comydream / provably-secure-steganographyLinks
Provably Secure Steganography
☆12Updated 3 months ago
Alternatives and similar repositories for provably-secure-steganography
Users that are interested in provably-secure-steganography are comparing it to the libraries listed below
Sorting:
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆118Updated 2 years ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆40Updated 6 months ago
- ☆10Updated 2 years ago
- [ACM MM 24] GROOT:Generating Robust Watermark for Diffusion-Model-Based Audio Synthesis☆20Updated 8 months ago
- Website & Documentation: https://sbaresearch.github.io/model-watermarking/☆25Updated 2 years ago
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆45Updated last year
- ☆63Updated last year
- Implementation of IEEE TNNLS 2023 and Elsevier PR 2023 papers on backdoor watermarking for deep classification models with unambiguity an…☆19Updated 2 years ago
- The code of "dp-promise: Differentially Private Diffusion Probabilistic Models for Image Synthesis"☆23Updated last year
- [TDSC 2024] Official code for our paper "FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model"☆21Updated 7 months ago
- ☆17Updated last year
- The project code is the Source code of the paper "Payload-Independent Direct Cost Learning for Image Steganography"☆13Updated 2 years ago
- ☆13Updated 2 years ago
- ☆27Updated 4 years ago
- [ICML 2023] Official code implementation of "Chameleon: Adapting to Peer Images for Planting Durable Backdoors in Federated Learning (htt…☆43Updated 3 months ago
- Code for Backdoor Attacks Against Dataset Distillation☆35Updated 2 years ago
- Code and full version of the paper "Hijacking Attacks against Neural Network by Analyzing Training Data"☆14Updated last year
- Pytorch implementation of Backdoor Attack against Speaker Verification☆27Updated 2 years ago
- The implementation of the IEEE S&P 2024 paper MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Us…☆17Updated last year
- Local Differential Privacy for Federated Learning☆19Updated 3 years ago
- Image steganography usings Generative Adverserial Networks☆41Updated last year
- unformal implementation of advdiffuser☆16Updated last year
- ☆55Updated 2 years ago
- ☆12Updated last month
- Source code and scripts for the paper "Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks"☆20Updated last year
- IBA: Towards Irreversible Backdoor Attacks in Federated Learning (Poster at NeurIPS 2023)☆39Updated 3 months ago
- Webank AI☆42Updated 10 months ago
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆87Updated 2 years ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆34Updated 2 years ago
- ☆30Updated 2 years ago