comydream / provably-secure-steganographyLinks
Provably Secure Steganography
☆10Updated 3 months ago
Alternatives and similar repositories for provably-secure-steganography
Users that are interested in provably-secure-steganography are comparing it to the libraries listed below
Sorting:
- ☆10Updated last year
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆38Updated 3 months ago
- ☆13Updated 2 years ago
- Image steganography usings Generative Adverserial Networks☆41Updated 10 months ago
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆116Updated 2 years ago
- Website & Documentation: https://sbaresearch.github.io/model-watermarking/☆24Updated last year
- ☆25Updated 3 years ago
- ☆60Updated 10 months ago
- [Usenix Security 2024] Official code implementation of "BackdoorIndicator: Leveraging OOD Data for Proactive Backdoor Detection in Federa…☆41Updated 11 months ago
- ☆19Updated last year
- a Pytorch library for security research on speaker recognition, released in "Towards Understanding and Mitigating Audio Adversarial Examp…☆41Updated 9 months ago
- Local Differential Privacy for Federated Learning☆17Updated 2 years ago
- ☆16Updated 7 months ago
- ☆52Updated 2 years ago
- The project code is the Source code of the paper "Payload-Independent Direct Cost Learning for Image Steganography"☆13Updated last year
- ☆24Updated last year
- ☆11Updated 6 months ago
- Implementation of IEEE TNNLS 2023 and Elsevier PR 2023 papers on backdoor watermarking for deep classification models with unambiguity an…☆18Updated 2 years ago
- [ICML 2023] Official code implementation of "Chameleon: Adapting to Peer Images for Planting Durable Backdoors in Federated Learning (htt…☆42Updated 7 months ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Updated 5 years ago
- ☆14Updated 2 years ago
- These are the codes for paper "Learning to Generate Steganographic Cover for Audio Steganography using GAN"☆15Updated 4 years ago
- The official code of KDD22 paper "FLDetecotor: Defending Federated Learning Against Model Poisoning Attacks via Detecting Malicious Clien…☆84Updated 2 years ago
- ☆16Updated last year
- ☆32Updated 4 years ago
- ☆25Updated 5 years ago
- The implement of paper "How to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNN…☆25Updated 4 years ago
- Pytorch implementation of Backdoor Attack against Speaker Verification☆26Updated last year
- Watermarking Deep Neural Networks (USENIX 2018)☆98Updated 5 years ago
- Webank AI☆41Updated 6 months ago