yjs1224 / TextSteganalysis
collection of the SOTA linguistic steganalysis methods
☆24Updated last year
Alternatives and similar repositories for TextSteganalysis:
Users that are interested in TextSteganalysis are comparing it to the libraries listed below
- ☆17Updated 3 years ago
- ☆26Updated 3 years ago
- ☆33Updated 2 years ago
- ☆21Updated 4 years ago
- ☆24Updated 4 years ago
- Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020☆20Updated 4 years ago
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆42Updated 2 years ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆34Updated 11 months ago
- Implementation of "Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model"☆25Updated 3 years ago
- Watermarking Text Generated by Black-Box Language Models☆33Updated last year
- ☆10Updated 2 weeks ago
- Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"☆42Updated 2 years ago
- Official implementation of the EMNLP 2021 paper "ONION: A Simple and Effective Defense Against Textual Backdoor Attacks"☆33Updated 3 years ago
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆23Updated 3 years ago
- ☆11Updated 3 weeks ago
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆24Updated 3 years ago
- DP-BART for Privatized Text Rewriting under Local Differential Privacy☆16Updated 5 months ago
- Code and data of the ACL 2021 paper "Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution"☆16Updated 3 years ago
- ☆24Updated 3 years ago
- Robust natural language watermarking using invariant features☆25Updated last year
- Source code of paper "An Unforgeable Publicly Verifiable Watermark for Large Language Models" accepted by ICLR 2024☆32Updated 10 months ago
- ☆15Updated 3 years ago
- Code and data for our paper "Are You Copying My Model? Protecting the Copyright of Large Language Models for EaaS via Backdoor Watermark"…☆49Updated last year
- Natural Universal Trigger Search (NUTS)☆21Updated 3 years ago
- Natural Language Attacks in a Hard Label Black Box Setting.☆46Updated 3 years ago
- Code for the paper "Be Careful about Poisoned Word Embeddings: Exploring the Vulnerability of the Embedding Layers in NLP Models" (NAACL-…☆40Updated 3 years ago
- Adversarial Training with Fast Gradient Projection Method against Synonym Substitution based Text Attacks☆24Updated 4 years ago
- Generating Natural Language Adversarial Examples through Probability Weighted Word Saliency☆69Updated 2 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆51Updated 2 years ago
- SAFER: A Structure-free Approach For cErtified Robustness to Adversarial Word Substitutions (ACL 2020)☆29Updated 4 years ago