☆19Sep 9, 2024Updated last year
Alternatives and similar repositories for segment-watermark
Users that are interested in segment-watermark are comparing it to the libraries listed below
Sorting:
- Repository for Towards Codable Watermarking for Large Language Models☆37Sep 20, 2023Updated 2 years ago
- multi-bit language model watermarking (NAACL 24)☆17Sep 20, 2024Updated last year
- Official Implementation of the paper "Three Bricks to Consolidate Watermarks for LLMs"☆50Feb 12, 2024Updated 2 years ago
- Code and data for paper "Can LLM Watermarks Robustly Prevent Unauthorized Knowledge Distillation?". (ACL 2025 Main)☆21Jun 18, 2025Updated 8 months ago
- ☆22Mar 19, 2024Updated last year
- [ICML2024] Adaptive Text Watermark for Large Language Models☆25Dec 11, 2024Updated last year
- Repo for SemStamp (NAACL2024) and k-SemStamp (ACL2024)☆27Dec 9, 2024Updated last year
- [USENIX Security'24] REMARK-LLM: A robust and efficient watermarking framework for generative large language models☆27Oct 23, 2024Updated last year
- Official repository for "PostMark: A Robust Blackbox Watermark for Large Language Models"☆27Aug 30, 2024Updated last year
- ☆32Jun 6, 2024Updated last year
- Source code of paper "An Unforgeable Publicly Verifiable Watermark for Large Language Models" accepted by ICLR 2024☆34May 23, 2024Updated last year
- Official repository of the paper: Who Wrote this Code? Watermarking for Code Generation (ACL 2024)☆39May 28, 2024Updated last year
- ConTPL: Controlling Temporal Privacy Leakage in Streaming Data Release with Differential Privacy☆10Sep 7, 2018Updated 7 years ago
- open source code for NeurIPS 2024 paper☆12Nov 9, 2025Updated 3 months ago
- 波士顿房价数据集☆14Jan 22, 2022Updated 4 years ago
- Clustering using Deep Learning (T-SNE visualization of autoencoder embeddings )☆10Mar 3, 2019Updated 6 years ago
- Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables☆13Aug 27, 2024Updated last year
- Watermarking LLM papers up-to-date☆11Dec 17, 2023Updated 2 years ago
- Resillent Control-Flow Attestation☆13Sep 30, 2021Updated 4 years ago
- [CVPR 2024] Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models☆135May 15, 2024Updated last year
- Code and data for our paper "Are You Copying My Model? Protecting the Copyright of Large Language Models for EaaS via Backdoor Watermark"…☆51Jul 11, 2023Updated 2 years ago
- ☆661Sep 17, 2025Updated 5 months ago
- ☆12Mar 7, 2024Updated last year
- Quantifying Differential Privacy under Temporal Correlations☆12May 13, 2023Updated 2 years ago
- Provably Secure Steganography☆14Sep 13, 2025Updated 5 months ago
- Optimizer for Malware Detection. Api Calls Sequence of Benign Files are provided.☆15Sep 7, 2023Updated 2 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Nov 15, 2022Updated 3 years ago
- Codes for ICCV 2021 paper "AGKD-BML: Defense Against Adversarial Attack by Attention Guided Knowledge Distillation and Bi-directional Met…☆12Mar 3, 2022Updated 3 years ago
- The code of "dp-promise: Differentially Private Diffusion Probabilistic Models for Image Synthesis"☆23Apr 5, 2024Updated last year
- Contains open source code for the paper "Perfectly-secure Steganography using Minimum Entropy Coupling"☆62Aug 1, 2023Updated 2 years ago
- ☆14Jan 21, 2025Updated last year
- 2022“深圳杯”数学建模挑战赛B题☆11Apr 17, 2023Updated 2 years ago
- NoC simulation using gem5 (a simple tul)☆14Mar 23, 2024Updated last year
- Submodule of evalverse forked from [google-research/instruction_following_eval](https://github.com/google-research/google-research/tree/m…☆14May 4, 2024Updated last year
- Hadamard Response: Communication efficient, sample optimal, linear time locally private learning of distributions☆16Sep 18, 2020Updated 5 years ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆11Nov 11, 2020Updated 5 years ago
- This repository is used to store recording about papers and presentations readed.☆18Aug 8, 2024Updated last year
- ☆13Jun 19, 2018Updated 7 years ago
- A Query Efficient Natural Language Attack in a Black Box Setting☆17Sep 23, 2021Updated 4 years ago