tbfang / steganography-lstmLinks
☆15Updated 4 years ago
Alternatives and similar repositories for steganography-lstm
Users that are interested in steganography-lstm are comparing it to the libraries listed below
Sorting:
- ☆33Updated 2 years ago
- ☆26Updated 3 years ago
- ☆22Updated 6 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Updated 7 years ago
- ☆21Updated 5 years ago
- ☆11Updated 3 months ago
- ☆48Updated 4 years ago
- ☆11Updated 3 months ago
- Adversarial examples for Seq2Seq model in NLP☆40Updated 6 years ago
- Watermarking against model extraction attacks in MLaaS. ACM MM 2021.☆33Updated 3 years ago
- Implementation of "Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model"☆26Updated 4 years ago
- Website & Documentation: https://sbaresearch.github.io/model-watermarking/☆24Updated last year
- Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020☆22Updated 4 years ago
- Watermarking Deep Neural Networks (USENIX 2018)☆98Updated 4 years ago
- Code for the paper "Weight Poisoning Attacks on Pre-trained Models" (ACL 2020)☆141Updated 3 years ago
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆43Updated 2 years ago
- ☆24Updated 5 years ago
- ☆20Updated 3 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Updated 2 years ago
- [CCS'22] SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders☆20Updated 2 years ago
- Reference implementation of the PRADA model stealing defense. IEEE Euro S&P 2019.☆33Updated 6 years ago
- Implemention of "Robust Watermarking of Neural Network with Exponential Weighting" in TensorFlow.☆13Updated 4 years ago
- SAFER: A Structure-free Approach For cErtified Robustness to Adversarial Word Substitutions (ACL 2020)☆31Updated 4 years ago
- [NeurIPS 2019] This is the code repo of our novel passport-based DNN ownership verification schemes, i.e. we embed passport layer into va…☆83Updated last year
- Universal Adversarial Networks☆33Updated 6 years ago
- ☆11Updated 5 years ago
- Implementation of "Adversarial Frontier Stitching for Remote Neural Network Watermarking" in TensorFlow.☆25Updated 3 years ago
- ☆21Updated 4 years ago
- Implementation of "Embedding Watermarks into Deep Neural Networks," in Proc. of ICMR'17.☆122Updated 2 years ago
- The official code to reproduce results from the NACCL2019 paper: White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks☆12Updated 6 years ago