ku-nlp / steganography-with-masked-lm
Implementation of "Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model"
☆25Updated 3 years ago
Alternatives and similar repositories for steganography-with-masked-lm:
Users that are interested in steganography-with-masked-lm are comparing it to the libraries listed below
- Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020☆18Updated 4 years ago
- ☆26Updated 3 years ago
- ☆31Updated 2 years ago
- collection of the SOTA linguistic steganalysis methods☆25Updated last year
- ☆18Updated 3 years ago
- ☆21Updated 4 years ago
- ☆25Updated 4 years ago
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆24Updated 3 years ago
- [EMNLP 2020] "T3: Tree-Autoencoder Constrained Adversarial Text Generation for Targeted Attack" by Boxin Wang, Hengzhi Pei, Boyuan Pan, Q…☆26Updated 3 years ago
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆42Updated 2 years ago
- [NAACL 2022] "SemAttack: Natural Textual Attacks via Different Semantic Spaces" by Boxin Wang, Chejian Xu, Xiangyu Liu, Yu Cheng, Bo Li☆19Updated 2 years ago
- ☆62Updated 2 years ago
- For Certified Robustness to Text Adversarial Attacks by Randomized [MASK]☆15Updated 3 months ago
- Generating Natural Language Adversarial Examples through Probability Weighted Word Saliency☆68Updated last year
- Hidden backdoor attack on NLP systems☆47Updated 3 years ago
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆22Updated 3 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆52Updated 2 years ago
- ☆14Updated 3 years ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆34Updated 9 months ago
- Adversarial examples for Seq2Seq model in NLP☆40Updated 6 years ago
- ☆24Updated 3 years ago
- ☆9Updated 3 years ago
- Adversarial Training with Fast Gradient Projection Method against Synonym Substitution based Text Attacks☆24Updated 4 years ago
- Watermarking Text Generated by Black-Box Language Models☆33Updated last year
- EMNLP BlackBox NLP 2020: Searching for a Search Method: Benchmarking Search Algorithms for Generating NLP Adversarial Examples☆23Updated 4 years ago
- Source code for Text Infilling, implemented with Texar.☆26Updated 5 years ago
- Steganographic text via language models☆21Updated 2 years ago
- Code for the paper "Weight Poisoning Attacks on Pre-trained Models" (ACL 2020)☆140Updated 3 years ago
- Official implementation of the EMNLP 2021 paper "ONION: A Simple and Effective Defense Against Textual Backdoor Attacks"☆32Updated 3 years ago
- [EMNLP 2022] Distillation-Resistant Watermarking (DRW) for Model Protection in NLP☆12Updated last year