WUSTL-CSPL / SlowLiDAR
☆11Updated last year
Alternatives and similar repositories for SlowLiDAR:
Users that are interested in SlowLiDAR are comparing it to the libraries listed below
- https://winterwindwang.github.io/Full-coverage-camouflage-adversarial-attack/☆15Updated 2 years ago
- MSF-ADV is a novel physical-world adversarial attack method, which can fool the Multi Sensor Fusion (MSF) based autonomous driving (AD) p…☆78Updated 3 years ago
- [USENIX'23] TPatch: A Triggered Physical Adversarial Patch☆19Updated last year
- This is the official implementation of our paper Untargeted Backdoor Attack against Object Detection.☆22Updated last year
- [CVPR 2022] Shape-invariant Adversarial Point Clouds☆44Updated last year
- REAP: A Large-Scale Realistic Adversarial Patch Benchmark☆23Updated last year
- Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability☆24Updated 2 years ago
- The repository is dedicated to tracking the latest advances in the field of Physical Adversarial Attack (PAA).☆87Updated last month
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆34Updated 10 months ago
- This repository is the official implementation of the paper "ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning…☆17Updated last year
- [CVPR 2024] "Data Poisoning based Backdoor Attacks to Contrastive Learning": official code implementation.☆13Updated 10 months ago
- An Embarrassingly Simple Backdoor Attack on Self-supervised Learning☆17Updated 11 months ago
- [ACM MM 2023] Improving the Transferability of Adversarial Examples with Arbitrary Style Transfer.☆17Updated 10 months ago
- A curated list of papers for the transferability of adversarial examples☆58Updated 6 months ago
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆33Updated last year
- A list of papers in NeurIPS 2022 related to adversarial attack and defense / AI security.☆72Updated 2 years ago
- [CVPR 2022] Official implementation of the Object-based Diverse Input (ODI) method☆22Updated 2 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆31Updated last year
- The official code of IEEE S&P 2024 paper "Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabili…☆16Updated 4 months ago
- Paper sharing in adversary related works☆45Updated 3 months ago
- LiangSiyuan21 / Parallel-Rectangle-Flip-Attack-A-Query-based-Black-box-Attack-against-Object-DetectionA Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆28Updated 3 years ago
- ☆27Updated 7 months ago
- ☆24Updated last year
- ☆16Updated 2 years ago
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆24Updated 2 years ago
- This is the repository for USENIX Security 2023 paper "Hard-label Black-box Universal Adversarial Patch Attack".☆15Updated last year
- Official Tensorflow implementation for "Improving Adversarial Transferability via Neuron Attribution-based Attacks" (CVPR 2022)☆34Updated last year
- Adversarial Texture for Fooling Person Detectors in the Physical World☆58Updated 2 months ago
- This is an official repository of ``VLAttack: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models'' (NeurIPS 2…☆41Updated 2 months ago
- ☆29Updated 2 years ago