☆23Jun 1, 2020Updated 5 years ago
Alternatives and similar repositories for RNN-Stega
Users that are interested in RNN-Stega are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- collection of the SOTA linguistic steganalysis methods☆28Dec 29, 2023Updated 2 years ago
- ☆19Sep 27, 2021Updated 4 years ago
- Implementation of "Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model"☆26Apr 21, 2021Updated 4 years ago
- Text steganography based on Markov chains☆35Mar 1, 2014Updated 12 years ago
- ☆27Sep 9, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Image steganography usings Generative Adverserial Networks☆43Oct 12, 2024Updated last year
- The source code for "A Simple Graph Contrastive Learning Framework for Short Text Classification"☆13Aug 14, 2025Updated 7 months ago
- ☆11Sep 14, 2022Updated 3 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- Paper To Code implementation of NVIDIA's GauGan on a custom Landscape 's Dataset. Generating photorealistic-ish:p images from drawings☆12May 6, 2022Updated 3 years ago
- 班级魔方 定位签到&扫码签到&密码签到 || 全天自动签到 || 支持手动签到☆11Apr 7, 2024Updated last year
- Scripts to prepare OXFORD VGG Face dataset☆12Mar 29, 2016Updated 10 years ago
- Generalized Data-free Universal Adversarial Perturbations in PyTorch☆20Oct 9, 2020Updated 5 years ago
- Generation tool for offset-resistant audio adversarial examples against Deepspeech☆10Oct 5, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- The project code is the Source code of the paper "Payload-Independent Direct Cost Learning for Image Steganography"☆13Oct 19, 2023Updated 2 years ago
- StegTransX: A Lightweight Deep Steganography Method for High-Capacity Hiding and JPEG Compression Resistance☆18May 18, 2025Updated 10 months ago
- A Fine-grained Differentially Private Federated Learning against Leakage from Gradients☆15Jan 18, 2023Updated 3 years ago
- Official pytorch implementation of paper "Image Disentanglement Autoencoder for Steganography without Embedding" (CVPR2022).☆52Nov 16, 2022Updated 3 years ago
- A distortion limiting approach to Syndrome-Trellis Coding.☆19Mar 7, 2023Updated 3 years ago
- ☆14Mar 16, 2020Updated 6 years ago
- STEGASURAS: STEGanography via Arithmetic coding and Strong neURAl modelS☆205Jun 18, 2025Updated 9 months ago
- Generative model for 3D objects.☆18Aug 12, 2023Updated 2 years ago
- Official Implementation of Knowledge Flow Prompting☆35Oct 20, 2025Updated 5 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Local Differential Privacy for Federated Learning☆19Oct 24, 2022Updated 3 years ago
- Incredible acceleration with pruning or the other compression techniques☆13Jul 7, 2021Updated 4 years ago
- A Tensorflow LSTM spam detector utilizing GloVe word embeddings.☆12Nov 9, 2019Updated 6 years ago
- load vgg-face pre-trained caffe model using pytorch☆18Jun 11, 2018Updated 7 years ago
- ☆15Sep 6, 2020Updated 5 years ago
- Code for novel methods for one-shot Federated Learning under high statistical heterogeneity.☆18Oct 2, 2023Updated 2 years ago
- It demonstrates the example of text classification and text clustering using K-NN and K-Means models based on tf-idf features.☆16Jan 18, 2018Updated 8 years ago
- A structurally comprehensive dataset of AMR-to-text alignments for coverage of a larger variety of linguistic phenomena, for research rel…☆16Dec 10, 2022Updated 3 years ago
- ☆16Dec 3, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- AMR-parser. Code for EMNLP2019 paper "Core Semantic First: A Top-down Approach for AMR Parsing."☆11Feb 23, 2020Updated 6 years ago
- Publicly Accountable Fine-Grained Blockchain Rewriting in Permissionless Setting☆17Feb 22, 2022Updated 4 years ago
- A comprehensive benchmark for Twitter bot detection. CIKM 2021.☆62Oct 16, 2022Updated 3 years ago
- Builds a WMT18-like corpus for word-level QE with annotations in the source and target words.☆10Sep 19, 2022Updated 3 years ago
- This code is the official implementation of paper "Certifiably Robust Image Watermark".☆15Aug 7, 2024Updated last year
- Group Gated Fusion on Attention-based Bidirectional Alignment for Multimodal Emotion Recognition☆14May 10, 2022Updated 3 years ago
- ☆13Jun 15, 2021Updated 4 years ago