YangzlTHU / RNN-StegaLinks
☆23Updated 5 years ago
Alternatives and similar repositories for RNN-Stega
Users that are interested in RNN-Stega are comparing it to the libraries listed below
Sorting:
- ☆33Updated 2 years ago
- ☆25Updated 5 years ago
- ☆25Updated 3 years ago
- ☆20Updated 3 years ago
- collection of the SOTA linguistic steganalysis methods☆25Updated last year
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆43Updated 2 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Updated 2 years ago
- Implementation of "Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model"☆27Updated 4 years ago
- ☆18Updated 4 years ago
- Implementation for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder (EMNLP-Findings 2020)☆15Updated 4 years ago
- [EMNLP'22] Textual Manifold-based Defense Against Natural Language Adversarial Examples☆11Updated 2 years ago
- ☆25Updated 4 years ago
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆24Updated 3 years ago
- ☆11Updated 2 weeks ago
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆23Updated 3 years ago
- Watermarking Text Generated by Black-Box Language Models☆39Updated last year
- Generating Natural Language Adversarial Examples through Probability Weighted Word Saliency☆71Updated 2 years ago
- DP-Rewrite: Towards Reproducibility and Transparency in Differentially Private Text Rewriting☆14Updated 2 years ago
- For Certified Robustness to Text Adversarial Attacks by Randomized [MASK]☆16Updated 10 months ago
- Adversarial Training with Fast Gradient Projection Method against Synonym Substitution based Text Attacks☆24Updated 4 years ago
- Code and data of the ACL 2021 paper "Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution"☆16Updated 4 years ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆38Updated 3 months ago
- Code for the paper "Weight Poisoning Attacks on Pre-trained Models" (ACL 2020)☆143Updated 3 years ago
- Contextualized Perturbation for Textual Adversarial Attack, NAACL 2021☆43Updated 4 years ago
- Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"☆42Updated 2 years ago
- Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020☆23Updated 4 years ago
- Adversarial examples for Seq2Seq model in NLP☆40Updated 6 years ago
- ☆14Updated last year
- Code for EMNLP2020 long paper: BERT-Attack: Adversarial Attack Against BERT Using BERT☆200Updated 4 years ago
- Code for the paper "Be Careful about Poisoned Word Embeddings: Exploring the Vulnerability of the Embedding Layers in NLP Models" (NAACL-…☆41Updated 4 years ago