CAU-Tstega / Text-steganalysisLinks
☆20Updated 4 years ago
Alternatives and similar repositories for Text-steganalysis
Users that are interested in Text-steganalysis are comparing it to the libraries listed below
Sorting:
- collection of the SOTA linguistic steganalysis methods☆25Updated last year
- ☆12Updated last month
- ☆26Updated 4 years ago
- ☆33Updated 2 years ago
- ☆23Updated 5 years ago
- ☆25Updated 5 years ago
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆46Updated 3 years ago
- Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020☆23Updated 5 years ago
- Natural Language Attacks in a Hard Label Black Box Setting.☆47Updated 4 years ago
- ☆18Updated 4 years ago
- Hidden backdoor attack on NLP systems☆46Updated 3 years ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆40Updated 4 months ago
- Official implementation of the EMNLP 2021 paper "ONION: A Simple and Effective Defense Against Textual Backdoor Attacks"☆34Updated 3 years ago
- An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)☆191Updated 2 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Updated 2 years ago
- Code for paper: "PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification", IEEE S&P 2024.☆33Updated last year
- This is the official implementation of our paper 'Black-box Dataset Ownership Verification via Backdoor Watermarking'.☆26Updated 2 years ago
- ☆11Updated 5 years ago
- TextGuard: Provable Defense against Backdoor Attacks on Text Classification☆12Updated last year
- [CCS'22] SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders☆20Updated 3 years ago
- ☆84Updated 4 years ago
- Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"☆43Updated 3 years ago
- Robust natural language watermarking using invariant features☆26Updated last year
- Watermarking Text Generated by Black-Box Language Models☆39Updated last year
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆60Updated 11 months ago
- Code for EMNLP2020 long paper: BERT-Attack: Adversarial Attack Against BERT Using BERT☆201Updated 5 years ago
- Code and data of the ACL 2021 paper "Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution"☆16Updated 4 years ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆31Updated 2 years ago
- Code for the paper "Be Careful about Poisoned Word Embeddings: Exploring the Vulnerability of the Embedding Layers in NLP Models" (NAACL-…☆42Updated 4 years ago
- This is the source code for MEA-Defender. Our paper is accepted by the IEEE Symposium on Security and Privacy (S&P) 2024.☆29Updated last year