[MM'23] ProTegO: Protect Text Content against OCR Extraction Attack
☆14Mar 12, 2024Updated last year
Alternatives and similar repositories for ProTegO
Users that are interested in ProTegO are comparing it to the libraries listed below
Sorting:
- Source code for ECML/PKDD 2020 paper "FAWA: Fast Adversarial Watermark Attack on Optical Character Recognition (OCR) Systems"☆22Dec 27, 2020Updated 5 years ago
- ☆21Jul 26, 2025Updated 7 months ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆14Mar 29, 2024Updated last year
- ☆13Feb 21, 2025Updated last year
- The extension of "Patch-wise Attack for Fooling Deep Neural Network (ECCV2020)", and we aim to boost the success rates of targeted attack…☆28Mar 14, 2022Updated 3 years ago
- ☆37Nov 16, 2025Updated 3 months ago
- [Neurips 2025]StegoZip: Enhancing Linguistic Steganography Payload in Practice with Large Language Models☆26Dec 4, 2025Updated 2 months ago
- [ICLR 2025] A Closer Look at Machine Unlearning for Large Language Models☆45Dec 4, 2024Updated last year
- Adaptive Mixed-Scale Feature Fusion Network for Blind AI-Generated Image Quality Assessment☆10Jun 12, 2024Updated last year
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆42Jun 1, 2025Updated 9 months ago
- 🔌 A Node.js Library for the PWRTelegram User API☆12Jun 2, 2017Updated 8 years ago
- ☆14Dec 18, 2024Updated last year
- With this tiny tool you are able to convert Plantuml code to draw.io element by element. Target format is mxgraph.☆23Feb 7, 2026Updated 3 weeks ago
- Parallelizing Google's PageRank algorithm in C++ with CUDA framework on GPU. Conducted some experiments, tried new ideas. Final Course Pr…☆10May 20, 2021Updated 4 years ago
- ☆11Aug 14, 2024Updated last year
- ☆14Aug 3, 2024Updated last year
- ☆10Mar 22, 2022Updated 3 years ago
- ☆11Jul 5, 2023Updated 2 years ago
- [USENIX Security 2025] SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks☆19Sep 18, 2025Updated 5 months ago
- ☆52Feb 24, 2024Updated 2 years ago
- This repository includes main notebook of the code for our proposed RCGAN☆12Apr 10, 2020Updated 5 years ago
- Subgraphormer: Unifying Subgraph GNNs and Graph Transformers via Graph Products (ICML 2024)☆11Jul 13, 2024Updated last year
- ☆11May 18, 2025Updated 9 months ago
- A Computer Vision model that detects guns using YOLOv8☆10May 11, 2023Updated 2 years ago
- ☆11Mar 9, 2022Updated 3 years ago
- [CVPR 2024] Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models☆135May 15, 2024Updated last year
- Code for Semantic Adversarial Attacks☆11Oct 12, 2021Updated 4 years ago
- PKU-I2IQA: An Image-to-Image Quality Assessment Database for AI Generated Images☆16Dec 4, 2024Updated last year
- Official implementation of "Data Mixture Inference: What do BPE tokenizers reveal about their training data?"☆18May 15, 2025Updated 9 months ago
- Build Your Own Bundle-A Neural Combinatorial Optimization Method (BYOB)☆13Apr 27, 2022Updated 3 years ago
- Pytorch implementation for the pilot study on the robustness of latent diffusion models.☆13Jun 20, 2023Updated 2 years ago
- ☆14May 1, 2023Updated 2 years ago
- Boosting Transferability through Enhanced Momentum☆14Feb 23, 2024Updated 2 years ago
- 眼迹AI是一套集成了面部识别和物体检测功能的系统,它能够实时监控环境并在检测到危险情况时自动向服务器发送警报,从而迅速通知当局应对风险。对于司机而言,时常面临乘客可能实施抢劫或其他不当行为的潜在威胁。通过在您的手机或行车记录仪上部署这一AI系统,不仅能提供即时的安全保障,还…☆16Mar 2, 2025Updated 11 months ago
- ☆17Jul 18, 2024Updated last year
- ☆12Dec 8, 2022Updated 3 years ago
- PyTorch implementation of the paper: CASAGPT: Cuboid Arrangement and Scene Assembly for Interior Design [CVPR 2025]☆14Apr 5, 2025Updated 10 months ago
- An audio steganalysis method based on CNN in the time domain.☆12Feb 25, 2021Updated 5 years ago
- This is the source code of PFRec☆14Dec 16, 2022Updated 3 years ago