Y-Xiang-hub / AdvEWM
This repository contains code for AdvEWM, as detailed in our paper published in JISA
☆16Updated last year
Alternatives and similar repositories for AdvEWM:
Users that are interested in AdvEWM are comparing it to the libraries listed below
- Code for Adv-watermark: A novel watermark perturbation for adversarial examples (ACM MM2020)☆41Updated 4 years ago
- The official implementation of "Intellectual Property Protection of Diffusion Models via the Watermark Diffusion Process"☆20Updated last year
- ☆83Updated 3 years ago
- ☆30Updated 3 years ago
- ☆10Updated 3 years ago
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆16Updated 4 months ago
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆54Updated last year
- Official Code of "Imperceptible Adversarial Attack via Invertible Neural Networks"☆19Updated 5 months ago
- PyTorch implementation of “Purified and Unified Steganographic Networks” (CVPR 2024)☆35Updated 6 months ago
- ☆33Updated 7 months ago
- Paper 'Towards Blind Watermarking: Combining Invertible and Non-invertible Mechanisms' in ACM Multimedia '22.☆51Updated 2 years ago
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆25Updated 10 months ago
- This is the code repo of our CVPR2021 on protecting the IPR of Generative Adversarial Networks (GANs) from Ambiguity Attack☆31Updated last year
- ☆13Updated 5 years ago
- The codes for the paper "A Novel Two-stage Separable Deep Learning Framework for Practical Blind Watermarking"☆46Updated 4 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆36Updated 2 years ago
- Official repository for CVPR 2022 paper 'Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution'☆25Updated 2 years ago
- The MCG black-box attack framework published in TPAMI 2022☆34Updated 2 years ago
- Official repository for the paper "Towards Robust Data Hiding Against (JPEG) Compression: A Pseudo-Differentiable Deep Learning Approach"…☆29Updated 4 years ago
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆28Updated 10 months ago
- This is the source code of paper FIN: Flow-based Robust Watermarking with Invertible Noise Layer for Black-box Distortions, which is rece…☆56Updated 4 months ago
- This code is the official implementation of WEvade.☆38Updated 10 months ago
- ☆33Updated 6 months ago
- SepMark: Deep Separable Watermarking for Unified Source Tracing and Deepfake Detection☆41Updated 10 months ago
- 深度学习 隐写术;使用神经网络以图藏图(NIPS2017),torch版本 paper:Hiding Images in Plain Sight:Deep Steganography https://papers.nips.cc/paper/2017/hash/838e8…☆18Updated 4 years ago
- 使用pytorch实现FGSM☆29Updated 3 years ago
- ☆22Updated last year
- Code for our NeurIPS 2020 paper Practical No-box Adversarial Attacks against DNNs.☆33Updated 4 years ago
- ☆21Updated 2 years ago
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆23Updated 3 years ago