{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T20:31:28Z","timestamp":1776889888613,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":111,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,13]],"date-time":"2022-11-13T00:00:00Z","timestamp":1668297600000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2030859, CNS-{1329737,1955172,1653110,1801479,1330491}"],"award-info":[{"award-number":["2030859, CNS-{1329737,1955172,1653110,1801479,1330491}"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR00112020021,HR001120C0084"],"award-info":[{"award-number":["HR00112020021,HR001120C0084"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["00014-19-1-2292"],"award-info":[{"award-number":["00014-19-1-2292"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484550","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"1529-1548","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["Meteor: Cryptographically Secure Steganography for Realistic Distributions"],"prefix":"10.1145","author":[{"given":"Gabriel","family":"Kaptchuk","sequence":"first","affiliation":[{"name":"Boston University, Boston, MA, USA"}]},{"given":"Tushar M.","family":"Jois","sequence":"additional","affiliation":[{"name":"Johns Hopkins University, Baltimore, MD, USA"}]},{"given":"Matthew","family":"Green","sequence":"additional","affiliation":[{"name":"Johns Hopkins University, Baltimore, MD, USA"}]},{"given":"Aviel D.","family":"Rubin","sequence":"additional","affiliation":[{"name":"Johns Hopkins University, Baltimore, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"T. Perrin and M. Marlinspike \u201che double ratchet algorithm.\u201d Available at https:\/\/whispersystems.org\/docs\/specifications\/doubleratchet\/."},{"key":"e_1_3_2_1_2_1","unstructured":"WhatsApp \u201cWhatsApp Encryption Overview.\u201d Available at https:\/\/scontent.whatsapp.net\/v\/t61\/68135620_760356657751682_6212997528851833559_n.pdf\/WhatsApp-Security-Whitepaper.pdf December 2017."},{"key":"e_1_3_2_1_3_1","volume-title":"Whatsapp blocked in brazil again","author":"Conger K.","year":"2016","unstructured":"K. Conger, \u201cWhatsapp blocked in brazil again.\u201d https:\/\/techcrunch.com\/2016\/07\/19\/whatsapp-blocked-in-brazil-again\/, Jul 2016."},{"key":"e_1_3_2_1_4_1","volume-title":"Whatsapp banned: Countries where whatsapp is blocked mapped","author":"Fish T.","year":"2019","unstructured":"T. Fish, \u201cWhatsapp banned: Countries where whatsapp is blocked mapped.\u201d https:\/\/www.express.co.uk\/life-style\/science-technology\/1166191\/whatsapp-ban-map-which-countries-where-whatsapp-blocked-censorship-china-banned, Aug 2019."},{"key":"e_1_3_2_1_5_1","unstructured":"A. Shahbaz \u201cFreedom on the net 2018.\u201d Available at https:\/\/freedomhouse.org\/report\/freedom-net\/freedom-net-2018\/rise-digital-authoritarianism 2018."},{"key":"e_1_3_2_1_6_1","volume-title":"Freedom on the net 2018 map","author":"House Freedom","year":"2018","unstructured":"Freedom House, \u201cFreedom on the net 2018 map.\u201d https:\/\/freedomhouse.org\/report\/freedom-net\/freedom-net-2018\/map, 2018."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23099"},{"key":"e_1_3_2_1_8_1","unstructured":"Tor Project \u201cThe tor project: Privacy and freedom online.\u201d https:\/\/www.torproject.org\/."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 13th Conference on USENIX Security Symposium -","volume":"13","author":"Dingledine R.","unstructured":"R. Dingledine, N. Mathewson, and P. Syverson, \u201cTor: The second-generation onion router,\u201d in Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13, SSYM'04, (Berkeley, CA, USA), pp. 21--21, USENIX Association, 2004."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"e_1_3_2_1_11_1","first-page":"3199","article-title":"Scramblesuit: A polymorph network protocol to circumvent censorship","volume":"1305","author":"Winter P.","year":"2013","unstructured":"P. Winter, T. Pulls, and J. Fu\u00df, \u201cScramblesuit: A polymorph network protocol to circumvent censorship,\u201d CoRR, vol. abs\/1305.3199, 2013.","journal-title":"CoRR"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382210"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382211"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 20th USENIX Security Symposium","author":"Wustrow E.","year":"2011","unstructured":"E. Wustrow, S. Wolchok, I. Goldberg, and J. A. Halderman, \u201cTelex: Anticensorship in the network infrastructure,\u201d in Proceedings of the 20th USENIX Security Symposium, Aug. 2011."