☆16Sep 6, 2020Updated 5 years ago
Alternatives and similar repositories for steganography-lstm
Users that are interested in steganography-lstm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Spectrogram is selected as preprocessing feature of audio clips and a feature representation method based on deep residual network (Spec-…☆27Sep 13, 2020Updated 5 years ago
- Text steganography based on Markov chains☆36Mar 1, 2014Updated 12 years ago
- Generation tool for offset-resistant audio adversarial examples against Deepspeech☆10Oct 5, 2020Updated 5 years ago
- Introduction to PyTorch Workshop at the AMLD 2019☆31Jun 10, 2019Updated 6 years ago
- One-Pixel Shortcut: on the Learning Preference of Deep Neural Networks (ICLR 2023 Spotlight)☆14Sep 28, 2025Updated 7 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ICLR 2019 Paper, "Characterizing Audio Adversarial Examples using Temporal Dependency".☆12Apr 3, 2019Updated 7 years ago
- ☆11Jan 25, 2019Updated 7 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆12Apr 19, 2017Updated 9 years ago
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- ☆35Nov 3, 2022Updated 3 years ago
- ☆10Oct 18, 2021Updated 4 years ago
- ☆14Mar 16, 2020Updated 6 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 9 years ago
- ☆12Oct 19, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Craft poisoned data using MetaPoison☆54Apr 5, 2021Updated 5 years ago
- The repository includes an ongoing collection of Instagram Posts IDs correlated with the new coronavirus COVID-19.☆11May 3, 2020Updated 6 years ago
- 雪浪制造AI挑战赛 初赛73/2403,复赛22/2403,所有代码+介绍☆14Sep 4, 2018Updated 7 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- ☆14Sep 25, 2020Updated 5 years ago
- Fast, principled L1-regularized loss minimization☆24Feb 16, 2024Updated 2 years ago
- SimCSE☆15Oct 1, 2022Updated 3 years ago
- ☆14Jan 4, 2025Updated last year
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 📧A disposable email client built with Flask. Need a temporary email? Look no further!☆16Sep 12, 2018Updated 7 years ago
- Incredible acceleration with pruning or the other compression techniques☆13Jul 7, 2021Updated 4 years ago
- A Hierarchical Attention Model for Social Contextual Image Recommendation, TKDE2019☆13Feb 10, 2021Updated 5 years ago
- A python tool for sms bombing only Robi and Airtel numbers.☆15Feb 24, 2025Updated last year
- Deep Steganalysis training script☆13May 1, 2025Updated last year
- Block-Coordinate Frank-Wolfe Optimization for Structural SVMs☆26Sep 12, 2013Updated 12 years ago
- DeepSphere: a graph-based spherical CNN (TensorFlow)☆15Jan 1, 2021Updated 5 years ago
- A python script for digital image steganography using Fast Fourier Transform.☆11Aug 30, 2024Updated last year
- Hide text informations using invisible text characters☆12Apr 4, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Connecting Pixels to Privacy and Utility: Automatic Redaction of Private Information in Images, CVPR 2018☆18Jul 3, 2018Updated 7 years ago
- bitcoin steganography library☆10Nov 22, 2015Updated 10 years ago
- PyTorch implementation of our ICLR 2023 paper titled "Is Adversarial Training Really a Silver Bullet for Mitigating Data Poisoning?".☆12Mar 13, 2023Updated 3 years ago
- An interactive implementation of (parts of) the "Bomb Defusal Manual" from the game "Keep Talking and Nobody Explodes"☆13Dec 10, 2015Updated 10 years ago
- ☆16Dec 3, 2021Updated 4 years ago
- Solutions to CTF problems.☆11May 29, 2016Updated 9 years ago
- A python implementation of the LZ77, LZ78 and LZW lossless data compression algorithms.☆16Aug 9, 2018Updated 7 years ago