Classification, Object Detection, Adversarial Attack of Chinese Traffic Signs // 中式交通标志图片的分类、目标检测、对抗性攻击
☆10Aug 12, 2020Updated 5 years ago
Alternatives and similar repositories for Adversarial-Traffic-Signs
Users that are interested in Adversarial-Traffic-Signs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pytorch implementation with segmentation model and adversarial attacks☆14Oct 20, 2019Updated 6 years ago
- A Survey of Physical Adversarial Attack in Computer Vision☆30Jul 23, 2024Updated last year
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 8 years ago
- Code for the 'DARTS: Deceiving Autonomous Cars with Toxic Signs' paper☆38Apr 21, 2018Updated 7 years ago
- The repository is dedicated to tracking the latest advances in the field of Physical Adversarial Attack (PAA).☆100Jun 30, 2025Updated 8 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- ☆24Nov 5, 2024Updated last year
- ☆88Mar 3, 2026Updated 3 weeks ago
- Tensorflow implementation of integrated gradients presented in "Axiomatic Attribution for Deep Networks". It explains connections between…☆17Mar 11, 2019Updated 7 years ago
- RISC-V YADAN Core, YADAN SoC, YADAN Board's Documentation, designed for engineering education. // 鸭蛋的文档。☆17Jan 16, 2025Updated last year
- A behavior tree based on Lua closures☆13Sep 16, 2019Updated 6 years ago
- Dinghow's notes about Digital Art, School of Software Engineering, Tongji University☆12Sep 23, 2019Updated 6 years ago
- FACT is a tool to collect, process and visualise forensic data from clusters of machines running in the cloud or on-premise.☆17Aug 30, 2024Updated last year
- Implementation of 'FADet: A Multi-sensor 3D Object Detection Network based on Local Featured Attention'☆11Mar 27, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Implementation of Fast Reactive Control for Illumination Through Rain and Snow (de Charette et al., 2012)☆12Oct 29, 2024Updated last year
- Reproduction of the official SAF-FCOS repo.☆13Dec 4, 2023Updated 2 years ago
- A Toolkit for Converting Flowcharts to Pseudocode☆13Feb 12, 2023Updated 3 years ago
- Feature selection for machine learning using mutual information.☆15Dec 4, 2024Updated last year
- [ICCV 2023] "TRM-UAP: Enhancing the Transferability of Data-Free Universal Adversarial Perturbation via Truncated Ratio Maximization", Yi…☆13Jul 17, 2024Updated last year
- Unofficial PyTorch implementation of the paper "Multi-Label Image Recognition with Graph Convolutional Networks"☆10Feb 19, 2023Updated 3 years ago
- An approach to a blind discrete Wavelet Transformation (DWT) domain feature point based image watermarking technique is proposed in this …☆19Dec 23, 2014Updated 11 years ago
- [Preprint] "Can 3D Adversarial Logos Cloak Humans?"☆18Dec 30, 2021Updated 4 years ago
- A Visual RISC-V Simulator☆16Nov 7, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Solution of HackerEarth coding questions in JAVA 8.☆11Aug 17, 2020Updated 5 years ago
- A novel physical adversarial attack tackling the Digital-to-Physical Visual Inconsistency problem.☆12Feb 5, 2025Updated last year
- Fraud detection using Graph Convolutional Networks☆13May 9, 2022Updated 3 years ago
- ☆14Mar 1, 2021Updated 5 years ago
- Python code for inserting a watermark in the host image using Discrete Wavelet Transform and Singular Value Decomposition☆20May 14, 2019Updated 6 years ago
- Using a Tensorflow Lite Micro model this edge device keeps an ear out and vibrates if you are snoring.☆19Sep 20, 2021Updated 4 years ago
- detailed notes for PointNet☆11Oct 23, 2020Updated 5 years ago
- ☆19Oct 6, 2023Updated 2 years ago
- Image classification using pytorch on German Traffic Sign data set☆10Jan 10, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Train a model to detect Chinese traffic signs and signals with tensorflow object detection API☆18Jan 25, 2018Updated 8 years ago
- This is a friend recommendation systems which are used on social media platforms (e.g. Facebook, Instagram, Twitter) to suggest friends/n…☆12Feb 15, 2024Updated 2 years ago
- Code for generating adversarial color-shifted images☆19Nov 11, 2019Updated 6 years ago
- Final Project for COMP 551. A detailed tutorial on the various techniques employed for adversarial attacks on machine learning classifier…☆12May 16, 2017Updated 8 years ago
- 第三届阿里云安全算法挑战赛☆37Jul 6, 2023Updated 2 years ago
- A very limited implementation of arXiv:1904.00759☆13Dec 2, 2019Updated 6 years ago
- pytorch实现的Faster-RCNN模型,参考了许多人写的代码积累起来的。☆13Jul 30, 2020Updated 5 years ago