},{"key":"e_1_3_2_1_15_1","first-page":"159","volume-title":"Security Symposium ($$USENIX$$ Security 14)","author":"Wustrow E.","year":"2014","unstructured":"E. Wustrow, C. M. Swanson, and J. A. Halderman, \u201cTapdance: End-to-middle anticensorship without flow blocking,\u201d in 23rd $$USENIX$$ Security Symposium ($$USENIX$$ Security 14), pp. 159--174, 2014."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516657"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382212"},{"key":"e_1_3_2_1_18_1","volume-title":"NDSS 2013","author":"Houmansadr A.","year":"2013","unstructured":"A. Houmansadr, T. J. Riedl, N. Borisov, and A. C. Singer, \u201cI want my voice to be heard: IP over voice-over-IP for unobservable censorship circumvention,\u201d in NDSS 2013, The Internet Society, Feb. 2013."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.59"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0005"},{"key":"e_1_3_2_1_21_1","volume-title":"Workshop on Free and Open Communications on the Internet ($$FOCI$$ 15)","author":"Marczak B.","year":"2015","unstructured":"B. Marczak, N. Weaver, J. Dalek, R. Ensafi, D. Fifield, S. McKune, A. Rey, J. Scott-Railton, R. Deibert, and V. Paxson, \u201cAn analysis of china's \"great cannon\",\u201d in 5th $$USENIX$$ Workshop on Free and Open Communications on the Internet ($$FOCI$$ 15), 2015."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815690"},{"key":"e_1_3_2_1_23_1","volume-title":"My experience with the great firewall of china","author":"Bevand M.","year":"2016","unstructured":"M. Bevand, \u201cMy experience with the great firewall of china.\u201d http:\/\/blog.zorinaq.com\/my-experience-with-the-great-firewall-of-china\/, Jan 2016."},{"key":"e_1_3_2_1_24_1","volume-title":"Anonymous, L.-H. Merino, D. Fifield, A. Houmansadr, and D. Levin, \u201cExposing and circumventing china's censorship of esni","author":"Bock K.","year":"2020","unstructured":"K. Bock, iyouport, Anonymous, L.-H. Merino, D. Fifield, A. Houmansadr, and D. Levin, \u201cExposing and circumventing china's censorship of esni,\u201d 8 2020."},{"key":"e_1_3_2_1_25_1","first-page":"51","volume-title":"CRYPTO'83","author":"Simmons G. J.","year":"1983","unstructured":"G. J. Simmons, \u201cThe prisoners' problem and the subliminal channel,\u201d in CRYPTO'83 (D. Chaum, ed.), pp. 51--67, Plenum Press, New York, USA, 1983."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668971"},{"key":"e_1_3_2_1_27_1","unstructured":"C. Cachin \u201cAn information-theoretic model for steganography.\u201d Cryptology ePrint Archive Report 2000\/028 2000. http:\/\/eprint.iacr.org\/2000\/028."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_6"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_20"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_12"},{"key":"e_1_3_2_1_31_1","first-page":"227","volume-title":"TCC 2005 (J. Kilian, ed.)","volume":"3378","author":"Dedic N.","year":"2005","unstructured":"N. Dedic, G. Itkis, L. Reyzin, and S. Russell, \u201cUpper and lower bounds on black-box steganography,\u201d in TCC 2005 (J. Kilian, ed.), vol. 3378 of LNCS, pp. 227--244, Springer, Heidelberg, Feb. 2005."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/11558859_17"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2007.100"},{"key":"e_1_3_2_1_34_1","volume-title":"Steganalysis of synonym-substitution based natural language watermarking","author":"Yu Z.","year":"2009","unstructured":"Z. Yu, L. Huang, Z. Chen, L. Li, X. Zhao, and Y. Zhu, \u201cSteganalysis of synonym-substitution based natural language watermarking,\u201d 2009."},{"key":"e_1_3_2_1_35_1","first-page":"591","volume-title":"Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics, HLT '10","author":"Chang C.-Y.","unstructured":"C.-Y. Chang and S. Clark, \u201cLinguistic steganography using automatically generated paraphrases,\u201d in Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics, HLT '10, (Stroudsburg, PA, USA), pp. 591--599, Association for Computational Linguistics, 2010."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1162\/COLI_a_00176"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-3017"},{"key":"e_1_3_2_1_38_1","volume-title":"Steganographic generative adversarial networks","author":"Volkhonskiy D.","year":"2017","unstructured":"D. Volkhonskiy, I. Nazarov, B. Borisenko, and E. Burnaev, \u201cSteganographic generative adversarial networks,\u201d 2017."