tbfang / steganography-lstmLinks
☆15Updated 4 years ago
Alternatives and similar repositories for steganography-lstm
Users that are interested in steganography-lstm are comparing it to the libraries listed below
Sorting:
- ☆33Updated 2 years ago
- ☆26Updated 3 years ago
- ☆22Updated 6 years ago
- ☆18Updated 2 years ago
- Implemention of "Robust Watermarking of Neural Network with Exponential Weighting" in TensorFlow.☆13Updated 4 years ago
- ☆11Updated 2 months ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Updated 7 years ago
- ☆21Updated 5 years ago
- Craft poisoned data using MetaPoison☆51Updated 4 years ago
- ☆47Updated 4 years ago
- Watermarking Deep Neural Networks (USENIX 2018)☆98Updated 4 years ago
- Website & Documentation: https://sbaresearch.github.io/model-watermarking/☆23Updated last year
- ☆11Updated 5 years ago
- Universal Adversarial Networks☆33Updated 6 years ago
- ☆11Updated 3 months ago
- ☆24Updated 5 years ago
- Code for the paper "Weight Poisoning Attacks on Pre-trained Models" (ACL 2020)☆140Updated 3 years ago
- Implementation of "Embedding Watermarks into Deep Neural Networks," in Proc. of ICMR'17.☆122Updated 2 years ago
- Implementation for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder (EMNLP-Findings 2020)☆15Updated 4 years ago
- ☆21Updated 4 years ago
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography"☆9Updated 7 years ago
- ☆48Updated 4 years ago
- Ensemble Adversarial Black-Box Attacks against Deep Learning Systems Trained by MNIST, USPS and GTSRB Datasets☆33Updated 5 years ago
- ☆25Updated 2 years ago
- Detection of adversarial examples using influence functions and nearest neighbors☆36Updated 2 years ago
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆27Updated 6 years ago
- ☆19Updated 3 years ago
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography" for Global NIPS Paper Implementation Challenge☆33Updated 7 years ago
- ☆26Updated 6 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆44Updated 5 years ago