comydream / provably-secure-steganographyLinks
Provably Secure Steganography
☆12Updated last month
Alternatives and similar repositories for provably-secure-steganography
Users that are interested in provably-secure-steganography are comparing it to the libraries listed below
Sorting:
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆40Updated 5 months ago
- ☆10Updated 2 years ago
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆117Updated 2 years ago
- Image steganography usings Generative Adverserial Networks☆41Updated last year
- ☆27Updated 4 years ago
- Website & Documentation: https://sbaresearch.github.io/model-watermarking/☆24Updated 2 years ago
- ☆61Updated last year
- ☆13Updated 2 years ago
- The code of "dp-promise: Differentially Private Diffusion Probabilistic Models for Image Synthesis"☆20Updated last year
- The project code is the Source code of the paper "Payload-Independent Direct Cost Learning for Image Steganography"☆13Updated 2 years ago
- [TDSC 2024] Official code for our paper "FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model"☆21Updated 5 months ago
- ☆25Updated 5 years ago
- ☆24Updated 2 years ago
- ☆27Updated 2 years ago
- ☆44Updated 3 years ago
- [ICML 2023] Official code implementation of "Chameleon: Adapting to Peer Images for Planting Durable Backdoors in Federated Learning (htt…☆42Updated last month
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆82Updated 2 years ago
- ☆14Updated last year
- Webank AI☆43Updated 8 months ago
- ☆54Updated 2 years ago
- Pytorch implementation of Backdoor Attack against Speaker Verification☆27Updated 2 years ago
- This Github repository summarizes a list of research papers on AI security from the four top academic conferences.☆159Updated 5 months ago
- Local Differential Privacy for Federated Learning☆17Updated 3 years ago
- ☆14Updated last year
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆44Updated 11 months ago
- A Pytroch Implementation of Some Backdoor Attack Algorithms, Including BadNets, SIG, FIBA, FTrojan ...☆20Updated 10 months ago
- KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems☆18Updated 2 years ago
- ☆552Updated 3 months ago
- The official code of KDD22 paper "FLDetecotor: Defending Federated Learning Against Model Poisoning Attacks via Detecting Malicious Clien…☆84Updated 2 years ago
- [ACM MM 24] GROOT:Generating Robust Watermark for Diffusion-Model-Based Audio Synthesis☆17Updated 7 months ago