Implementation of "Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model"
☆26Apr 21, 2021Updated 4 years ago
Alternatives and similar repositories for steganography-with-masked-lm
Users that are interested in steganography-with-masked-lm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- collection of the SOTA linguistic steganalysis methods☆28Dec 29, 2023Updated 2 years ago
- ☆26Jun 1, 2020Updated 5 years ago
- ☆23Jun 1, 2020Updated 5 years ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆42Jun 1, 2025Updated 9 months ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Nov 15, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Steganographic text via language models☆25Nov 21, 2022Updated 3 years ago
- An official implementation of the paper "Addressing Segmentation Ambiguity in Neural Linguistic Steganography"☆14Nov 12, 2022Updated 3 years ago
- Text steganography based on Markov chains☆35Mar 1, 2014Updated 12 years ago
- ☆19Sep 27, 2021Updated 4 years ago
- ☆12Mar 3, 2025Updated last year
- Group Gated Fusion on Attention-based Bidirectional Alignment for Multimodal Emotion Recognition☆14May 10, 2022Updated 3 years ago
- 该课题为基于MATLAB的数字水印系统。包括离散余弦DCT和小波变换DWT两种算法的对比,有一个GUI界面,包括嵌入,加噪,旋转,剪切,压缩等多种攻击,提取候,具有评价指标PSNR,NC等来评价算法的鲁棒性。☆19Jan 10, 2021Updated 5 years ago
- Spectrogram is selected as preprocessing feature of audio clips and a feature representation method based on deep residual network (Spec-…☆26Sep 13, 2020Updated 5 years ago
- Learning Iterative Neural Optimizers for Image Steganography☆23Jun 24, 2025Updated 9 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- [ICML 2023] Protecting Language Generation Models via Invisible Watermarking☆13Sep 8, 2023Updated 2 years ago
- The implement of paper "How to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNN…☆25Jan 30, 2021Updated 5 years ago
- text generation from keywords using transformer model☆12Nov 2, 2019Updated 6 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Neural network sequence labeling model☆11Dec 28, 2019Updated 6 years ago
- Geodesic updates for Nickel & Kiela's graph embedding algorithm in hyperbolic space.☆11Jun 6, 2018Updated 7 years ago
- A Tree-LSTM-based dependency tree sentiment labeler☆15May 9, 2019Updated 6 years ago
- The Word Embedding Database API☆11Aug 20, 2019Updated 6 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Code for the AACL 2022 Paper "This Patient Looks Like That Patient: Prototypical Networks for Interpretable Diagnosis Prediction from Cli…☆12Nov 18, 2022Updated 3 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- ☆11Mar 23, 2026Updated last week
- DiffWA: Diffusion Models for Watermark Attack☆10Apr 23, 2024Updated last year
- [TNNLS, to appear] FET-LM: Flow Enhanced Variational Auto-Encoder for Topic-Guided Language Modeling PyTorch Implementation☆14Mar 4, 2023Updated 3 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- A curated list of 150+ papers and resources on Agentic Security. Based on the survey covering the transition from passive LLMs to autonom…☆33Dec 6, 2025Updated 3 months ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Learning Fine-Grained Cross Modality Excitement for Speech Emotion Recognition☆31Dec 16, 2021Updated 4 years ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆15Mar 29, 2024Updated 2 years ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated last month
- This repository contains data and code used for On the Risk of Misinformation Pollution with Large Language Models (EMNLP 2023 Findings).☆16Dec 14, 2023Updated 2 years ago
- Yahoo! news dataset of DeepCom (EMNLP2019)☆18Jan 21, 2021Updated 5 years ago
- A Python implementation of HMAC_DRBG (see, NiST SP 800-90A).☆14Nov 18, 2015Updated 10 years ago
- Code for our paper in ACL 2017☆13Dec 14, 2017Updated 8 years ago