Ruby-He / ProTegOLinks
[MM'23] ProTegO: Protect Text Content against OCR Extraction Attack
☆13Updated last year
Alternatives and similar repositories for ProTegO
Users that are interested in ProTegO are comparing it to the libraries listed below
Sorting:
- Watermarking LLM papers up-to-date☆13Updated last year
 - [NeurIPS 2025 D&B] BackdoorDM: A Comprehensive Benchmark for Backdoor Learning in Diffusion Model☆20Updated 3 months ago
 - [CVPR 2024] Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models☆118Updated last year
 - A list of recent papers about adversarial learning☆224Updated last week
 - [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆44Updated 11 months ago
 - [MM'23 Oral] "Text-to-image diffusion models can be easily backdoored through multimodal data poisoning"☆32Updated 2 months ago
 - Code for paper: "PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification", IEEE S&P 2024.☆33Updated last year
 - ☆32Updated 6 months ago
 - A collection of resources on attacks and defenses targeting text-to-image diffusion models☆77Updated 7 months ago
 - ☆30Updated last year
 - ☆41Updated 6 months ago
 - Source code of paper "An Unforgeable Publicly Verifiable Watermark for Large Language Models" accepted by ICLR 2024☆34Updated last year
 - TransferAttack is a pytorch framework to boost the adversarial transferability for image classification.☆402Updated last month
 - Provably Secure Steganography in Practice Based on “Distribution Copies”☆40Updated 5 months ago
 - ☆41Updated last year
 - (AAAI 24) Step Vulnerability Guided Mean Fluctuation Adversarial Attack against Conditional Diffusion Models☆11Updated last year
 - ☆23Updated last year
 - Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.☆92Updated 2 years ago
 - The official implementation of the paper "Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks".☆19Updated last year
 - An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆236Updated last year
 - ☆223Updated 2 months ago
 - [ICLR 2025] VideoShield: Regulating Diffusion-based Video Generation Models via Watermarking (Official Implementation)☆44Updated 5 months ago
 - Implementation of IEEE TNNLS 2023 and Elsevier PR 2023 papers on backdoor watermarking for deep classification models with unambiguity an…☆19Updated 2 years ago
 - All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Model…☆12Updated last year
 - ☆27Updated 2 years ago
 - This is an unofficial implementation of the Paper by Kejiang Chen et.al. on Gaussian Shading: Provable Performance-Lossless Image Waterma…☆37Updated last year
 - ☆79Updated last year
 - This is an official repository of ``VLAttack: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models'' (NeurIPS 2…☆58Updated 7 months ago
 - 😎 up-to-date & curated list of awesome Attacks on Large-Vision-Language-Models papers, methods & resources.☆409Updated last week
 - ☆44Updated 3 years ago