tbfang / steganography-lstm
☆15Updated 4 years ago
Alternatives and similar repositories for steganography-lstm:
Users that are interested in steganography-lstm are comparing it to the libraries listed below
- ☆31Updated 2 years ago
- ☆26Updated 3 years ago
- Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020☆18Updated 4 years ago
- ☆21Updated 4 years ago
- ☆25Updated 4 years ago
- ☆22Updated 5 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆9Updated 6 years ago
- [CCS'22] SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders☆18Updated 2 years ago
- ☆18Updated 3 years ago
- Universal Adversarial Networks☆33Updated 6 years ago
- ☆21Updated 4 years ago
- Implementation for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder (EMNLP-Findings 2020)☆15Updated 4 years ago
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography"☆9Updated 6 years ago
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography" for Global NIPS Paper Implementation Challenge☆33Updated 7 years ago
- Implementation of "Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model"☆25Updated 3 years ago
- ☆11Updated last year
- ☆45Updated 3 years ago
- Website & Documentation: https://sbaresearch.github.io/model-watermarking/☆21Updated last year
- ☆17Updated 3 years ago
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆22Updated 3 years ago
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆43Updated last year
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆34Updated 9 months ago
- ☆23Updated 2 years ago
- The implement of paper "How to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNN…☆23Updated 4 years ago
- Implementation of "Embedding Watermarks into Deep Neural Networks," in Proc. of ICMR'17.☆119Updated 2 years ago
- ☆23Updated 2 years ago
- Reference implementation of the PRADA model stealing defense. IEEE Euro S&P 2019.☆33Updated 5 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Updated 3 years ago
- collection of the SOTA linguistic steganalysis methods☆25Updated last year
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆52Updated 2 years ago