Code for paper: "PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification", IEEE S&P 2024.
☆34Aug 10, 2024Updated last year
Alternatives and similar repositories for PromptCARE
Users that are interested in PromptCARE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo//124.220.228.133:11107☆21Aug 10, 2024Updated last year
- [ICML 2023] Protecting Language Generation Models via Invisible Watermarking☆13Sep 8, 2023Updated 2 years ago
- The demo of paper "Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry".☆25Jun 14, 2023Updated 2 years ago
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆34Jun 29, 2025Updated 9 months ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Website & Documentation: https://sbaresearch.github.io/model-watermarking/☆25Sep 22, 2023Updated 2 years ago
- [CCS'22] SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders☆18Jul 12, 2022Updated 3 years ago
- A Watermark-Conditioned Diffusion Model for IP Protection (ECCV 2024)☆34Apr 5, 2025Updated last year
- This is an unofficial implementation of the Paper by Kejiang Chen et.al. on Gaussian Shading: Provable Performance-Lossless Image Waterma…☆38Aug 6, 2024Updated last year
- Code for paper: "Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures"☆21Jun 6, 2022Updated 3 years ago
- [CVPR 2024] Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models☆139May 15, 2024Updated last year
- This is the official implementation of our paper 'Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protecti…☆58Mar 20, 2024Updated 2 years ago
- This repository is the official PyTorch implementation of ARWGAN: attention-guided robust image watermarking model based on GAN.☆51Jul 10, 2023Updated 2 years ago
- An official implementation of "Rethinking Graph Backdoor Attacks: A Distribution-Preserving Perspective" (KDD 2024)☆12Sep 16, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Latent Watermark: Inject and Detect Watermarks in Latent Diffusion Space☆24Jan 9, 2025Updated last year
- The official implementation of MuST: Robust Image Watermarking for Multi-source Tracing☆26Dec 27, 2023Updated 2 years ago
- [CVPR2025] We present SleeperMark, a novel framework designed to embed resilient watermarks into T2I diffusion models☆39May 26, 2025Updated 10 months ago
- PrivacyAsst: Safeguarding User Privacy in Tool-Using Large Language Model Agents (TDSC 2024)☆19Mar 29, 2024Updated 2 years ago
- [CCS-LAMPS'24] LLM IP Protection Against Model Merging☆16Oct 14, 2024Updated last year
- ☆27May 16, 2023Updated 2 years ago
- Robust natural language watermarking using invariant features☆28Oct 15, 2023Updated 2 years ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year
- Paper 'Towards Blind Watermarking: Combining Invertible and Non-invertible Mechanisms' in ACM Multimedia '22.☆62Jan 15, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆18Mar 15, 2024Updated 2 years ago
- ☆33Jul 18, 2024Updated last year
- source code for "ROBIN: Robust and Invisible Watermarks for Diffusion Models with Adversarial Optimization"☆39Mar 9, 2025Updated last year
- ☆50Feb 27, 2021Updated 5 years ago
- walk2friends: Inferring Social Links from Mobility Profiles☆21Mar 26, 2018Updated 8 years ago
- [S&P'24] Test-Time Poisoning Attacks Against Test-Time Adaptation Models☆19Feb 18, 2025Updated last year
- A PyTorch implementation of "Backdoor Attacks to Graph Neural Networks" (SACMAT'21)☆44Sep 18, 2021Updated 4 years ago
- PyTorch implementation of image hiding networks☆38Dec 8, 2023Updated 2 years ago
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆117May 24, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- PyTorch implementation of “Purified and Unified Steganographic Networks” (CVPR 2024)☆43Jul 14, 2024Updated last year
- This is the code repo of our CVPR2021 on protecting the IPR of Generative Adversarial Networks (GANs) from Ambiguity Attack☆33Oct 17, 2023Updated 2 years ago
- ☆352Mar 21, 2024Updated 2 years ago
- The official implementation of paper "Focused and Collaborative Feedback Integration for Interactive Image Segmentation" in CVPR2023.☆19Jul 20, 2023Updated 2 years ago
- This repository contains the implementation for the paper "AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models v…☆58Sep 2, 2024Updated last year
- The source code of "A Novel Image Tamper Detection and Self-recovery Algorithm Based on Watermarking and Chaotic System"☆11Apr 22, 2021Updated 4 years ago
- The download methods of Vision-language Continual Pretraining Dataset P9D.☆12Jan 3, 2025Updated last year