Implementation of "Embedding Watermarks into Deep Neural Networks," in Proc. of ICMR'17.
☆125Jul 28, 2022Updated 3 years ago
Alternatives and similar repositories for dnn-watermark
Users that are interested in dnn-watermark are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Watermarking Deep Neural Networks (USENIX 2018)☆99Sep 2, 2020Updated 5 years ago
- ☆24Apr 14, 2019Updated 6 years ago
- Website & Documentation: https://sbaresearch.github.io/model-watermarking/☆25Sep 22, 2023Updated 2 years ago
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆24May 21, 2022Updated 3 years ago
- ☆95Mar 23, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This repository was created as an implementation approach for a project on "Watermarking Deep Neural Networks".☆29Nov 16, 2020Updated 5 years ago
- Implemention of "Robust Watermarking of Neural Network with Exponential Weighting" in TensorFlow.☆13Dec 2, 2020Updated 5 years ago
- Webank AI☆42Feb 19, 2025Updated last year
- WAFFLE: Watermarking in Federated Learning☆23Aug 21, 2023Updated 2 years ago
- Watermarking Deep Neural Networks☆15Jul 18, 2025Updated 8 months ago
- Protect your machine learning models easily and securely with watermarking 🔑☆97Apr 24, 2024Updated last year
- Watermarking against model extraction attacks in MLaaS. ACM MM 2021.☆34Jul 15, 2021Updated 4 years ago
- Implementation of "Adversarial Frontier Stitching for Remote Neural Network Watermarking" in TensorFlow.☆24Aug 30, 2021Updated 4 years ago
- This is the code repo of our Pattern Recognition journal on IPR protection of Image Captioning Models☆11Aug 29, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆47Mar 29, 2022Updated 4 years ago
- A Robust Blind Watermarking Using Convolutional Neural Network☆22Dec 10, 2018Updated 7 years ago
- A general approach for using deep neural network for digital watermarking☆15Mar 30, 2020Updated 6 years ago
- The official implementation of "Intellectual Property Protection of Diffusion Models via the Watermark Diffusion Process"☆20Feb 18, 2025Updated last year
- official implementation of Towards Robust Model Watermark via Reducing Parametric Vulnerability☆17Jun 3, 2024Updated last year
- This is the official implementation of our paper 'Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protecti…☆58Mar 20, 2024Updated 2 years ago
- ☆21Aug 10, 2022Updated 3 years ago
- Code and data for our paper "Are You Copying My Model? Protecting the Copyright of Large Language Models for EaaS via Backdoor Watermark"…☆52Jul 11, 2023Updated 2 years ago
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆314Feb 28, 2020Updated 6 years ago
- Official implementation of the paper "Neural Honeytrace: A Robust Plug-and-Play Watermarking Framework against Model Extraction Attacks"☆20Jun 9, 2025Updated 9 months ago
- This is a project for watermarking using DWT and SVD。☆19May 30, 2018Updated 7 years ago
- [ICLR 2025] Official implementation of 'Hidden in the Noise: Two-Stage Robust Watermarking for Images'☆13May 5, 2025Updated 10 months ago
- ☆16Jul 17, 2022Updated 3 years ago
- Code for the Adversarial Image Detectors and a Saliency Map☆12Mar 23, 2017Updated 9 years ago
- The official TensorFlow implementation for ICLR'22 Spotlight paper 'Responsible Disclosure of Generative Models Using Scalable Fingerprin…☆33Apr 16, 2023Updated 2 years ago
- Pytorch implementation of paper "HiDDeN: Hiding Data With Deep Networks" by Jiren Zhu, Russell Kaplan, Justin Johnson, and Li Fei-Fei☆422Aug 8, 2024Updated last year
- Code of the paper: A Recipe for Watermarking Diffusion Models☆152Nov 13, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Code for Machine Learning Models that Remember Too Much (in CCS 2017)☆31Oct 15, 2017Updated 8 years ago
- Codes for Dual Stealthy Backdoor☆14Feb 10, 2024Updated 2 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆66Oct 11, 2018Updated 7 years ago
- This is the source code for HufuNet. Our paper is accepted by the IEEE TDSC.☆27Aug 21, 2023Updated 2 years ago
- SteganoGAN is a tool for creating steganographic images using adversarial training.☆377Mar 23, 2023Updated 3 years ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆22Sep 8, 2021Updated 4 years ago
- [ICME 2021] Official implementation of "Watermark Faker: Towards Forgery of Digital Image Watermarking".☆23May 15, 2021Updated 4 years ago