GuanshuoXu / caffe_deep_learning_for_steganalysisView external linksLinks
☆30May 6, 2017Updated 8 years ago
Alternatives and similar repositories for caffe_deep_learning_for_steganalysis
Users that are interested in caffe_deep_learning_for_steganalysis are comparing it to the libraries listed below
Sorting:
- code of our paper entitled: Improving Blind Steganalysis in Spatial Domain using a Criterion to Choose the AppropriateSteganalyzer betwee…☆29Jan 3, 2017Updated 9 years ago
- Deep learning based image steganalysis in spatial domain☆12Apr 9, 2018Updated 7 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- ☆18Feb 16, 2023Updated 2 years ago
- Pytorch implementation of "Deep Learning Hierarchical Representations for Image Steganalysis"☆57Oct 7, 2017Updated 8 years ago
- Tensorflow implementation of "Deep Learning Hierarchical Representation for Image Steganalysis"☆26Oct 7, 2017Updated 8 years ago
- List for learning image steganography☆36Jun 11, 2024Updated last year
- Steganography via adversarial training☆15Dec 1, 2018Updated 7 years ago
- An open-source toolbox for steganalysis☆195Feb 4, 2026Updated last week
- ☆13Jan 30, 2019Updated 7 years ago
- Hard-to-detect image steganography☆50Feb 8, 2025Updated last year
- Implementation of several Steganography and steganalysis techniques.☆49Nov 20, 2025Updated 2 months ago
- PyTorch implementation of the classical image steganalysis networks, compatible with both grayscale and color images, and supporting mult…☆78Dec 26, 2023Updated 2 years ago
- Kuzushiji Recognition Kaggle 2019. Build a DL model to transcribe ancient Kuzushiji into contemporary Japanese characters. Opening the do…☆25Oct 26, 2019Updated 6 years ago
- A fast and effective global covariance pooling network for image steganalysis in spatial domain.☆21Jul 24, 2019Updated 6 years ago
- ☆27Feb 10, 2022Updated 4 years ago
- Next word prediction based on N-gram language model☆12Jan 11, 2015Updated 11 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- ☆15Jan 24, 2019Updated 7 years ago
- Active Learning for SN photometric classification☆10Oct 10, 2025Updated 4 months ago
- ☆10Apr 30, 2017Updated 8 years ago
- privacy☆12Nov 30, 2018Updated 7 years ago
- ☆13Apr 2, 2018Updated 7 years ago
- Solve ciphers with python☆10Oct 24, 2018Updated 7 years ago
- Creating a NIDS based on a Deep Neural Network (CNN)☆11Dec 31, 2018Updated 7 years ago
- ☆11Feb 26, 2024Updated last year
- Build a Node.js chatbot that uses Watson Assistant search skill to query an owner's manual☆11Sep 17, 2025Updated 4 months ago
- Predicting treatment effects from RCTs (Circulation: CQO 2019).☆10Jun 21, 2022Updated 3 years ago
- ☆17Dec 16, 2025Updated last month
- Books on programming and computer science☆13Jan 23, 2014Updated 12 years ago
- Toy approach to VMProtect virtualization☆16Oct 26, 2018Updated 7 years ago
- Cyber Security Challenge Australia 2014 Files☆18May 9, 2014Updated 11 years ago
- A repository containing sample srop exploits and vulnerable binaries.☆12Sep 17, 2019Updated 6 years ago
- PyTorch helper code☆10Dec 20, 2018Updated 7 years ago
- ☆10Feb 13, 2021Updated 5 years ago
- ☆44Oct 6, 2018Updated 7 years ago
- Best place to start Open Source and learn development.☆85Feb 13, 2018Updated 8 years ago
- Incremental Learning the Hierarchical Softmax Function for Neural Language Models☆11Dec 6, 2016Updated 9 years ago
- kaggle - RSNA STR Pulmonary Embolism Detection☆10Nov 22, 2020Updated 5 years ago