WUSTL-CSPL / SlowLiDAR
☆12Updated last year
Alternatives and similar repositories for SlowLiDAR:
Users that are interested in SlowLiDAR are comparing it to the libraries listed below
- MSF-ADV is a novel physical-world adversarial attack method, which can fool the Multi Sensor Fusion (MSF) based autonomous driving (AD) p…☆78Updated 3 years ago
- https://winterwindwang.github.io/Full-coverage-camouflage-adversarial-attack/☆17Updated 2 years ago
- A PyTorch port of the Neural 3D Mesh Renderer☆11Updated 2 years ago
- PyTorch implementation of Expectation over Transformation☆13Updated 2 years ago
- [CVPR 2024] "Data Poisoning based Backdoor Attacks to Contrastive Learning": official code implementation.☆15Updated 2 months ago
- [CVPR 2022] Shape-invariant Adversarial Point Clouds☆43Updated last year
- This is the repository for USENIX Security 2023 paper "Hard-label Black-box Universal Adversarial Patch Attack".☆15Updated last year
- REAP: A Large-Scale Realistic Adversarial Patch Benchmark☆26Updated last year
- Official Implementation of NIPS 2022 paper Pre-activation Distributions Expose Backdoor Neurons☆14Updated 2 years ago
- ☆19Updated 2 years ago
- ☆17Updated last year
- [CVPR 2023] The official implementation of our CVPR 2023 paper "Detecting Backdoors During the Inference Stage Based on Corruption Robust…☆23Updated last year
- LiangSiyuan21 / Parallel-Rectangle-Flip-Attack-A-Query-based-Black-box-Attack-against-Object-DetectionA Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆28Updated 3 years ago
- [USENIX'23] TPatch: A Triggered Physical Adversarial Patch☆20Updated last year
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Updated 2 years ago
- ☆12Updated last year
- A curated list of papers for the transferability of adversarial examples☆65Updated 9 months ago
- [ICLR 2022] "Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?" by Yonggan Fu, Shunyao Zhang, Shang Wu…☆33Updated 3 years ago
- Source code for ECCV 2022 Poster: Data-free Backdoor Removal based on Channel Lipschitzness☆30Updated 2 years ago
- Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo//124.220.228.133:11107☆17Updated 8 months ago
- Divide-and-Conquer Attack: Harnessing the Power of LLM to Bypass the Censorship of Text-to-Image Generation Mode☆18Updated 2 months ago
- [TMLR'24] On the Adversarial Robustness of Camera-based 3D Object Detection☆24Updated last year
- [ICLR 2024] Inducing High Energy-Latency of Large Vision-Language Models with Verbose Images☆33Updated last year
- Code for "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier"☆40Updated last year
- A data-free backdoor detector for deep neural networks☆15Updated 2 years ago
- Code for the paper "PAD: Patch-Agnostic Defense against Adversarial Patch Attacks" (CVPR 2024)☆20Updated 11 months ago
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆33Updated last week
- ☆48Updated 2 weeks ago
- Implementation of "Physical Attack on Monocular Depth Estimation with Optimal Adversarial Patches"☆22Updated 2 years ago
- ☆18Updated 2 years ago