},{"key":"e_1_3_2_1_39_1","volume-title":"Automatically generate steganographic text based on markov model and huffman coding","author":"Yang Z.","year":"2018","unstructured":"Z. Yang, S. Jin, Y. Huang, Y. Zhang, and H. Li, \u201cAutomatically generate steganographic text based on markov model and huffman coding,\u201d 2018."},{"key":"e_1_3_2_1_40_1","volume-title":"Reversible natural language watermarking using synonym substitution and arithmetic coding","author":"Xiang L.","year":"2018","unstructured":"L. Xiang, \u201cReversible natural language watermarking using synonym substitution and arithmetic coding,\u201d 2018."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2871746"},{"issue":"4","key":"e_1_3_2_1_42_1","article-title":"A homophone-based chinese text steganography scheme for chatting applications","volume":"35","author":"Huang S.-Y.","year":"2019","unstructured":"S.-Y. HUANG and P.-S. Huang, \u201cA homophone-based chinese text steganography scheme for chatting applications.,\u201d Journal of Information Science & Engineering, vol. 35, no. 4, 2019.","journal-title":"Journal of Information Science & Engineering"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1422"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1115"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2019.2902095"},{"key":"e_1_3_2_1_46_1","first-page":"1","article-title":"Ts-rnn: Text steganalysis based on recurrent neural networks","author":"Yang Z.","year":"2019","unstructured":"Z. Yang, K. Wang, J. Li, Y. Huang, and Y. Zhang, \u201cTs-rnn: Text steganalysis based on recurrent neural networks,\u201d IEEE Signal Processing Letters, p. 1--1, 2019.","journal-title":"IEEE Signal Processing Letters"},{"key":"e_1_3_2_1_47_1","volume-title":"Ts-cnn: Text steganalysis from semantic space based on convolutional neural network","author":"Yang Z.","year":"2018","unstructured":"Z. Yang, N. Wei, J. Sheng, Y. Huang, and Y.-J. Zhang, \u201cTs-cnn: Text steganalysis from semantic space based on convolutional neural network,\u201d 2018."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D15-1307"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2175919"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMIT.2008.29"},{"key":"e_1_3_2_1_51_1","volume-title":"OpenAI Blog","author":"Radford A.","unstructured":"A. Radford, J. Wu, R. Child, D. Luan, D. Amodei, and I. Sutskever, \u201cLanguage models are unsupervised multitask learners,\u201d OpenAI Blog, vol. 1, no. 8, 2019."},{"key":"e_1_3_2_1_52_1","volume-title":"Language models are few-shot learners","author":"Brown T. B.","year":"2020","unstructured":"T. B. Brown, B. Mann, N. Ryder, M. Subbiah, J. Kaplan, P. Dhariwal, A. Neelakantan, P. Shyam, G. Sastry, A. Askell, S. Agarwal, A. Herbert-Voss, G. Krueger, T. Henighan, R. Child, A. Ramesh, D. M. Ziegler, J. Wu, C. Winter, C. Hesse, M. Chen, E. Sigler, M. Litwin, S. Gray, B. Chess, J. Clark, C. Berner, S. McCandlish, A. Radford, I. Sutskever, and D. Amodei, \u201cLanguage models are few-shot learners,\u201d 2020."},{"key":"e_1_3_2_1_53_1","unstructured":"O. Blog \u201cBetter language models and their implications.\u201d Available at https:\/\/openai.com\/blog\/better-language-models\/ February 2019."},{"key":"e_1_3_2_1_54_1","volume-title":"Toward a theory of steganography","author":"Hopper N. J.","year":"2004","unstructured":"N. J. Hopper, \u201cToward a theory of steganography,\u201d tech. rep., CARNEGIE-MELLON UNIV PITTSBURGH PA SCHOOL OF COMPUTER SCIENCE, 2004."},{"key":"e_1_3_2_1_55_1","volume-title":"The unreasonable effectiveness of recurrent neural networks","author":"Karpathy A.","year":"2015","unstructured":"A. Karpathy, \u201cThe unreasonable effectiveness of recurrent neural networks.\u201d https:\/\/karpathy.github.io\/2015\/05\/21\/rnn-effectiveness\/, May 2015."},{"issue":"5","key":"e_1_3_2_1_56_1","first-page":"6","article-title":"The algorithms behind the headlines","volume":"6","author":"van Dalen A.","year":"2012","unstructured":"A. van Dalen, \u201cThe algorithms behind the headlines,\u201d Journalism Practice, vol. 6, no. 5--6, pp. 648--658, 2012.","journal-title":"Journalism Practice"},{"key":"e_1_3_2_1_57_1","volume-title":"Guide to automated journalism","author":"Graefe A.","year":"2016","unstructured":"A. Graefe, \u201cGuide to automated journalism,\u201d 2016."},{"key":"e_1_3_2_1_58_1","volume-title":"What happens when machines learn to write poetry","author":"Rockmore D.","year":"2020","unstructured":"D. Rockmore, \u201cWhat happens when machines learn to write poetry,\u201d Jan 2020."