schroederdewitt / perfectly-secure-steganographyLinks
Contains open source code for the paper "Perfectly-secure Steganography using Minimum Entropy Coupling"
☆54Updated last year
Alternatives and similar repositories for perfectly-secure-steganography
Users that are interested in perfectly-secure-steganography are comparing it to the libraries listed below
Sorting:
- ☆302Updated last year
- Finding trojans in aligned LLMs. Official repository for the competition hosted at SaTML 2024.☆113Updated 11 months ago
- Discount jupyter.☆51Updated 3 months ago
- Adversarial Attacks on GPT-4 via Simple Random Search [Dec 2023]☆42Updated last year
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Updated 2 years ago
- Repo for arXiv preprint "Gradient-based Adversarial Attacks against Text Transformers"☆107Updated 2 years ago
- Fluent student-teacher redteaming☆21Updated 10 months ago
- ☆34Updated 6 months ago
- ☆88Updated last year
- Code to break Llama Guard☆31Updated last year
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆37Updated last week
- ☆70Updated 2 years ago
- [ICML 2024] Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models☆23Updated 8 months ago
- ☆290Updated last month
- ☆269Updated last year
- [ICLR 2025] An Undetectable Watermark for Generative Image Models☆50Updated 3 months ago
- Python package for measuring memorization in LLMs.☆156Updated 6 months ago
- ☆125Updated 3 years ago
- Privacy backdoors☆51Updated last year
- ☆16Updated last year
- The code for the Ensemble everything everywhere: Multi-scale aggregation for adversarial robustness paper☆21Updated 6 months ago
- ☆39Updated 8 months ago
- ☆29Updated last year
- ☆54Updated 2 years ago
- Pytorch Datasets for Easy-To-Hard☆27Updated 4 months ago
- Code for watermarking language models☆79Updated 9 months ago
- This is the starter kit for the Trojan Detection Challenge 2023 (LLM Edition), a NeurIPS 2023 competition.☆89Updated last year
- Codebase for Obfuscated Activations Bypass LLM Latent-Space Defenses☆18Updated 3 months ago
- Jailbreak artifacts for JailbreakBench☆60Updated 7 months ago
- Adapting the "Radioactive Data" paper to work for text models☆9Updated 4 years ago