tbfang / steganography-lstmLinks
☆15Updated 4 years ago
Alternatives and similar repositories for steganography-lstm
Users that are interested in steganography-lstm are comparing it to the libraries listed below
Sorting:
- ☆33Updated 2 years ago
- ☆26Updated 3 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Updated 7 years ago
- ☆22Updated 5 years ago
- ☆24Updated 5 years ago
- ☆11Updated 5 years ago
- Implementation of "Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model"☆27Updated 4 years ago
- Watermarking Deep Neural Networks (USENIX 2018)☆98Updated 4 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Updated 5 years ago
- ☆11Updated 5 months ago
- Code for the paper "Weight Poisoning Attacks on Pre-trained Models" (ACL 2020)☆142Updated 3 years ago
- Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020☆23Updated 4 years ago
- Generating Natural Adversarial Examples, ICLR 2018☆143Updated 7 years ago
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography"☆9Updated 7 years ago
- Implementation of "Embedding Watermarks into Deep Neural Networks," in Proc. of ICMR'17.☆122Updated 3 years ago
- ☆48Updated 4 years ago
- ☆18Updated 2 years ago
- SAFER: A Structure-free Approach For cErtified Robustness to Adversarial Word Substitutions (ACL 2020)☆31Updated 4 years ago
- ☆23Updated 6 years ago
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆43Updated 2 years ago
- ☆25Updated 4 years ago
- Universal Adversarial Networks☆33Updated 7 years ago
- Knockoff Nets: Stealing Functionality of Black-Box Models☆103Updated 2 years ago
- Craft poisoned data using MetaPoison☆52Updated 4 years ago
- Implementation of several Steganography and steganalysis techniques.☆48Updated last year
- ☆21Updated 4 years ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆37Updated 2 months ago
- Detecting Adversarial Examples in Deep Neural Networks☆67Updated 7 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Updated 2 years ago
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆116Updated 2 years ago