},{"key":"e_1_3_2_1_59_1","unstructured":"A. Mayne \u201cAi|writer.\u201d https:\/\/www.aiwriter.app\/."},{"key":"e_1_3_2_1_60_1","unstructured":"A. Kind \u201cTalk to transformer.\u201d https:\/\/app.inferkit.com\/demo."},{"key":"e_1_3_2_1_61_1","unstructured":"\u201cAi writer.\u201d http:\/\/ai-writer.com\/."},{"key":"e_1_3_2_1_62_1","unstructured":"J. Y. Koh. https:\/\/modelzoo.co\/."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_24"},{"key":"e_1_3_2_1_64_1","first-page":"1","volume-title":"International Workshop on Information Hiding","author":"Mittelholzer T.","year":"1999","unstructured":"T. Mittelholzer, \u201cAn information-theoretic approach to steganography and watermarking,\u201d in International Workshop on Information Hiding, pp. 1--16, Springer, 1999."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2006.312388"},{"key":"e_1_3_2_1_66_1","volume-title":"IEEE International Conference on Image Processing (ICIP)","author":"Sarkar A.","year":"2007","unstructured":"A. Sarkar, K. Solanki, and B. S. Manjunath, \u201cSecure steganography: Statistical restoration in the transform domain with best integer perturbations to pixel values,\u201d in IEEE International Conference on Image Processing (ICIP), Sep 2007."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2006.312387"},{"key":"e_1_3_2_1_68_1","unstructured":"L. Reyzin and S. Russell \u201cSimple stateless steganography.\u201d Cryptology ePrint Archive Report 2003\/093 2003. http:\/\/eprint.iacr.org\/2003\/093."},{"key":"e_1_3_2_1_69_1","unstructured":"T. V. Le \u201cEfficient provably secure public key steganography.\u201d Cryptology ePrint Archive Report 2003\/156 2003. http:\/\/eprint.iacr.org\/2003\/156."},{"key":"e_1_3_2_1_70_1","unstructured":"T. V. Le and K. Kurosawa \u201cEfficient public key steganography secure against adaptively chosen stegotext attacks.\u201d Cryptology ePrint Archive Report 2003\/244 2003. http:\/\/eprint.iacr.org\/2003\/244."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2512526"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78381-9_2"},{"key":"e_1_3_2_1_73_1","first-page":"1","volume-title":"ITCS 2019 (A. Blum, ed.)","volume":"124","author":"Horel T.","year":"2019","unstructured":"T. Horel, S. Park, S. Richelson, and V. Vaikuntanathan, \u201cHow to subvert backdoored encryption: Security against adversaries that decrypt all ciphertexts,\u201d in ITCS 2019 (A. Blum, ed.), vol. 124, pp. 42:1--42:20, LIPIcs, Jan. 2019."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64381-2_23"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_9"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0009"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23511"},{"key":"e_1_3_2_1_78_1","volume-title":"Workshop on Free and Open Communications on the Internet ($$FOCI$$ 17)","author":"Frolov S.","year":"2017","unstructured":"S. Frolov, F. Douglas, W. Scott, A. McDonald, B. VanderSloot, R. Hynes, A. Kruger, M. Kallitsis, D. G. Robinson, S. Schultze, et al., \u201cAn isp-scale deployment of tapdance,\u201d in 7th $$USENIX$$ Workshop on Free and Open Communications on the Internet ($$FOCI$$ 17), 2017."},{"key":"e_1_3_2_1_79_1","first-page":"877","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Luchaup D.","year":"2014","unstructured":"D. Luchaup, K. P. Dyer, S. Jha, T. Ristenpart, and T. Shrimpton, \u201cLibfte: A toolkit for constructing practical, format-abiding encryption schemes,\u201d in 23rd USENIX Security Symposium (USENIX Security 14), (San Diego, CA), pp. 877--891, USENIX Association, 2014."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516657"},{"key":"e_1_3_2_1_81_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Dyer K. P.","unstructured":"K. P. Dyer, S. E. Coull, and T. Shrimpton, \u201cMarionette: A programmable network traffic obfuscation system,\u201d in 24th USENIX Security Symposium (USENIX Security 15), (Washington, D.C.), pp. 367--382, USENIX Association, 2015."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101777"},{"key":"e_1_3_2_1_83_1","volume-title":"Neural Information Processing Systems","author":"Baluja S.","year":"2017","unstructured":"S. Baluja, \u201cHiding images in plain sight: Deep steganography,\u201d in Neural Information Processing Systems, 2017."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2852771"},{"key":"e_1_3_2_1_85_1","volume-title":"harveyslash\/deep-steganography","author":"Harveyslash","year":"2018","unstructured":"Harveyslash, \u201charveyslash\/deep-steganography.