tbfang / steganography-lstmLinks
☆15Updated 5 years ago
Alternatives and similar repositories for steganography-lstm
Users that are interested in steganography-lstm are comparing it to the libraries listed below
Sorting:
- ☆33Updated 2 years ago
- ☆26Updated 4 years ago
- ☆18Updated 2 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Updated 7 years ago
- Implementation of "Embedding Watermarks into Deep Neural Networks," in Proc. of ICMR'17.☆123Updated 3 years ago
- Watermarking Deep Neural Networks (USENIX 2018)☆99Updated 5 years ago
- Universal Adversarial Networks☆33Updated 7 years ago
- Detecting Adversarial Examples in Deep Neural Networks☆67Updated 7 years ago
- ☆11Updated 6 months ago
- ☆11Updated 5 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Updated 5 years ago
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆99Updated 4 years ago
- ☆25Updated 5 years ago
- ☆23Updated 6 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Updated 2 years ago
- Generating Natural Adversarial Examples, ICLR 2018☆143Updated 7 years ago
- Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models (published in ICLR2018)☆246Updated 5 years ago
- Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020☆23Updated 4 years ago
- Code for the unrestricted adversarial examples paper (NeurIPS 2018)☆65Updated 6 years ago
- Ensemble Adversarial Black-Box Attacks against Deep Learning Systems Trained by MNIST, USPS and GTSRB Datasets☆32Updated 5 years ago
- Public repo for transferability ICLR 2017 paper☆52Updated 6 years ago
- Implementation of several Steganography and steganalysis techniques.☆48Updated last year
- Implementation of "Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model"☆27Updated 4 years ago
- Code corresponding to the paper "Adversarial Examples are not Easily Detected..."☆88Updated 7 years ago
- Craft poisoned data using MetaPoison☆53Updated 4 years ago
- a residual network for image steganalysis☆18Updated 7 years ago
- ☆48Updated 4 years ago
- Detection of adversarial examples using influence functions and nearest neighbors☆37Updated 2 years ago
- Countering Adversarial Image using Input Transformations.☆496Updated 3 years ago
- Codes for reproducing query-efficient black-box attacks in “AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking B…☆58Updated 5 years ago