CSY-tvgo / Adversarial-Traffic-SignsLinks
Classification, Object Detection, Adversarial Attack of Chinese Traffic Signs // 中式交通标志图片的分类、目标检测、对抗性攻击
☆10Updated 4 years ago
Alternatives and similar repositories for Adversarial-Traffic-Signs
Users that are interested in Adversarial-Traffic-Signs are comparing it to the libraries listed below
Sorting:
- Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While D…☆134Updated 2 years ago
- A Paperlist of Adversarial Attack on Object Detection☆122Updated 2 years ago
- Generate adversarial patches against YOLOv5 🚀☆59Updated 7 months ago
- ☆36Updated 2 years ago
- https://arxiv.org/pdf/1906.11897.pdf☆22Updated 3 years ago
- 面向目标检测的对抗样本攻击☆22Updated 4 years ago
- A repository for the generation, visualization, and evaluation of patch based adversarial attacks on the yoloV3 object detection system☆20Updated 4 years ago
- ☆27Updated last year
- An adversarial attack on object detectors☆152Updated 3 years ago
- Real-time White-Box attacks against Object Detection.☆10Updated last year
- [CVPR 2023] T-SEA: Transfer-based Self-Ensemble Attack on Object Detection☆109Updated 10 months ago
- ☆18Updated 2 years ago
- ICCV 2021☆24Updated 3 years ago
- https://idrl-lab.github.io/Full-coverage-camouflage-adversarial-attack/☆50Updated 2 years ago
- Adversarial Texture for Fooling Person Detectors in the Physical World☆59Updated 9 months ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆91Updated 6 years ago
- Adversarial attack to detectors☆48Updated 3 years ago
- Implementation of the paper "An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models"☆17Updated 5 years ago
- A paper list for localized adversarial patch research☆154Updated 2 weeks ago
- ☆23Updated 10 months ago
- Paper https://arxiv.org/pdf/2306.06071.pdf Analysing how adversarial attacks aaffect YOLO Object Detection and visualising GradCAM☆22Updated last year
- A Survey of Physical Adversarial Attack in Computer Vision☆24Updated last year
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆133Updated 4 years ago
- The code of our paper: 'Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples', in Tensorflow.☆52Updated 3 months ago
- Artifacts for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations☆27Updated 3 years ago
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆44Updated 2 years ago
- ☆25Updated 2 years ago
- Robust Adversarial Perturbation on Deep Proposal-based Models☆25Updated 3 years ago
- Grid Patch Attack for Object Detection☆43Updated 3 years ago
- ☆17Updated 4 years ago