Media Forensics and Security II 7541, 75410I, 2010
SATTVA: SpArsiTy inspired classificaTion of malware VAriants
L Nataraj, S Karthikeyan, BS Manjunath
ACM Workshop on Information Hiding and Multimedia Security (IH and MMSEC) 2015, 2015
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS-a randomized block based hiding scheme
A Sarkar, L Nataraj, BS Manjunath, U Madhow
2008 15th IEEE International Conference on Image Processing, 1292-1295, 2008
A signal processing approach to malware analysis
L Nataraj
University of California, Santa Barbara, 2015
Brain computer interface analysis using wavelet transforms and auto regressive coefficients
ES Gopi, V Rangarajan, L Nataraj
2006 International Conference on Electrical and Computer Engineering, 169-172, 2006
Boosting Image Forgery Detection using Resampling Features and Copy-move analysis
TM Mohammed, J Bunk, L Nataraj, JH Bappy, A Flenner, BS Manjunath, ...
Electronic Imaging 2018, 2018
Resampling forgery detection using deep learning and a-contrario analysis
A Flenner, L Peterson, J Bunk, TM Mohammed, L Nataraj, BS Manjunath
Electronic Imaging 2018 (7), 212-1-212-7, 2018
Detecting Packed Executables based on Raw Binary Data
L Nataraj, G Jacob, BS Manjunath
Technical Report, Vision Research Lab, UCSB, 2010
The system can't perform the operation now. Try again later.
Articles 1–20