ghua-ac / DNN_WatermarkLinks
Implementation of IEEE TNNLS 2023 and Elsevier PR 2023 papers on backdoor watermarking for deep classification models with unambiguity and deep fidelity.
☆17Updated last year
Alternatives and similar repositories for DNN_Watermark
Users that are interested in DNN_Watermark are comparing it to the libraries listed below
Sorting:
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆13Updated last year
- ☆16Updated 3 years ago
- ☆17Updated 3 years ago
- ☆18Updated last year
- ☆19Updated 3 years ago
- The implement of paper "How to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNN…☆24Updated 4 years ago
- ☆19Updated 2 years ago
- This is the implementation of our paper 'Open-sourced Dataset Protection via Backdoor Watermarking', accepted by the NeurIPS Workshop on …☆21Updated 3 years ago
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆29Updated 7 months ago
- Website & Documentation: https://sbaresearch.github.io/model-watermarking/☆23Updated last year
- ☆44Updated last year
- Invisible Backdoor Attack with Sample-Specific Triggers☆94Updated 2 years ago
- Defending against Model Stealing via Verifying Embedded External Features☆36Updated 3 years ago
- [CVPR 2023] Backdoor Defense via Adaptively Splitting Poisoned Dataset☆49Updated last year
- A minimal PyTorch implementation of Label-Consistent Backdoor Attacks☆30Updated 4 years ago
- Code for "Label-Consistent Backdoor Attacks"☆57Updated 4 years ago
- [CVPR 2023] The official implementation of our CVPR 2023 paper "Detecting Backdoors During the Inference Stage Based on Corruption Robust…☆23Updated 2 years ago
- ☆15Updated last year
- ☆21Updated 4 years ago
- This is the official implementation of our paper 'Black-box Dataset Ownership Verification via Backdoor Watermarking'.☆25Updated last year
- ☆25Updated 2 years ago
- The official implementation of the paper "Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks".☆19Updated last year
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆24Updated 3 years ago
- ☆38Updated 3 years ago
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆37Updated 7 months ago
- All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Model…☆11Updated 8 months ago
- [ACM MM 2023] Improving the Transferability of Adversarial Examples with Arbitrary Style Transfer.☆19Updated last year
- Official Implementation for: "RAW: A Robust and Agile Plug-and-Play Watermark Framework for AI-Generated Images (Videos) with Provable Gu…☆29Updated 7 months ago
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆115Updated 2 years ago
- ☆16Updated 2 years ago