YangzlTHU / RNN-StegaLinks
☆21Updated 5 years ago
Alternatives and similar repositories for RNN-Stega
Users that are interested in RNN-Stega are comparing it to the libraries listed below
Sorting:
- ☆24Updated 5 years ago
- ☆33Updated 2 years ago
- ☆26Updated 3 years ago
- ☆20Updated 3 years ago
- collection of the SOTA linguistic steganalysis methods☆24Updated last year
- ☆11Updated 3 months ago
- Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020☆22Updated 4 years ago
- Implementation of "Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model"☆26Updated 4 years ago
- ☆11Updated 3 months ago
- Website & Documentation: https://sbaresearch.github.io/model-watermarking/☆24Updated last year
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆37Updated 3 weeks ago
- ☆21Updated 4 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Updated 5 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Updated 2 years ago
- Code and data of the ACL 2021 paper "Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution"☆16Updated 3 years ago
- Hidden backdoor attack on NLP systems☆47Updated 3 years ago
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆24Updated 3 years ago
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆43Updated 2 years ago
- TextGuard: Provable Defense against Backdoor Attacks on Text Classification☆12Updated last year
- Implementation of IEEE TNNLS 2023 and Elsevier PR 2023 papers on backdoor watermarking for deep classification models with unambiguity an…☆18Updated last year
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆19Updated 3 years ago
- The implement of paper "How to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNN…☆24Updated 4 years ago
- ☆25Updated 4 years ago
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆24Updated 3 years ago
- Code for paper: "PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification", IEEE S&P 2024.☆32Updated 10 months ago
- This code is the official implementation of WEvade.☆39Updated last year
- Watermarking Text Generated by Black-Box Language Models☆38Updated last year
- Source code of paper "An Unforgeable Publicly Verifiable Watermark for Large Language Models" accepted by ICLR 2024☆35Updated last year
- Implementation of several Steganography and steganalysis techniques.☆48Updated last year
- A Siamese CNN for Image Steganalysis☆73Updated 4 years ago