Y-Xiang-hub / AdvEWM
This repository contains code for AdvEWM, as detailed in our paper published in JISA
☆17Updated last year
Alternatives and similar repositories for AdvEWM:
Users that are interested in AdvEWM are comparing it to the libraries listed below
- Code for Adv-watermark: A novel watermark perturbation for adversarial examples (ACM MM2020)☆40Updated 4 years ago
- ☆88Updated 4 years ago
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆55Updated last year
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆16Updated 7 months ago
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆43Updated 2 years ago
- Official Code of "Imperceptible Adversarial Attack via Invertible Neural Networks"☆19Updated 8 months ago
- The demo of paper "Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry".☆19Updated last year
- [CVPR2023]Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition☆41Updated last year
- StegaStamp of pytorch version☆62Updated last year
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆75Updated 3 years ago
- The official implementation of "Intellectual Property Protection of Diffusion Models via the Watermark Diffusion Process"☆21Updated last month
- This code is the official implementation of WEvade.☆38Updated last year
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆35Updated last year
- This is the source code of paper FIN: Flow-based Robust Watermarking with Invertible Noise Layer for Black-box Distortions, which is rece…☆58Updated 6 months ago
- The MCG black-box attack framework published in TPAMI 2022☆34Updated 2 years ago
- ☆22Updated 2 years ago
- ☆8Updated last year
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆101Updated 2 years ago
- Implementation of IEEE TNNLS 2023 and Elsevier PR 2023 papers on backdoor watermarking for deep classification models with unambiguity an…☆16Updated last year
- Paper 'Towards Blind Watermarking: Combining Invertible and Non-invertible Mechanisms' in ACM Multimedia '22.☆56Updated 2 years ago
- ☆35Updated 10 months ago
- The codes for the paper "A Novel Two-stage Separable Deep Learning Framework for Practical Blind Watermarking"☆48Updated 5 years ago
- The official PyTorch implementation for ICCV'21 Oral paper 'Artificial GAN Fingerprints: Rooting Deepfake Attribution in Training Data'☆76Updated last year
- [ICME 2021] Official implementation of "Watermark Faker: Towards Forgery of Digital Image Watermarking".☆21Updated 3 years ago
- ☆35Updated 3 years ago
- ☆10Updated 3 years ago
- source code for "ROBIN: Robust and Invisible Watermarks for Diffusion Models with Adversarial Optimization"☆21Updated 3 weeks ago
- Code for paper: "PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification", IEEE S&P 2024.☆30Updated 7 months ago
- A PyTorch implementation of universal adversarial perturbation (UAP) which is more easy to understand and implement.☆54Updated 3 years ago
- 深度学习 隐写术;使用神经网络以图藏图(NIPS2017),torch版本 paper:Hiding Images in Plain Sight:Deep Steganography https://papers.nips.cc/paper/2017/hash/838e8…☆22Updated 4 years ago