Y-Xiang-hub / AdvEWMLinks
This repository contains code for AdvEWM, as detailed in our paper published in JISA
☆18Updated last year
Alternatives and similar repositories for AdvEWM
Users that are interested in AdvEWM are comparing it to the libraries listed below
Sorting:
- ☆87Updated 4 years ago
- The official implementation of "Intellectual Property Protection of Diffusion Models via the Watermark Diffusion Process"☆21Updated 3 months ago
- Code for Adv-watermark: A novel watermark perturbation for adversarial examples (ACM MM2020)☆41Updated 4 years ago
- Official Implementation for: "RAW: A Robust and Agile Plug-and-Play Watermark Framework for AI-Generated Images (Videos) with Provable Gu…☆29Updated 7 months ago
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆16Updated 9 months ago
- ☆35Updated last year
- SepMark: Deep Separable Watermarking for Unified Source Tracing and Deepfake Detection☆47Updated last year
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆43Updated 2 years ago
- [AAAI 2021] Initiative Defense against Facial Manipulation☆36Updated last year
- This is the source code of paper FIN: Flow-based Robust Watermarking with Invertible Noise Layer for Black-box Distortions, which is rece…☆61Updated 9 months ago
- ☆19Updated last week
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆57Updated last year
- StegaStamp of pytorch version☆63Updated last year
- The codes for the paper "A Novel Two-stage Separable Deep Learning Framework for Practical Blind Watermarking"☆49Updated 5 years ago
- A Watermark-Conditioned Diffusion Model for IP Protection (ECCV 2024)☆31Updated 2 months ago
- The demo of paper "Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry".☆21Updated last year
- This code is the official implementation of WEvade.☆39Updated last year
- All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Model…☆11Updated 8 months ago
- Official Code of "Imperceptible Adversarial Attack via Invertible Neural Networks"☆21Updated 10 months ago
- FangHanNUS / PIMoG-An-Effective-Screen-shooting-Noise-Layer-Simulation-for-Deep-Learning-Based-Watermarking-NetwThis is the code for paper: ``PIMoG : An Effective Screen-shooting Noise-Layer Simulation for Deep-Learning-Based Watermarking Network. .…☆67Updated 2 years ago
- Implementation of IEEE TNNLS 2023 and Elsevier PR 2023 papers on backdoor watermarking for deep classification models with unambiguity an…☆17Updated last year
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆106Updated 2 years ago
- This repository is the official PyTorch implementation of ARWGAN: attention-guided robust image watermarking model based on GAN.☆44Updated last year
- [ICME 2021] Official implementation of "Watermark Faker: Towards Forgery of Digital Image Watermarking".☆23Updated 4 years ago
- Code for paper: "PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification", IEEE S&P 2024.☆32Updated 9 months ago
- ☆23Updated last year
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆35Updated last year
- Official implementation of the ICCV2023 paper: Enhancing Generalization of Universal Adversarial Perturbation through Gradient Aggregatio…☆25Updated last year
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆82Updated 2 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆41Updated 2 years ago