http://arxiv.org/abs/2403.17301
☆55Jan 4, 2026Updated 4 months ago
Alternatives and similar repositories for 3D2Fool
Users that are interested in 3D2Fool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CNCA: Toward Customizable and Natural Generation of Adversarial Camouflage for Vehicle Detectors☆15Nov 3, 2024Updated last year
- ☆15Dec 18, 2024Updated last year
- ☆19Dec 5, 2025Updated 5 months ago
- The official implementation for "Towards Transferable Targeted 3D Adversarial Attack in the Physical World" (CVPR, 2024))☆42Aug 6, 2024Updated last year
- ☆93Apr 1, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Implementation of the paper "An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models"☆18May 5, 2020Updated 6 years ago
- Implementation of "Physical Attack on Monocular Depth Estimation with Optimal Adversarial Patches"☆25Aug 31, 2022Updated 3 years ago
- https://idrl-lab.github.io/Full-coverage-camouflage-adversarial-attack/☆59Oct 25, 2022Updated 3 years ago
- [TDSC 2025] Toward Robust and Accurate Adversarial Camouflage Generation against Vehicle Detectors☆16Aug 12, 2025Updated 8 months ago
- [TMLR 2024] On the Adversarial Robustness of Camera-based 3D Object Detection☆31Apr 23, 2024Updated 2 years ago
- Official PyTorch implementation of our paper "Adversarial Training of Self-supervised Monocular Depth Estimation against Physical-World A…☆11Feb 8, 2023Updated 3 years ago
- An awesome & curated list of autonomous driving security papers☆81Jan 12, 2026Updated 3 months ago
- ☆67Jun 2, 2022Updated 3 years ago
- AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models (ICCV 2023)☆19Jul 22, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- official Pytorch implementation of paper 'Improving transferability of 3D adversarial attacks with scale and shear transformations', Info…☆10Apr 26, 2024Updated 2 years ago
- Repo for USENIX security 2024 paper "On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures" https://arxi…☆21Oct 19, 2025Updated 6 months ago
- SAGA: Spectral Adversarial Geometric Attack on 3D Meshes (ICCV 2023)☆25Sep 25, 2023Updated 2 years ago
- Official implementation of the paper: ANF: Crafting transferable adversarial point clouds via adversarial noise factorization☆31Oct 6, 2025Updated 7 months ago
- ☆23Apr 7, 2026Updated last month
- ☆12Jun 13, 2025Updated 10 months ago
- code for paper "Physical-World Optical Adversarial Attacks on 3D Face Recognition"☆20Oct 19, 2023Updated 2 years ago
- Official Code for Epsilon-Mesh Attack (IEEE FG 2024)☆17Nov 14, 2024Updated last year
- This repository is the official implementation of [Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks (NeurIPS'22)](http…☆27Feb 13, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆36May 11, 2025Updated 11 months ago
- Code/Models for Defending Against Universal Attacks Through Selective Feature Regeneration, CVPR 2020☆10Jul 31, 2020Updated 5 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆263Nov 23, 2025Updated 5 months ago
- Automated Simulations of Adversarial Attacks on Arbitrary Objects in Realistic Scenes☆14Oct 5, 2025Updated 7 months ago
- Revisiting Transferable Adversarial Images (TPAMI 2025)☆141Sep 11, 2025Updated 7 months ago
- A Survey of Physical Adversarial Attack in Computer Vision☆30Jul 23, 2024Updated last year
- ☆10May 4, 2023Updated 3 years ago
- ☆43Oct 9, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆117Jul 21, 2022Updated 3 years ago
- ☆14Apr 18, 2022Updated 4 years ago
- GAM-Depth: Self-Supervised Indoor Depth Estimation Leveraging a Gradient-Aware Mask and Semantic Constraints☆12Apr 15, 2024Updated 2 years ago
- Official Code of "Imperceptible Adversarial Attack via Invertible Neural Networks"☆24Jul 24, 2024Updated last year
- The official implementation of the paper "Learning-to-Rank Meets Language: Boosting Language-Driven Ordering Alignment for Ordinal Classi…☆15Oct 8, 2023Updated 2 years ago
- Transcendental Idealism of Planner: Evaluating Perception from Planning Perspective for Autonomous Driving (ICML 2023)☆27Sep 1, 2023Updated 2 years ago
- The repository is dedicated to tracking the latest advances in the field of Physical Adversarial Attack (PAA).☆100Jun 30, 2025Updated 10 months ago