[MM'23] ProTegO: Protect Text Content against OCR Extraction Attack
☆14Mar 12, 2024Updated 2 years ago
Alternatives and similar repositories for ProTegO
Users that are interested in ProTegO are comparing it to the libraries listed below
Sorting:
- Source code for ECML/PKDD 2020 paper "FAWA: Fast Adversarial Watermark Attack on Optical Character Recognition (OCR) Systems"☆22Dec 27, 2020Updated 5 years ago
- ☆21Jul 26, 2025Updated 7 months ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆15Mar 29, 2024Updated last year
- ☆13Feb 21, 2025Updated last year
- Pytorch implementation for the pilot study on the robustness of latent diffusion models.☆12Jun 20, 2023Updated 2 years ago
- The extension of "Patch-wise Attack for Fooling Deep Neural Network (ECCV2020)", and we aim to boost the success rates of targeted attack…☆28Mar 14, 2022Updated 4 years ago
- ☆38Nov 16, 2025Updated 4 months ago
- [ICLR 2025] A Closer Look at Machine Unlearning for Large Language Models☆46Dec 4, 2024Updated last year
- PyTorch implementation of the paper: CASAGPT: Cuboid Arrangement and Scene Assembly for Interior Design [CVPR 2025]☆14Apr 5, 2025Updated 11 months ago
- ☆11May 18, 2025Updated 10 months ago
- (AAAI 24) Step Vulnerability Guided Mean Fluctuation Adversarial Attack against Conditional Diffusion Models☆11Oct 12, 2024Updated last year
- ☆14Dec 18, 2024Updated last year
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆42Jun 1, 2025Updated 9 months ago
- Source code of NAACL 2025 Findings "Scaling Up Membership Inference: When and How Attacks Succeed on Large Language Models"☆15Dec 16, 2025Updated 3 months ago
- Official implementation of "Data Mixture Inference: What do BPE tokenizers reveal about their training data?"☆18May 15, 2025Updated 10 months ago
- [USENIX Security 2025] SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks☆20Sep 18, 2025Updated 6 months ago
- This repository includes main notebook of the code for our proposed RCGAN☆12Apr 10, 2020Updated 5 years ago
- Boosting Transferability through Enhanced Momentum☆14Feb 23, 2024Updated 2 years ago
- ☆52Feb 24, 2024Updated 2 years ago
- ☆17Jul 18, 2024Updated last year
- With this tiny tool you are able to convert Plantuml code to draw.io element by element. Target format is mxgraph.☆24Mar 6, 2026Updated 2 weeks ago
- An audio steganalysis method based on CNN in the time domain.☆12Feb 25, 2021Updated 5 years ago
- ☆13Jun 10, 2018Updated 7 years ago
- ☆17Sep 23, 2022Updated 3 years ago
- Provably Secure Steganography☆14Sep 13, 2025Updated 6 months ago
- This repository contains code for AdvEWM, as detailed in our paper published in JISA☆18Mar 3, 2026Updated 2 weeks ago
- [CVPR 2024] Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models☆137May 15, 2024Updated last year
- ☆14May 1, 2023Updated 2 years ago
- ☆21May 23, 2025Updated 9 months ago
- [NeurIPS 2025] The official implementation of "T2SMark: Balancing Robustness and Diversity in Noise-as-Watermark for Diffusion Models"☆45Nov 2, 2025Updated 4 months ago
- ☆11Jul 5, 2023Updated 2 years ago
- Latent Watermark: Inject and Detect Watermarks in Latent Diffusion Space☆23Jan 9, 2025Updated last year
- [ICLR 2026] The implementation of paper "AlphaSteer: Learning Refusal Steering with Principled Null-Space Constraint"☆43Nov 20, 2025Updated 4 months ago
- ☆25Apr 15, 2024Updated last year
- Palm vein pattern extraction and analysis, employing two models for feature extraction.☆20Dec 17, 2023Updated 2 years ago
- Effective Prompt Extraction from Language Models☆34Sep 10, 2024Updated last year
- ☆20Jan 15, 2024Updated 2 years ago
- A Computer Vision model that detects guns using YOLOv8☆10May 11, 2023Updated 2 years ago
- Subgraphormer: Unifying Subgraph GNNs and Graph Transformers via Graph Products (ICML 2024)☆11Jul 13, 2024Updated last year