☆19Sep 27, 2021Updated 4 years ago
Alternatives and similar repositories for Text-steganalysis
Users that are interested in Text-steganalysis are comparing it to the libraries listed below
Sorting:
- collection of the SOTA linguistic steganalysis methods☆27Dec 29, 2023Updated 2 years ago
- ☆33Nov 3, 2022Updated 3 years ago
- ☆23Jun 1, 2020Updated 5 years ago
- Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020☆24Oct 1, 2020Updated 5 years ago
- Implementation of "Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model"☆26Apr 21, 2021Updated 4 years ago
- ☆11Jan 25, 2019Updated 7 years ago
- PyTorch implementation for the FinerFact model in the AAAI 2022 paper Towards Fine-Grained Reasoning for Fake News Detection☆33Jan 25, 2022Updated 4 years ago
- ☆44Jun 8, 2022Updated 3 years ago
- DiffWA: Diffusion Models for Watermark Attack☆10Apr 23, 2024Updated last year
- Trained 50epochs☆12Aug 22, 2023Updated 2 years ago
- ☆11May 14, 2024Updated last year
- The official codes for our paper at COLING 2022: Semantic-Preserving Adversarial Code Comprehension☆12Oct 23, 2022Updated 3 years ago
- ☆11Sep 14, 2022Updated 3 years ago
- [ICML 2023] Protecting Language Generation Models via Invisible Watermarking☆13Sep 8, 2023Updated 2 years ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆15Mar 29, 2024Updated last year
- ☆12Oct 4, 2022Updated 3 years ago
- ☆11Oct 28, 2023Updated 2 years ago
- Watermarking LLM papers up-to-date☆11Dec 17, 2023Updated 2 years ago
- This project is the Develop a generalized algorithm to detect the brightness of any image. Your algorithm should take an image as input a…☆13Nov 21, 2019Updated 6 years ago
- ☆10Apr 15, 2023Updated 2 years ago
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated last year
- [EMNLP'23 Oral] ReSee: Responding through Seeing Fine-grained Visual Knowledge in Open-domain Dialogue PyTorch Implementation☆13Dec 4, 2023Updated 2 years ago
- Alzheimer’s Disease (AD) is a neurological brain disorder marked by dementia and neurological dysfunction that affects memory, behavioral…☆16Aug 28, 2022Updated 3 years ago
- Classify image and text with ResNet and BERT models using Pytorch☆13Jul 7, 2020Updated 5 years ago
- All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Model…☆13Sep 16, 2024Updated last year
- ☆13Feb 29, 2024Updated 2 years ago
- A Hierarchical Attention Model for Social Contextual Image Recommendation, TKDE2019☆13Feb 10, 2021Updated 5 years ago
- Official PyTorch Implementation of "Self-Guided Generation of Minority Samples Using Diffusion Models" (ECCV 2024)☆14May 5, 2025Updated 10 months ago
- ☆14Mar 3, 2022Updated 4 years ago
- AMR-parser. Code for EMNLP2019 paper "Core Semantic First: A Top-down Approach for AMR Parsing."☆11Feb 23, 2020Updated 6 years ago
- ☆14Jan 4, 2025Updated last year
- A structurally comprehensive dataset of AMR-to-text alignments for coverage of a larger variety of linguistic phenomena, for research rel…☆16Dec 10, 2022Updated 3 years ago
- 雪浪制造AI挑战赛 初赛73/2403,复赛22/2403,所有代码+介绍☆14Sep 4, 2018Updated 7 years ago
- ☆15Jan 17, 2024Updated 2 years ago
- A Fine-grained Differentially Private Federated Learning against Leakage from Gradients☆15Jan 18, 2023Updated 3 years ago
- This is the official code repository for paper "Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code".☆17Sep 21, 2025Updated 5 months ago
- Cyber Code Intelligence (CyberCI)☆14Dec 25, 2020Updated 5 years ago
- ☆13May 28, 2023Updated 2 years ago
- IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications☆18May 10, 2024Updated last year