mickeysjm / StegaText
Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020
☆18Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for StegaText
- Implementation of "Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model"☆24Updated 3 years ago
- ☆30Updated 2 years ago
- ☆23Updated 3 years ago
- collection of the SOTA linguistic steganalysis methods☆24Updated 10 months ago
- ☆21Updated 4 years ago
- ☆17Updated 3 years ago
- ☆24Updated 4 years ago
- Steganographic text via language models☆21Updated 2 years ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆30Updated 7 months ago
- Generating Natural Language Adversarial Examples through Probability Weighted Word Saliency☆68Updated last year
- ☆62Updated 2 years ago
- A Query Efficient Natural Language Attack in a Black Box Setting☆16Updated 3 years ago
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆41Updated 2 years ago
- [EMNLP 2020] "T3: Tree-Autoencoder Constrained Adversarial Text Generation for Targeted Attack" by Boxin Wang, Hengzhi Pei, Boyuan Pan, Q…☆26Updated 3 years ago
- Code and data of the ACL 2020 paper "Word-level Textual Adversarial Attacking as Combinatorial Optimization"☆85Updated 3 years ago
- Code and datasets for the paper "Deepfake Text Detection: Limitations and Opportunities"☆27Updated 8 months ago
- [NAACL 2022] "SemAttack: Natural Textual Attacks via Different Semantic Spaces" by Boxin Wang, Chejian Xu, Xiangyu Liu, Yu Cheng, Bo Li☆19Updated 2 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆48Updated 2 years ago
- Adversarial Training with Fast Gradient Projection Method against Synonym Substitution based Text Attacks☆24Updated 3 years ago
- ☆15Updated 4 years ago
- For Certified Robustness to Text Adversarial Attacks by Randomized [MASK]☆15Updated last month
- ☆11Updated 4 years ago
- Natural Universal Trigger Search (NUTS)☆21Updated 3 years ago
- Steganalysis based deep learning☆55Updated 4 years ago
- Adversarial examples for Seq2Seq model in NLP☆39Updated 6 years ago
- Code for EMNLP2020 long paper: BERT-Attack: Adversarial Attack Against BERT Using BERT☆188Updated 4 years ago
- This is a PyTorch Reimplementation of High-Capacity Convolutional Video Steganography with Temporal Residual Modeling (ICMR2019, oral)☆8Updated 3 years ago
- IStego100K: Large-scale Image Steganalysis Dataset☆62Updated 4 years ago
- Official code for LEWIS, from: "LEWIS: Levenshtein Editing for Unsupervised Text Style Transfer", ACL-IJCNLP 2021 Findings by Machel Rei…☆31Updated 2 years ago
- Harnessing Pre-Trained Neural Networks with Rules for Formality Style Transfer☆26Updated 2 years ago