☆14Jan 21, 2025Updated last year
Alternatives and similar repositories for publicly-detectable-watermark
Users that are interested in publicly-detectable-watermark are comparing it to the libraries listed below
Sorting:
- Data Banzhaf: A Robust Data Valuation Framework for Machine Learning (AISTATS 2023 Oral)☆18Oct 15, 2023Updated 2 years ago
- A Data-Driven Approach to Predict the Success of Bank Telemarketing☆10Apr 27, 2021Updated 4 years ago
- Guide to interviewing for industry machine learning roles (data/applied/research scientist, ML engineer, etc).☆11Dec 28, 2022Updated 3 years ago
- ☆10Jul 16, 2023Updated 2 years ago
- A collection of demos and utilities prepared ahead of the Vector Institute Privacy Enhancing Techniques (PETs) Bootcamp.☆15Sep 22, 2022Updated 3 years ago
- [ICDCS 2023] Evaluation and Optimization of Gradient Compression for Distributed Deep Learning☆10Apr 28, 2023Updated 2 years ago
- Mixture of Expert (MoE) techniques for enhancing LLM performance through expert-driven prompt mapping and adapter combinations.☆12Feb 11, 2024Updated 2 years ago
- List Flower resources☆12Feb 4, 2022Updated 4 years ago
- ☆10Dec 18, 2024Updated last year
- SpaceHASTEN: A structure-based virtual screening tool for non-enumerated virtual chemical libraries☆15Feb 12, 2026Updated 3 weeks ago
- ☆10Jun 1, 2022Updated 3 years ago
- ☆23Jan 6, 2026Updated 2 months ago
- [CVPR 2025] Harnessing Frequency Spectrum Insights for Image Copyright Protection Against Diffusion Models☆12Sep 16, 2025Updated 5 months ago
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- a jax benchmark for ad hoc teamwork☆19Updated this week
- Official PyTorch implementation of "MM-PoisonRAG: Disrupting Multimodal RAG with Local and Global Poisoning Attacks"☆12Dec 4, 2025Updated 3 months ago
- ☆11Nov 13, 2024Updated last year
- 大数中医☆11Jul 10, 2024Updated last year
- Codes for scientific charts☆12Dec 30, 2025Updated 2 months ago
- Repo containing few notebooks on fine tuning of Language Models☆13Apr 29, 2024Updated last year
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆15Mar 29, 2024Updated last year
- Injecting watermarks to protein sequences for privacy protection in biosecurity☆10Oct 1, 2024Updated last year
- ☆13May 9, 2024Updated last year
- ☆11Jul 12, 2021Updated 4 years ago
- A challenge to investigate the security of the InstaHide protocol.☆12Dec 7, 2020Updated 5 years ago
- Source Code for "Adapters for Enhanced Modeling of Multilingual Knowledge and Text"☆12Oct 28, 2022Updated 3 years ago
- Implementation of VQ-VAE with a GPT-style sampler in the JAX and Haiku ecosystem.☆12Nov 23, 2023Updated 2 years ago
- This course introduced me to three cutting-edge technologies for privacy-preserving AI: Federated Learning, Differential Privacy, and Enc…☆11Sep 2, 2019Updated 6 years ago
- ☆11Mar 20, 2022Updated 3 years ago
- MCM 2017☆17Jan 28, 2017Updated 9 years ago
- Completely remove Gemini’s SynthID security so it can’t detect that your image was made with AI. Simply clone the repository locally, run…☆28Dec 10, 2025Updated 2 months ago
- A comprehensive overview of Data Distillation and Condensation (DDC). DDC is a data-centric task where a representative (i.e., small but …☆13Dec 1, 2022Updated 3 years ago
- ☆12Jun 2, 2023Updated 2 years ago
- Official code for DAM: Dynamic Adapter Merging for Continual Video QA Learning☆14Apr 25, 2024Updated last year
- Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing☆14Feb 18, 2021Updated 5 years ago
- An implementation of online data mixing for the Pile dataset, based on the GPT-NeoX library.☆13Jan 9, 2024Updated 2 years ago
- Code and data release of the paper Enhancing LLM Complex Problem-Solving with Hybrid Thinking and Dynamic Workflows☆14Oct 4, 2024Updated last year
- ☆18Apr 7, 2025Updated 10 months ago
- [ICML 2024] DPZero: Private Fine-Tuning of Language Models without Backpropagation☆16Sep 4, 2024Updated last year