Implementation of "Embedding Watermarks into Deep Neural Networks," in Proc. of ICMR'17.
☆125Jul 28, 2022Updated 3 years ago
Alternatives and similar repositories for dnn-watermark
Users that are interested in dnn-watermark are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆24Apr 14, 2019Updated 7 years ago
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆24May 21, 2022Updated 3 years ago
- ☆95Mar 23, 2021Updated 5 years ago
- This repository was created as an implementation approach for a project on "Watermarking Deep Neural Networks".☆29Nov 16, 2020Updated 5 years ago
- Implemention of "Robust Watermarking of Neural Network with Exponential Weighting" in TensorFlow.☆13Dec 2, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Webank AI☆41Feb 19, 2025Updated last year
- This is the code repo of our CVPR2021 on protecting the IPR of Generative Adversarial Networks (GANs) from Ambiguity Attack☆33Oct 17, 2023Updated 2 years ago
- Watermarking Deep Neural Networks☆15Jul 18, 2025Updated 9 months ago
- ☆52Feb 27, 2021Updated 5 years ago
- ☆16Dec 3, 2021Updated 4 years ago
- Protect your machine learning models easily and securely with watermarking 🔑☆97Apr 24, 2024Updated 2 years ago
- Watermarking against model extraction attacks in MLaaS. ACM MM 2021.☆34Jul 15, 2021Updated 4 years ago
- This is the code repo of our Pattern Recognition journal on IPR protection of Image Captioning Models☆11Aug 29, 2023Updated 2 years ago
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆46Nov 5, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- [ICML 2023] Protecting Language Generation Models via Invisible Watermarking☆13Sep 8, 2023Updated 2 years ago
- ☆47Mar 29, 2022Updated 4 years ago
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆31Oct 10, 2022Updated 3 years ago
- A Robust Blind Watermarking Using Convolutional Neural Network☆22Dec 10, 2018Updated 7 years ago
- Implementation of IEEE TNNLS 2023 and Elsevier PR 2023 papers on backdoor watermarking for deep classification models with unambiguity an…☆19Jul 27, 2023Updated 2 years ago
- official implementation of Towards Robust Model Watermark via Reducing Parametric Vulnerability☆17Jun 3, 2024Updated last year
- This is the official implementation of our paper 'Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protecti…☆58May 1, 2026Updated last week
- ☆21Aug 10, 2022Updated 3 years ago
- Code and data for our paper "Are You Copying My Model? Protecting the Copyright of Large Language Models for EaaS via Backdoor Watermark"…☆52Jul 11, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆29Oct 17, 2018Updated 7 years ago
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆317Feb 28, 2020Updated 6 years ago
- Official implementation of the paper "Neural Honeytrace: A Robust Plug-and-Play Watermarking Framework against Model Extraction Attacks"☆20Jun 9, 2025Updated 11 months ago
- This is a project for watermarking using DWT and SVD。☆19May 30, 2018Updated 7 years ago
- ☆16Jul 17, 2022Updated 3 years ago
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography" for Global NIPS Paper Implementation Challenge☆33Jan 29, 2018Updated 8 years ago
- [ICLR 2025] Official implementation of 'Hidden in the Noise: Two-Stage Robust Watermarking for Images'☆13May 5, 2025Updated last year
- Code for the Adversarial Image Detectors and a Saliency Map☆12Mar 23, 2017Updated 9 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- The official TensorFlow implementation for ICLR'22 Spotlight paper 'Responsible Disclosure of Generative Models Using Scalable Fingerprin…☆33Apr 16, 2023Updated 3 years ago
- Pytorch implementation of paper "HiDDeN: Hiding Data With Deep Networks" by Jiren Zhu, Russell Kaplan, Justin Johnson, and Li Fei-Fei☆430Aug 8, 2024Updated last year
- a residual network for image steganalysis☆18Sep 28, 2017Updated 8 years ago
- ☆30Oct 13, 2018Updated 7 years ago
- Code of the paper: A Recipe for Watermarking Diffusion Models☆152Nov 13, 2024Updated last year
- reproduction of Thermometer Encoding: One Hot Way To Resist Adversarial Examples in pytorch☆16Dec 4, 2017Updated 8 years ago
- Code for Machine Learning Models that Remember Too Much (in CCS 2017)☆31Oct 15, 2017Updated 8 years ago