☆10Jun 13, 2025Updated 9 months ago
Alternatives and similar repositories for PADetBench
Users that are interested in PADetBench are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CNCA: Toward Customizable and Natural Generation of Adversarial Camouflage for Vehicle Detectors☆15Nov 3, 2024Updated last year
- ☆23Jun 25, 2023Updated 2 years ago
- ☆34May 11, 2025Updated 10 months ago
- Official Code of "Imperceptible Adversarial Attack via Invertible Neural Networks"☆24Jul 24, 2024Updated last year
- [ICML 2024] RAUCA: A robust and accurate adversarial camouflage generation method☆25Nov 29, 2025Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆14Apr 11, 2024Updated last year
- A Survey of Physical Adversarial Attack in Computer Vision☆30Jul 23, 2024Updated last year
- Implementation of the SWEVO paper: "Decentralised Aerial Swarm for Adaptive and Energy Efficient Transport of Unknown Loads".☆14May 9, 2023Updated 2 years ago
- Fragments-Expert is a software package for feature extraction from file fragments and classification among various file formats.☆13Jan 16, 2024Updated 2 years ago
- [NeurIPS 2023] Content-based Unrestricted Adversarial Attack☆31Jul 21, 2025Updated 8 months ago
- ☆19Apr 28, 2025Updated 11 months ago
- A Leaderboard for Certifiable Robustness against Adversarial Patch Attacks☆20Oct 30, 2023Updated 2 years ago
- ☆15Aug 5, 2020Updated 5 years ago
- The Pytorch implementation for the paper "Fusion is Not Enough: Single Modal Attack on Fusion Models for 3D Object Detection"☆20Mar 9, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Source code for the Energy-Latency Attacks via Sponge Poisoning paper.☆14Mar 14, 2022Updated 4 years ago
- System papers for connected and autonomous vehicle research☆14Apr 14, 2023Updated 2 years ago
- [USENIX'23] TPatch: A Triggered Physical Adversarial Patch☆24Aug 8, 2023Updated 2 years ago
- The implement of "Learning Spatial-Frequency Transformer for Visual Object Tracking"☆20Jun 29, 2023Updated 2 years ago
- [Apollo] This is the implementation of yolox3d first stage, a camera 2D object detection for autonomous driving perception.☆20Dec 7, 2023Updated 2 years ago
- [TDSC 2025] Toward Robust and Accurate Adversarial Camouflage Generation against Vehicle Detectors☆16Aug 12, 2025Updated 7 months ago
- The nexmon C-based firmware patching framework adapted for the ARC architecture.☆21Aug 9, 2018Updated 7 years ago
- Building Egocentric Procedural AI Assistant: Methods, Benchmarks, and Challenges☆43Feb 10, 2026Updated 2 months ago
- AdvLogo: Adversarial Patch Attack against Object Detectors based on Diffusion Models☆21Nov 8, 2025Updated 5 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Fully Decoupled Neural Network Learning Using Delayed Gradients (FDG)☆21Jul 5, 2021Updated 4 years ago
- Here you can find writeups from various CTFs that I've participated in.☆12Jul 30, 2023Updated 2 years ago
- PatchBackdoor is a code base associated with paper PatchBackdoor.☆12Aug 27, 2024Updated last year
- The repository is dedicated to tracking the latest advances in the field of Physical Adversarial Attack (PAA).☆100Jun 30, 2025Updated 9 months ago
- PyTorch code for BMVC 2018 ``Strong Baseline for Single Image Dehazing with Deep Features and Instance Normalization''☆20Nov 5, 2018Updated 7 years ago
- CVPR 2025 - Anyattack: Towards Large-scale Self-supervised Adversarial Attacks on Vision-language Models☆68Aug 7, 2025Updated 8 months ago
- AutoCast: Scalable Infrastructure-less Cooperative Perception for Distributed Collaborative Driving☆21Sep 23, 2022Updated 3 years ago
- http://arxiv.org/abs/2403.17301☆54Jan 4, 2026Updated 3 months ago
- Unified Adversarial Patch for Cross-modal Attacks in the Physical World (ICCV, 2023)☆46Dec 15, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A paper list for localized adversarial patch research☆163Jul 28, 2025Updated 8 months ago
- An OpenWRT fork for all the IEEE 802.11ad MikroTik devices☆17Nov 18, 2021Updated 4 years ago
- ICCV 2021☆14Oct 6, 2021Updated 4 years ago
- Artifacts for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations☆28Oct 22, 2021Updated 4 years ago
- An Approximated Gradient Sign Method Using Differential Evolution For Black-box Adversarial Attack☆11Feb 25, 2022Updated 4 years ago
- ☆12Mar 5, 2024Updated 2 years ago
- https://idrl-lab.github.io/Full-coverage-camouflage-adversarial-attack/☆58Oct 25, 2022Updated 3 years ago