☆25Jun 9, 2022Updated 3 years ago
Alternatives and similar repositories for PoltergeistAttack
Users that are interested in PoltergeistAttack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of the paper "An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models"☆18May 5, 2020Updated 5 years ago
- Track hijacking attack against Multiple-Object Tracking☆45Aug 27, 2019Updated 6 years ago
- Official PyTorch implemetation of paper "X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection".☆16Feb 21, 2023Updated 3 years ago
- [ICCV2021 Oral] Fooling LiDAR by Attacking GPS Trajectory☆71Jul 5, 2022Updated 3 years ago
- MSF-ADV is a novel physical-world adversarial attack method, which can fool the Multi Sensor Fusion (MSF) based autonomous driving (AD) p…☆82Aug 4, 2021Updated 4 years ago
- A compact, configurable RISC-V core☆13Jul 31, 2025Updated 7 months ago
- Datasets of audio adversarial examples for deep speech recognition systems and Python code of a detection system☆13May 6, 2023Updated 2 years ago
- this folder contains different algorithms implemented on FPGA☆12Dec 30, 2023Updated 2 years ago
- Classification, Object Detection, Adversarial Attack of Chinese Traffic Signs // 中式交通标志图片的分类、目标检测、对抗性攻击☆10Aug 12, 2020Updated 5 years ago
- ☆10Mar 8, 2025Updated last year
- 贴吧舆情监测及干预工具☆13May 10, 2017Updated 8 years ago
- Multi-Instance-GPU profiling tool☆59Apr 16, 2023Updated 2 years ago
- [IEEE VR'22] SPAA: Stealthy Projector-based Adversarial Attacks on Deep Image Classifiers☆12Jun 21, 2025Updated 9 months ago
- V2Verifer is an open-source project dedicated to wireless experimentation focused on the security of vehicle-to-vehicle (V2V) communicati…☆42Apr 24, 2025Updated 11 months ago
- ☆33Oct 13, 2025Updated 5 months ago
- NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems [USENIX Security '23]☆20Nov 17, 2022Updated 3 years ago
- FPGA routing delay sensors for effective remote power analysis attacks☆13Aug 13, 2024Updated last year
- ☆15May 10, 2023Updated 2 years ago
- There are some reproduced algorithms for learning from imbalanced data, including over-sampling,under-sampling and boosting☆13Jul 30, 2023Updated 2 years ago
- HOLMES: Health OnLine Model Ensemble Serving for Deep Learning Models in Intensive Care Units (KDD 2020)☆12Jan 25, 2021Updated 5 years ago
- PyTorch Implementation of paper "Attention-Based Bidirectional Long Short-Term Memory Networks for Relation Classification"☆11Mar 28, 2020Updated 5 years ago
- Source code for Jellyfish, a soft real-time inference serving system☆15Dec 20, 2022Updated 3 years ago
- ☆16Jul 28, 2022Updated 3 years ago
- PyTorch implementation of Stereopagnosia: Fooling Stereo Networks with Adversarial Perturbations (in AAAI 2021)☆13Mar 20, 2022Updated 4 years ago
- Deep Sensor Fusion for Single Source Robustness☆12Feb 5, 2026Updated last month
- This experimetal fuzzer is meant to be used for API in-memory fuzzing on Android.☆17Nov 26, 2019Updated 6 years ago
- This CG provides a safe space to assess use cases, modularization (role, scope, outcomes), existing and emerging AI architectures, progre…☆23Oct 9, 2025Updated 5 months ago
- [DATE 2023] Pipe-BD: Pipelined Parallel Blockwise Distillation☆12Jul 13, 2023Updated 2 years ago
- Implementation for "Surrogate Losses for Online Learning of Stepsizes in Stochastic Non-Convex Optimization"☆10Aug 3, 2022Updated 3 years ago
- This course introduced me to three cutting-edge technologies for privacy-preserving AI: Federated Learning, Differential Privacy, and Enc…☆11Sep 2, 2019Updated 6 years ago
- This repository contains the implementation of DPMLBench: Holistic Evaluation of Differentially Private Machine Learning☆11Nov 24, 2023Updated 2 years ago
- Code for paper "PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking"☆72Jul 13, 2022Updated 3 years ago
- 汽车信息安全事件时间轴☆91Mar 3, 2026Updated 3 weeks ago
- Documentation for UMTRI's Connected Vehicle Dataset☆11Oct 15, 2020Updated 5 years ago
- When sound hits an object, it causes small vibrations on the object’s surface. Here we show how, using only high-speed video of the objec…☆17Updated this week
- Python implementation of "A New Alternating Minimization Algorithm for Total Variation Image Reconstruction"☆10Jan 22, 2020Updated 6 years ago
- Unity plugin to protect your privacy in VR.☆18Aug 16, 2022Updated 3 years ago
- ☆14Jan 12, 2022Updated 4 years ago
- Unique identification of 50,000+ virtual reality users from their head and hand motion data☆14May 14, 2023Updated 2 years ago