tbfang / steganography-lstmLinks
☆15Updated 5 years ago
Alternatives and similar repositories for steganography-lstm
Users that are interested in steganography-lstm are comparing it to the libraries listed below
Sorting:
- ☆33Updated 3 years ago
- ☆27Updated 4 years ago
- ☆23Updated 5 years ago
- Watermarking Deep Neural Networks (USENIX 2018)☆100Updated 5 years ago
- Implementation of "Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model"☆26Updated 4 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Updated 7 years ago
- Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020☆24Updated 5 years ago
- Code for the paper "Weight Poisoning Attacks on Pre-trained Models" (ACL 2020)☆143Updated 4 months ago
- ☆12Updated 10 months ago
- ☆26Updated 5 years ago
- ☆11Updated 5 years ago
- Implementation of "Embedding Watermarks into Deep Neural Networks," in Proc. of ICMR'17.☆124Updated 3 years ago
- Craft poisoned data using MetaPoison☆54Updated 4 years ago
- ☆19Updated 4 years ago
- ☆50Updated 4 years ago
- SAFER: A Structure-free Approach For cErtified Robustness to Adversarial Word Substitutions (ACL 2020)☆31Updated 5 years ago
- Generating Natural Adversarial Examples, ICLR 2018☆142Updated 7 years ago
- collection of the SOTA linguistic steganalysis methods☆27Updated 2 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Updated 3 years ago
- Ensemble Adversarial Black-Box Attacks against Deep Learning Systems Trained by MNIST, USPS and GTSRB Datasets☆33Updated 6 years ago
- Knockoff Nets: Stealing Functionality of Black-Box Models☆114Updated 3 years ago
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography" for Global NIPS Paper Implementation Challenge☆33Updated 8 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Updated 6 years ago
- ☆25Updated 5 years ago
- Bad Characters: Imperceptible NLP Attacks☆35Updated last year
- Natural Language Attacks in a Hard Label Black Box Setting.☆50Updated 4 years ago
- ☆18Updated 2 years ago
- [NeurIPS 2019] This is the code repo of our novel passport-based DNN ownership verification schemes, i.e. we embed passport layer into va…☆84Updated 2 years ago
- codes for paper "learning to discriminate perturbations for blocking adversarial attacks in text classification" in EMNLP19☆15Updated 5 years ago
- Implementation for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder (EMNLP-Findings 2020)☆15Updated 5 years ago