dl970220 / Reversible-Image-Watermarking-Using-Interpolation-TechniqueLinks
可逆水印论文复现
☆10Updated 6 years ago
Alternatives and similar repositories for Reversible-Image-Watermarking-Using-Interpolation-Technique
Users that are interested in Reversible-Image-Watermarking-Using-Interpolation-Technique are comparing it to the libraries listed below
Sorting:
- paper code☆28Updated 5 years ago
- Paper collection of federated learning. Conferences and Journals Collection for Federated Learning from 2019 to 2021, Accepted Papers, Ho…☆94Updated 3 years ago
- Webank AI☆42Updated 11 months ago
- The reproduction of the paper Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning.☆63Updated 3 years ago
- ICML 2022 code for "Neurotoxin: Durable Backdoors in Federated Learning" https://arxiv.org/abs/2206.10341☆83Updated 2 years ago
- This is a simple backdoor model for federated learning.We use MNIST as the original data set for data attack and we use CIFAR-10 data set…☆14Updated 5 years ago
- reproduce the FLTrust model based on the paper "FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping"☆33Updated 3 years ago
- ☆25Updated 2 months ago
- ☆35Updated 4 years ago
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆86Updated 2 years ago
- edu-yinzhaoxia / Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-CodingThis code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆29Updated 5 years ago
- ☆54Updated 2 years ago
- [Usenix Security 2024] Official code implementation of "BackdoorIndicator: Leveraging OOD Data for Proactive Backdoor Detection in Federa…☆49Updated 5 months ago
- ☆25Updated 4 years ago
- 基于《A Little Is Enough: Circumventing Defenses For Distributed Learning》的联邦学习攻击模型☆65Updated 5 years ago
- ☆37Updated 4 years ago
- ☆19Updated 5 years ago
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆117Updated 2 years ago
- [ACM Computing Survey 2025] Vertical Federated Learning for Effectiveness, Security, Applicability: A Survey, by MARS Group at Wuhan Univ…☆22Updated 10 months ago
- [ICML 2023] Official code implementation of "Chameleon: Adapting to Peer Images for Planting Durable Backdoors in Federated Learning (htt…☆43Updated 5 months ago
- ☆46Updated 2 years ago
- The official code of KDD22 paper "FLDetecotor: Defending Federated Learning Against Model Poisoning Attacks via Detecting Malicious Clien…☆85Updated 2 years ago
- ☆200Updated last year
- ☆75Updated 5 years ago
- ☆18Updated last year
- Implementation of BapFL: You can Backdoor Attack Personalized Federated Learning☆15Updated 2 years ago
- Differentially private federated learning: A systematic review (ACM Survey); Adap dp-fl: Differentially private federated learning with a…☆379Updated 5 months ago
- ☆35Updated 4 years ago
- Code for NDSS 2021 Paper "Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses Against Federated Learning"☆148Updated 3 years ago
- Github Repo for AAAI 2023 paper: On the Vulnerability of Backdoor Defenses for Federated Learning☆41Updated 2 years ago