CAU-ISS-Lab / Text-steganalysisLinks
☆12Updated last month
Alternatives and similar repositories for Text-steganalysis
Users that are interested in Text-steganalysis are comparing it to the libraries listed below
Sorting:
- ☆20Updated 4 years ago
- ☆33Updated 3 years ago
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆17Updated last year
- ☆25Updated 5 years ago
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆60Updated 2 years ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆103Updated 3 years ago
- ☆11Updated 9 months ago
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆30Updated last year
- ☆27Updated 4 years ago
- This is the official implementation of our paper 'Black-box Dataset Ownership Verification via Backdoor Watermarking'.☆26Updated 2 years ago
- ☆94Updated 4 years ago
- ☆22Updated 5 years ago
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆25Updated 4 years ago
- Watermarking against model extraction attacks in MLaaS. ACM MM 2021.☆33Updated 4 years ago
- Implementation of IEEE TNNLS 2023 and Elsevier PR 2023 papers on backdoor watermarking for deep classification models with unambiguity an…☆19Updated 2 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Updated 3 years ago
- Watermarking Deep Neural Networks (USENIX 2018)☆100Updated 5 years ago
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆118Updated 2 years ago
- Code for Adv-watermark: A novel watermark perturbation for adversarial examples (ACM MM2020)☆41Updated 5 years ago
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Updated 3 years ago
- The official PyTorch implementation for ICCV'21 Oral paper 'Artificial GAN Fingerprints: Rooting Deepfake Attribution in Training Data'☆77Updated 2 years ago
- Steganalysis based deep learning☆58Updated 5 years ago
- A pytorch implementation of Deep Residual Network for Steganalysis of Digital Images (SRNet)☆98Updated 3 years ago
- ☆31Updated 4 years ago
- ☆60Updated 2 years ago
- ☆84Updated 4 years ago
- ☆13Updated 6 years ago
- Official code for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging (Accepted at NeurIPS2020).☆121Updated 4 years ago
- Pytorch implementation of "Deep Learning Hierarchical Representations for Image Steganalysis"☆55Updated 8 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆78Updated 3 years ago