comydream / Discop
Provably Secure Steganography in Practice Based on “Distribution Copies”
☆30Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for Discop
- ☆11Updated last year
- ☆23Updated 3 years ago
- ☆24Updated 4 years ago
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆104Updated last year
- Website & Documentation: https://sbaresearch.github.io/model-watermarking/☆20Updated last year
- ☆38Updated 3 weeks ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆48Updated 2 years ago
- Code for paper: "PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification", IEEE S&P 2024.☆28Updated 3 months ago
- [CVPR 2024] Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models☆69Updated 6 months ago
- Repository for Towards Codable Watermarking for Large Language Models☆29Updated last year
- Invisible Backdoor Attack with Sample-Specific Triggers☆91Updated 2 years ago
- ☆46Updated 8 months ago
- [MM'23 Oral] "Text-to-image diffusion models can be easily backdoored through multimodal data poisoning"☆22Updated 2 months ago
- This is the source code of paper MBRS : Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compressi…☆86Updated 4 months ago
- This is the source code of paper FIN: Flow-based Robust Watermarking with Invertible Noise Layer for Black-box Distortions, which is rece…☆48Updated 2 months ago
- The official implementation of "Intellectual Property Protection of Diffusion Models via the Watermark Diffusion Process"☆18Updated 11 months ago
- Pytorch implementation of Backdoor Attack against Speaker Verification☆23Updated last year
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆24Updated last month
- Robust natural language watermarking using invariant features☆25Updated last year
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆113Updated last week
- Implementation of IEEE TNNLS 2023 and Elsevier PR 2023 papers on backdoor watermarking for deep classification models with unambiguity an…☆14Updated last year
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆31Updated 5 years ago
- ☆30Updated 2 years ago
- ☆16Updated last year
- This code is the official implementation of WEvade.☆37Updated 8 months ago
- This is the official implementation of our paper 'Black-box Dataset Ownership Verification via Backdoor Watermarking'.☆24Updated last year
- A list of papers in NeurIPS 2022 related to adversarial attack and defense / AI security.☆69Updated last year
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆82Updated 2 months ago
- Official Pytorch implementation for "Transferable Adversarial Attacks on Vision Transformers with Token Gradient Regularization" (CVPR 20…☆25Updated last year
- Source code of paper "An Unforgeable Publicly Verifiable Watermark for Large Language Models" accepted by ICLR 2024☆28Updated 5 months ago