schroederdewitt / perfectly-secure-steganography
Contains open source code for the paper "Perfectly-secure Steganography using Minimum Entropy Coupling"
☆46Updated last year
Related projects: ⓘ
- Finding trojans in aligned LLMs. Official repository for the competition hosted at SaTML 2024.☆100Updated 3 months ago
- ☆237Updated 6 months ago
- ☆41Updated 3 years ago
- Algorithms for Privacy-Preserving Machine Learning in JAX☆87Updated 3 months ago
- STEGASURAS: STEGanography via Arithmetic coding and Strong neURAl modelS☆182Updated last month
- ☆43Updated 2 years ago
- DISCO is a code-free and installation-free browser platform that allows any non-technical user to collaboratively train machine learning …☆142Updated this week
- ☆77Updated 2 years ago
- building the next-gen watermark with deep learning.☆181Updated 3 years ago
- ☆59Updated last year
- Differentially-private transformers using HuggingFace and Opacus☆108Updated 3 weeks ago
- ☆30Updated last year
- Starter kit and data loading code for the Trojan Detection Challenge NeurIPS 2022 competition☆33Updated last year
- Code to break Llama Guard☆27Updated 9 months ago
- Privacy backdoors☆41Updated 4 months ago
- [ICCV 2023] Source code for our paper "Rickrolling the Artist: Injecting Invisible Backdoors into Text-Guided Image Generation Models".☆53Updated 10 months ago
- Privacy Testing for Deep Learning☆183Updated last year
- ☆246Updated 6 months ago
- (ICLR 2023 Spotlight) MPCFormer: fast, performant, and private transformer inference with MPC☆84Updated last year
- ARMORY Adversarial Robustness Evaluation Test Bed☆174Updated 8 months ago
- Adversarial Attacks on GPT-4 via Simple Random Search [Dec 2023]☆41Updated 4 months ago
- Python library for argument and configuration management☆53Updated last year
- A codebase that makes differentially private training of transformers easy.☆151Updated last year
- A curated reading list of research in Adaptive Computation, Dynamic Compute & Mixture of Experts (MoE). Inference time compute as seen in…☆123Updated last month
- ☆22Updated this week
- Discount jupyter.☆40Updated 2 years ago
- SDK for private data access, built on homomorphic encryption.☆330Updated 6 months ago
- Differentially Private Diffusion Models☆77Updated 8 months ago
- Tools for studying developmental interpretability in neural networks.☆69Updated this week
- ☆16Updated 2 years ago