CSY-tvgo / Adversarial-Traffic-SignsLinks
Classification, Object Detection, Adversarial Attack of Chinese Traffic Signs // 中式交通标志图片的分类、目标检测、对抗性攻击
☆10Updated 4 years ago
Alternatives and similar repositories for Adversarial-Traffic-Signs
Users that are interested in Adversarial-Traffic-Signs are comparing it to the libraries listed below
Sorting:
- Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While D…☆132Updated 2 years ago
- ☆34Updated 2 years ago
- Real-time White-Box attacks against Object Detection.☆10Updated last year
- ICCV 2021☆22Updated 3 years ago
- Adversarial attack to detectors☆48Updated 3 years ago
- Grid Patch Attack for Object Detection☆43Updated 3 years ago
- Implementation of the paper "An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models"☆16Updated 5 years ago
- Paper https://arxiv.org/pdf/2306.06071.pdf Analysing how adversarial attacks aaffect YOLO Object Detection and visualising GradCAM☆20Updated last year
- ☆20Updated 2 years ago
- [CVPR 2023] T-SEA: Transfer-based Self-Ensemble Attack on Object Detection☆108Updated 8 months ago
- https://arxiv.org/pdf/1906.11897.pdf☆21Updated 3 years ago
- https://idrl-lab.github.io/Full-coverage-camouflage-adversarial-attack/☆50Updated 2 years ago
- Robust Adversarial Perturbation on Deep Proposal-based Models☆25Updated 2 years ago
- Generate adversarial patches against YOLOv5 🚀☆56Updated 6 months ago
- ☆17Updated 4 years ago
- Code of our CVPR 2022 paper "Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Natural Phenomenon"☆62Updated 2 years ago
- 面向目标检测的对抗样本攻击☆22Updated 4 years ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆91Updated 6 years ago
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆44Updated 2 years ago
- A Paperlist of Adversarial Attack on Object Detection☆120Updated 2 years ago
- Code for the 'DARTS: Deceiving Autonomous Cars with Toxic Signs' paper☆38Updated 7 years ago
- ☆61Updated 3 years ago
- The code of our paper: 'Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples', in Tensorflow.☆52Updated last month
- Code for "Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink" (CVPR 2021)☆34Updated 3 years ago
- Official implementation of Segmentation and Complete (SAC) defense.☆21Updated last year
- ☆27Updated last year
- Adversarial Texture for Fooling Person Detectors in the Physical World☆59Updated 8 months ago
- A repository for the generation, visualization, and evaluation of patch based adversarial attacks on the yoloV3 object detection system☆20Updated 4 years ago
- A Survey of Physical Adversarial Attack in Computer Vision☆17Updated 11 months ago
- An adversarial attack on object detectors☆151Updated 3 years ago