ITSEG-MQ / Adv-attack-and-defense-on-driving-modelView external linksLinks
Implementation of the paper "An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models"
☆17May 5, 2020Updated 5 years ago
Alternatives and similar repositories for Adv-attack-and-defense-on-driving-model
Users that are interested in Adv-attack-and-defense-on-driving-model are comparing it to the libraries listed below
Sorting:
- ☆28Sep 22, 2022Updated 3 years ago
- ☆14May 25, 2022Updated 3 years ago
- http://arxiv.org/abs/2403.17301☆52Jan 4, 2026Updated last month
- Adversarial Augmentation Against Adversarial Attacks☆32May 23, 2023Updated 2 years ago
- datawhale夏令营第四期协作开发任务☆11Sep 2, 2024Updated last year
- ☆14May 17, 2024Updated last year
- MSF-ADV is a novel physical-world adversarial attack method, which can fool the Multi Sensor Fusion (MSF) based autonomous driving (AD) p…☆81Aug 4, 2021Updated 4 years ago
- Blockchain-based PKI enhancement☆11May 7, 2018Updated 7 years ago
- Efficient Adversarial Attack Strategy Against 3D Object Detection in Autonomous Driving Systems☆38Oct 7, 2025Updated 4 months ago
- A detailed list of potentially dangerous file extensions☆17Jun 18, 2025Updated 7 months ago
- DeepSAVA: Sparse Adversarial Video Attacks with Spatial Transformations - BMVC 2021 & Neural Networks (2023)☆11Dec 13, 2024Updated last year
- ☆14Dec 27, 2020Updated 5 years ago
- Documentation for UMTRI's Connected Vehicle Dataset☆11Oct 15, 2020Updated 5 years ago
- ☆14Apr 26, 2022Updated 3 years ago
- The backbone CSPDarkNet of YOLOX.☆12Feb 8, 2022Updated 4 years ago
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 2 years ago
- Extensive study and research on Udacity Self-driving Car Challenge 2☆10Dec 11, 2021Updated 4 years ago
- Linear algebra-based Proof of Retrievability protocol for ensuring data integrity☆14Mar 28, 2022Updated 3 years ago
- CPSA exam prep resources☆17Sep 11, 2024Updated last year
- ☆10Apr 27, 2021Updated 4 years ago
- Simulator notes☆12Jun 7, 2020Updated 5 years ago
- Programming source codes of M. Shojafar (papers, reports, patents)☆14Mar 15, 2023Updated 2 years ago
- ☆23Aug 15, 2023Updated 2 years ago
- Official implementation of "RelaxLoss: Defending Membership Inference Attacks without Losing Utility" (ICLR 2022)☆48Aug 18, 2022Updated 3 years ago
- Detection Engineering Tools☆20Feb 9, 2026Updated last week
- Implementation and Simulation of a Vehicular Ad-Hoc Network in an urban scenario using Omnet++ 5.0, SUMO 0.25 and Veins 4.4.☆13May 24, 2022Updated 3 years ago
- ☆17Feb 5, 2025Updated last year
- ☆11Mar 3, 2019Updated 6 years ago
- Implementation for "Surrogate Losses for Online Learning of Stepsizes in Stochastic Non-Convex Optimization"☆10Aug 3, 2022Updated 3 years ago
- A TensorFlow implementation for Synthesizing Robust Adversarial Examples.☆14Oct 4, 2023Updated 2 years ago
- A P2P chat application client suitable for local area network(LAN)(Windows) developed using Qt5 and C++.☆14Jan 14, 2022Updated 4 years ago
- Split Bregman for Total Variation Image Recovery☆12Feb 15, 2019Updated 7 years ago
- The code for my paper 'Infrared small target detection based on non-convex optimization with Lp-norm constraint'.☆13Nov 25, 2020Updated 5 years ago
- A system which has a real-time & light-weight anomaly detection algorithm based on streaming data from UAV sensors in to order to get the…☆14Jan 3, 2020Updated 6 years ago
- Just another Process Injection using Process Hollowing technique.☆19Sep 18, 2023Updated 2 years ago
- code for ROMANCE☆14Oct 12, 2024Updated last year
- This repository contains PyTorch implementations of reinforcement learning algorithms. Its purpose is to provide straightforward and easi…☆18Nov 10, 2023Updated 2 years ago
- Lightweight library for bidirectional communication between two processes on the same computer. The library is cross-platform compatible,…☆14Jan 27, 2019Updated 7 years ago
- ☆18Feb 12, 2022Updated 4 years ago