\u201d https:\/\/github.com\/harveyslash\/Deep-Steganography, Apr 2018."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01554-1_4"},{"key":"e_1_3_2_1_87_1","volume-title":"Deep learning in steganography and steganalysis from 2015 to 2018","author":"Chaumont M.","year":"2019","unstructured":"M. Chaumont, \u201cDeep learning in steganography and steganalysis from 2015 to 2018,\u201d 2019."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi10060054"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-2058"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.5555\/3016100.3016285"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.5555\/3295222.3295349"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-2048"},{"key":"e_1_3_2_1_94_1","volume-title":"Real or fake? learning to discriminate machine from human generated text","author":"Bakhtin A.","year":"2019","unstructured":"A. Bakhtin, S. Gross, M. Ott, Y. Deng, M. Ranzato, and A. Szlam, \u201cReal or fake? learning to discriminate machine from human generated text,\u201d 2019."},{"key":"e_1_3_2_1_95_1","volume-title":"Gltr: Statistical detection and visualization of generated text","author":"Gehrmann S.","year":"2019","unstructured":"S. Gehrmann, H. Strobelt, and A. M. Rush, \u201cGltr: Statistical detection and visualization of generated text,\u201d 2019."},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3210080"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54631-0_19"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374406"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.72"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2017.i1.506-544"},{"key":"e_1_3_2_1_101_1","volume-title":"NIPS-W","author":"Paszke A.","year":"2017","unstructured":"A. Paszke, S. Gross, S. Chintala, G. Chanan, E. Yang, Z. DeVito, Z. Lin, A. Desmaison, L. Antiga, and A. Lerer, \u201cAutomatic differentiation in pytorch,\u201d in NIPS-W, 2017."},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-90Ar1"},{"key":"e_1_3_2_1_103_1","volume-title":"spro\/char-rnn.pytorch","author":"Robertson S.","year":"2017","unstructured":"S. Robertson, \u201cspro\/char-rnn.pytorch.\u201d https:\/\/github.com\/spro\/char-rnn.pytorch, Dec 2017."},{"key":"e_1_3_2_1_104_1","volume-title":"The human knowledge compression contest","author":"Hutter M.","year":"2006","unstructured":"M. Hutter, \u201cThe human knowledge compression contest.\u201d http:\/\/prize.hutter1.net\/, 2006."},{"key":"e_1_3_2_1_105_1","first-page":"605","volume-title":"22nd USENIX Security Symposium USENIX Security 13)","author":"Durumeric Z.","year":"2013","unstructured":"Z. Durumeric, E. Wustrow, and J. A. Halderman, \u201cZmap: Fast internet-wide scanning and its security applications,\u201d in Presented as part of the 22nd USENIX Security Symposium USENIX Security 13), pp. 605--620, 2013."},{"key":"e_1_3_2_1_106_1","unstructured":"S. Cutler \u201cProject 25499 ipv4 http scans.\u201d https:\/\/scans.io\/study\/mi."},{"key":"e_1_3_2_1_107_1","volume-title":"huggingface\/swift-coreml-transformers","year":"2019","unstructured":"HuggingFace, \u201chuggingface\/swift-coreml-transformers.\u201d https:\/\/github.com\/huggingface\/swift-coreml-transformers, Oct 2019."},{"key":"e_1_3_2_1_108_1","unstructured":"T. Simonite \u201cApple's latest iphones are packed with ai smarts.\u201d https:\/\/www.wired.com\/story\/apples-latest-iphones-packed-with-ai-smarts\/."},{"key":"e_1_3_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-28954-6_7"},{"key":"e_1_3_2_1_110_1","volume-title":"Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models","author":"Salem A.","year":"1806","unstructured":"A. Salem, Y. Zhang, M. Humbert, P. Berrang, M. Fritz, and M. Backes, \u201cMl-leaks: Model and data independent membership inference attacks and defenses on machine learning models,\u201d arXiv preprint arXiv:1806.01246, 2018."},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00044"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484550","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484550","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484550","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:54:07Z","timestamp":1763499247000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484550"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":111,"alternative-id":["10.1145\/3460120.3484550","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484550","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}