tbfang / steganography-lstm
☆15Updated 4 years ago
Related projects: ⓘ
- ☆30Updated last year
- ☆20Updated 3 years ago
- ☆22Updated 4 years ago
- Implementation of "Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model"☆24Updated 3 years ago
- ☆19Updated 4 years ago
- ☆22Updated 5 years ago
- Adversarial examples for Seq2Seq model in NLP☆39Updated 5 years ago
- Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020☆17Updated 3 years ago
- Generating Natural Adversarial Examples, ICLR 2018☆142Updated 6 years ago
- Craft poisoned data using MetaPoison☆47Updated 3 years ago
- [CCS'22] SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders☆14Updated 2 years ago
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆90Updated 3 years ago
- Code for the paper "Weight Poisoning Attacks on Pre-trained Models" (ACL 2020)☆137Updated 3 years ago
- ☆44Updated 3 years ago
- [NeurIPS 2019] This is the code repo of our novel passport-based DNN ownership verification schemes, i.e. we embed passport layer into va…☆77Updated last year
- Watermarking Deep Neural Networks (USENIX 2018)☆90Updated 4 years ago
- Watermarking against model extraction attacks in MLaaS. ACM MM 2021.☆32Updated 3 years ago
- Ensemble Adversarial Black-Box Attacks against Deep Learning Systems Trained by MNIST, USPS and GTSRB Datasets☆33Updated 4 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆9Updated 6 years ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆25Updated 5 months ago
- ☆19Updated 4 years ago
- Detecting Adversarial Examples in Deep Neural Networks☆65Updated 6 years ago
- This is the code repo of our Pattern Recognition journal on IPR protection of Image Captioning Models☆11Updated last year
- Implementation of https://github.com/PurduePAML/TrojanNN☆9Updated 5 years ago
- Codes for reproducing query-efficient black-box attacks in “AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking B…☆56Updated 4 years ago
- SAFER: A Structure-free Approach For cErtified Robustness to Adversarial Word Substitutions (ACL 2020)☆27Updated 3 years ago
- This repository contains implementation of 4 adversarial attacks : FGSM, Basic Iterative Method, Projected Gradient Descent(Madry's Attac…☆31Updated 5 years ago
- Universal Adversarial Networks☆33Updated 6 years ago
- EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples☆37Updated 5 years ago
- Implementation of "Embedding Watermarks into Deep Neural Networks," in Proc. of ICMR'17.☆116Updated 2 years ago