[MM'23] ProTegO: Protect Text Content against OCR Extraction Attack
☆14Mar 12, 2024Updated 2 years ago
Alternatives and similar repositories for ProTegO
Users that are interested in ProTegO are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code for ECML/PKDD 2020 paper "FAWA: Fast Adversarial Watermark Attack on Optical Character Recognition (OCR) Systems"☆23Dec 27, 2020Updated 5 years ago
- ☆22Jul 26, 2025Updated 9 months ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆15Mar 29, 2024Updated 2 years ago
- ☆14Feb 21, 2025Updated last year
- Pytorch implementation for the pilot study on the robustness of latent diffusion models.☆12Jun 20, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The extension of "Patch-wise Attack for Fooling Deep Neural Network (ECCV2020)", and we aim to boost the success rates of targeted attack…☆28Mar 14, 2022Updated 4 years ago
- [ICLR 2025] A Closer Look at Machine Unlearning for Large Language Models☆49Dec 4, 2024Updated last year
- [TDSC 2025] InferDPT: Privacy-Preserving Inference for Closed-box Large Language Model☆43Nov 16, 2025Updated 6 months ago
- PyTorch implementation of the paper: CASAGPT: Cuboid Arrangement and Scene Assembly for Interior Design [CVPR 2025]☆14Apr 5, 2025Updated last year
- ☆11May 18, 2025Updated last year
- (AAAI 24) Step Vulnerability Guided Mean Fluctuation Adversarial Attack against Conditional Diffusion Models☆11Oct 12, 2024Updated last year
- LiveSecBench:动态中文大模型安全榜单☆28Mar 9, 2026Updated 2 months ago
- ☆15Dec 18, 2024Updated last year
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆56Jun 1, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Source code of NAACL 2025 Findings "Scaling Up Membership Inference: When and How Attacks Succeed on Large Language Models"☆15Dec 16, 2025Updated 5 months ago
- Official implementation of "Data Mixture Inference: What do BPE tokenizers reveal about their training data?"☆18May 15, 2025Updated last year
- [USENIX Security 2025] SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks☆21Sep 18, 2025Updated 8 months ago
- This repository includes main notebook of the code for our proposed RCGAN☆12Apr 10, 2020Updated 6 years ago
- Boosting Transferability through Enhanced Momentum☆14Feb 23, 2024Updated 2 years ago
- ☆55Feb 24, 2024Updated 2 years ago
- ☆19Jul 18, 2024Updated last year
- With this tiny tool you are able to convert Plantuml code to draw.io element by element. Target format is mxgraph.☆25Mar 6, 2026Updated 2 months ago
- An audio steganalysis method based on CNN in the time domain.☆12Feb 25, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆13Jun 10, 2018Updated 7 years ago
- ☆17Sep 23, 2022Updated 3 years ago
- Provably Secure Steganography☆27Sep 13, 2025Updated 8 months ago
- This repository contains code for AdvEWM, as detailed in our paper published in JISA☆18Mar 3, 2026Updated 2 months ago
- ☆14May 1, 2023Updated 3 years ago
- ☆22May 23, 2025Updated 11 months ago
- [CVPR 2024] Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models☆144May 15, 2024Updated 2 years ago
- ☆11Jul 5, 2023Updated 2 years ago
- Latent Watermark: Inject and Detect Watermarks in Latent Diffusion Space☆26Jan 9, 2025Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆27Apr 15, 2024Updated 2 years ago
- Palm vein pattern extraction and analysis, employing two models for feature extraction.☆21Dec 17, 2023Updated 2 years ago
- Effective Prompt Extraction from Language Models☆40Sep 10, 2024Updated last year
- A Computer Vision model that detects guns using YOLOv8☆10May 11, 2023Updated 3 years ago
- Subgraphormer: Unifying Subgraph GNNs and Graph Transformers via Graph Products (ICML 2024)☆11Jul 13, 2024Updated last year
- ☆11Aug 14, 2024Updated last year
- Benchmarking MIAs against LLMs.☆28Oct 8, 2024Updated last year