CAU-ISS-Lab / Text-steganalysisLinks
☆12Updated 2 months ago
Alternatives and similar repositories for Text-steganalysis
Users that are interested in Text-steganalysis are comparing it to the libraries listed below
Sorting:
- ☆20Updated 4 years ago
- ☆27Updated 4 years ago
- ☆25Updated 5 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Updated 2 years ago
- ☆11Updated 8 months ago
- ☆33Updated 2 years ago
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆17Updated last year
- Code for Adv-watermark: A novel watermark perturbation for adversarial examples (ACM MM2020)☆41Updated 5 years ago
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆117Updated 2 years ago
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆60Updated last year
- The official PyTorch implementation for ICCV'21 Oral paper 'Artificial GAN Fingerprints: Rooting Deepfake Attribution in Training Data'☆77Updated 2 years ago
- ☆94Updated 4 years ago
- Website & Documentation: https://sbaresearch.github.io/model-watermarking/☆24Updated 2 years ago
- [CCS'22] SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders☆19Updated 3 years ago
- The official implementation of "Intellectual Property Protection of Diffusion Models via the Watermark Diffusion Process"☆21Updated 8 months ago
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆35Updated last year
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆15Updated last year
- Invisible Backdoor Attack with Sample-Specific Triggers☆102Updated 3 years ago
- ☆59Updated 2 years ago
- Pytorch implementation of Backdoor Attack against Speaker Verification☆27Updated 2 years ago
- Watermarking Deep Neural Networks (USENIX 2018)☆99Updated 5 years ago
- Official code for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging (Accepted at NeurIPS2020).☆119Updated 4 years ago
- a Pytorch implementation of the paper "Generating Adversarial Examples with Adversarial Networks" (advGAN).☆275Updated 4 years ago
- [AAAI 2021] Initiative Defense against Facial Manipulation☆37Updated 2 years ago
- Watermarking against model extraction attacks in MLaaS. ACM MM 2021.☆33Updated 4 years ago
- [ICLR2021] Unlearnable Examples: Making Personal Data Unexploitable☆171Updated last year
- A Siamese CNN for Image Steganalysis☆77Updated 5 years ago
- ☆22Updated 5 years ago
- PyTorch implementation of the classical image steganalysis networks, compatible with both grayscale and color images, and supporting mult…☆68Updated last year
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆25Updated 3 years ago