schroederdewitt / perfectly-secure-steganographyLinks
Contains open source code for the paper "Perfectly-secure Steganography using Minimum Entropy Coupling"
☆61Updated 2 years ago
Alternatives and similar repositories for perfectly-secure-steganography
Users that are interested in perfectly-secure-steganography are comparing it to the libraries listed below
Sorting:
- Finding trojans in aligned LLMs. Official repository for the competition hosted at SaTML 2024.☆115Updated last year
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Updated 3 years ago
- A curated list of academic events on AI Security & Privacy☆166Updated last year
- ☆329Updated last year
- Discount jupyter.☆51Updated 8 months ago
- ☆24Updated 6 years ago
- ☆55Updated 4 years ago
- Fluent student-teacher redteaming☆23Updated last year
- Protect your machine learning models easily and securely with watermarking 🔑☆97Updated last year
- Code to break Llama Guard☆32Updated last year
- ☆194Updated 7 months ago
- (ICLR 2023 Spotlight) MPCFormer: fast, performant, and private transformer inference with MPC☆102Updated 2 years ago
- ☆32Updated last year
- ☆47Updated 4 years ago
- ☆650Updated 2 months ago
- Implementations of data poisoning attacks against neural networks and related defenses.☆100Updated last year
- Jailbreaking Leading Safety-Aligned LLMs with Simple Adaptive Attacks [ICLR 2025]☆365Updated 10 months ago
- ☆35Updated last year
- [ICML 2024] Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models☆24Updated last year
- User-friendly secure computation engine based on secure multi-party computation☆377Updated 2 years ago
- ☆95Updated 2 years ago
- ☆33Updated 6 months ago
- [ICML 2024] COLD-Attack: Jailbreaking LLMs with Stealthiness and Controllability☆171Updated 11 months ago
- ☆114Updated 2 years ago
- ☆129Updated 3 years ago
- Codebase for Obfuscated Activations Bypass LLM Latent-Space Defenses☆25Updated 9 months ago
- ☆13Updated 10 months ago
- Algorithms for Privacy-Preserving Machine Learning in JAX☆134Updated last week
- Independent robustness evaluation of Improving Alignment and Robustness with Short Circuiting☆18Updated 7 months ago
- Package to optimize Adversarial Attacks against (Large) Language Models with Varied Objectives☆70Updated last year