☆18Feb 16, 2023Updated 3 years ago
Alternatives and similar repositories for Adversarial-Embedding
Users that are interested in Adversarial-Embedding are comparing it to the libraries listed below
Sorting:
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- ☆30May 6, 2017Updated 8 years ago
- ☆10Nov 8, 2021Updated 4 years ago
- A pytorch implementation of Deep Residual Network for Steganalysis of Digital Images (SRNet)☆100Sep 27, 2022Updated 3 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 7 years ago
- ☆14Jul 3, 2020Updated 5 years ago
- List for learning image steganography☆36Jun 11, 2024Updated last year
- The official implement of the paper 'Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Stegana…☆14Nov 2, 2021Updated 4 years ago
- Global NIPS Paper Implementation Challenge of "Hiding Images in Plain Sight: Deep Steganography"☆54Jan 30, 2018Updated 8 years ago
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆14Dec 27, 2019Updated 6 years ago
- Code for "Deep Residual Networks for Image in speech Steganography"☆16Mar 31, 2020Updated 5 years ago
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆66Oct 11, 2018Updated 7 years ago
- Light Field Messaging with Deep Photographic Steganography☆43Nov 10, 2020Updated 5 years ago
- Probabilistic Jacobian-based Saliency Maps Attacks☆19Nov 28, 2020Updated 5 years ago
- Official code for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging (Accepted at NeurIPS2020).☆122Jun 21, 2021Updated 4 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆46Nov 25, 2019Updated 6 years ago
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Dec 8, 2022Updated 3 years ago
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆20Jul 6, 2018Updated 7 years ago
- 深度学习 隐写术;使用神经网络以图藏图(NIPS2017),torch版本 paper:Hiding Images in Plain Sight:Deep Steganography https://papers.nips.cc/paper/2017/hash/838e8…☆23Dec 4, 2020Updated 5 years ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆25Nov 30, 2023Updated 2 years ago
- Ever sent a hidden message in invisible ink to your friends? Are you intrigued by the idea of cryptic message exchange? How about using i…☆51Jan 12, 2021Updated 5 years ago
- Code for the unrestricted adversarial examples paper (NeurIPS 2018)☆65Jul 16, 2019Updated 6 years ago
- Strongest attack against Feature Scatter and Adversarial Interpolation☆25Dec 26, 2019Updated 6 years ago
- A Siamese CNN for Image Steganalysis☆82Oct 27, 2020Updated 5 years ago
- ☆31Jul 23, 2021Updated 4 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆33Feb 21, 2021Updated 5 years ago
- filswan community discussion and governance☆10Nov 15, 2023Updated 2 years ago
- An exact algorithm for the maximum clique problem (MCP) which improves over state-of-the-art approaches in some cases by orders of magnit…☆15Nov 15, 2025Updated 3 months ago
- ☆17Feb 6, 2024Updated 2 years ago
- ☆10Apr 30, 2017Updated 8 years ago
- ☆11Aug 11, 2016Updated 9 years ago
- ☆11Feb 26, 2024Updated 2 years ago
- a simple torjan written with python ;python写的盗号木马;键盘监听 ;盗QQ号;☆13Jun 3, 2023Updated 2 years ago
- Linear-complexity Private Function Evaluation (PFE) based on homomorphic encryption (as presented at ESORICS'20).☆10Sep 14, 2020Updated 5 years ago
- ☆10Jun 24, 2021Updated 4 years ago
- 🍿️some awesome Steganalysis☆40Aug 5, 2018Updated 7 years ago
- Reproduce the paper Distributed Representations of Sentences and Documents in tensorflow☆14Apr 8, 2017Updated 8 years ago
- Creating a NIDS based on a Deep Neural Network (CNN)☆11Dec 31, 2018Updated 7 years ago