MohammadChavosh / synthetic-fingerprint-generationLinks
☆11Updated 5 years ago
Alternatives and similar repositories for synthetic-fingerprint-generation
Users that are interested in synthetic-fingerprint-generation are comparing it to the libraries listed below
Sorting:
- Proof of concept code for poisoning code generation models.☆53Updated last year
- Digital camera identification tool☆18Updated 10 years ago
- Protect your machine learning models easily and securely with watermarking 🔑☆97Updated last year
- ☆323Updated last year
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆116Updated 2 years ago
- code share for paper InvisMark: Invisible and Robust Watermarking for AI-generated Image Provenance☆35Updated 3 months ago
- Implementation of "Embedding Watermarks into Deep Neural Networks," in Proc. of ICMR'17.☆123Updated 3 years ago
- Code release for DeepJudge (S&P'22)☆51Updated 2 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Updated 2 years ago
- macOS Record Replay Debugger☆46Updated last year
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Updated 2 years ago
- Website & Documentation: https://sbaresearch.github.io/model-watermarking/☆24Updated 2 years ago
- Tasks as HTTP endpoints☆27Updated last year
- Global NIPS Paper Implementation Challenge of "Hiding Images in Plain Sight: Deep Steganography"☆53Updated 7 years ago
- ☆27Updated 5 years ago
- Code for ISSTA'21 paper 'Attack as Defense: Characterizing Adversarial Examples using Robustness'.☆12Updated 4 years ago
- [AAAI 2024] DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models☆11Updated 9 months ago
- ☆16Updated last year
- Dataset of 475000 faces from 530 faces (50x50 color) from facescrub☆18Updated 6 years ago
- Official implementation of the paper "Increasing Confidence in Adversarial Robustness Evaluations"☆18Updated 3 months ago
- Implementations of data poisoning attacks against neural networks and related defenses.☆94Updated last year
- QMK Homebrew Formulae☆14Updated 3 months ago
- Breaking Certifiable Defenses☆17Updated 2 years ago
- BTD - Bin To DNN: A DNN Executables Decompiler☆198Updated 2 years ago
- Watermarking against model extraction attacks in MLaaS. ACM MM 2021.☆33Updated 4 years ago
- Watermarking Deep Neural Networks (USENIX 2018)☆99Updated 5 years ago
- TaskTracker is an approach to detecting task drift in Large Language Models (LLMs) by analysing their internal activations. It provides a…☆66Updated 3 weeks ago
- Code Implementation for Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks☆31Updated 3 years ago
- Private Evolution: Generating DP Synthetic Data without Training [ICLR 2024, ICML 2024 Spotlight]☆102Updated this week
- Highlight code in Markdown files using tree-sitter and remark☆31Updated 2 years ago