☆19Sep 27, 2021Updated 4 years ago
Alternatives and similar repositories for Text-steganalysis
Users that are interested in Text-steganalysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Nov 11, 2025Updated 4 months ago
- collection of the SOTA linguistic steganalysis methods☆28Dec 29, 2023Updated 2 years ago
- ☆33Nov 3, 2022Updated 3 years ago
- ☆26Jun 1, 2020Updated 5 years ago
- ☆23Jun 1, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆27Sep 9, 2021Updated 4 years ago
- Implementation of "Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model"☆26Apr 21, 2021Updated 4 years ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆42Jun 1, 2025Updated 9 months ago
- Paper To Code implementation of NVIDIA's GauGan on a custom Landscape 's Dataset. Generating photorealistic-ish:p images from drawings☆12May 6, 2022Updated 3 years ago
- A list Viterbo algorithm for decoding PAC codes with various code constructions/rate-profiles☆11May 6, 2022Updated 3 years ago
- text generation from keywords using transformer model☆12Nov 2, 2019Updated 6 years ago
- Generalized Data-free Universal Adversarial Perturbations in PyTorch☆20Oct 9, 2020Updated 5 years ago
- The project code is the Source code of the paper "Payload-Independent Direct Cost Learning for Image Steganography"☆13Oct 19, 2023Updated 2 years ago
- ☆10Apr 15, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆11May 14, 2024Updated last year
- ☆12Oct 28, 2023Updated 2 years ago
- DiffWA: Diffusion Models for Watermark Attack☆10Apr 23, 2024Updated last year
- PyTorch implementation for the FinerFact model in the AAAI 2022 paper Towards Fine-Grained Reasoning for Fake News Detection☆33Jan 25, 2022Updated 4 years ago
- ☆44Jun 8, 2022Updated 3 years ago
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated last year
- ☆11Dec 18, 2024Updated last year
- Cyber Code Intelligence (CyberCI)☆14Dec 25, 2020Updated 5 years ago
- Yahoo! news dataset of DeepCom (EMNLP2019)☆18Jan 21, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Data-Driven Software Vulnerability Discovery (SVD)☆13May 27, 2020Updated 5 years ago
- A Python script that extracts the PRNU from images using the DRUNet network as a denoising technique.☆10Nov 30, 2021Updated 4 years ago
- ☆15May 22, 2023Updated 2 years ago
- ☆14Mar 3, 2022Updated 4 years ago
- Let there be clock in the beach - WACV 2022☆15Nov 15, 2021Updated 4 years ago
- ☆15Jan 17, 2024Updated 2 years ago
- ☆16Aug 16, 2023Updated 2 years ago
- ☆12Oct 19, 2020Updated 5 years ago
- The repository includes an ongoing collection of Instagram Posts IDs correlated with the new coronavirus COVID-19.☆11May 3, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- [TNNLS, to appear] FET-LM: Flow Enhanced Variational Auto-Encoder for Topic-Guided Language Modeling PyTorch Implementation☆14Mar 4, 2023Updated 3 years ago
- SimCSE☆15Oct 1, 2022Updated 3 years ago
- ☆14Jan 4, 2025Updated last year
- STEGASURAS: STEGanography via Arithmetic coding and Strong neURAl modelS☆205Jun 18, 2025Updated 9 months ago
- A Tensorflow LSTM spam detector utilizing GloVe word embeddings.☆12Nov 9, 2019Updated 6 years ago
- IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications☆18May 10, 2024Updated last year
- ☆13Oct 4, 2022Updated 3 years ago