WUSTL-CSPL / SlowLiDAR
☆11Updated last year
Alternatives and similar repositories for SlowLiDAR:
Users that are interested in SlowLiDAR are comparing it to the libraries listed below
- https://winterwindwang.github.io/Full-coverage-camouflage-adversarial-attack/☆15Updated 2 years ago
- MSF-ADV is a novel physical-world adversarial attack method, which can fool the Multi Sensor Fusion (MSF) based autonomous driving (AD) p…☆78Updated 3 years ago
- This is the official implementation of our paper Untargeted Backdoor Attack against Object Detection.☆23Updated last year
- This is the repository for USENIX Security 2023 paper "Hard-label Black-box Universal Adversarial Patch Attack".☆15Updated last year
- PyTorch implementation of Expectation over Transformation☆13Updated 2 years ago
- [CVPR 2024] "Data Poisoning based Backdoor Attacks to Contrastive Learning": official code implementation.☆13Updated last week
- ☆42Updated last year
- ☆29Updated 8 months ago
- [USENIX'23] TPatch: A Triggered Physical Adversarial Patch☆18Updated last year
- An Embarrassingly Simple Backdoor Attack on Self-supervised Learning☆17Updated last year
- REAP: A Large-Scale Realistic Adversarial Patch Benchmark☆24Updated last year
- A list of papers in NeurIPS 2022 related to adversarial attack and defense / AI security.☆71Updated 2 years ago
- ☆14Updated last year
- Official Implementation for "Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models" (IE…☆12Updated last month
- A PyTorch port of the Neural 3D Mesh Renderer☆11Updated 2 years ago
- Paper sharing in adversary related works☆45Updated this week
- [CVPR 2023] The official implementation of our CVPR 2023 paper "Detecting Backdoors During the Inference Stage Based on Corruption Robust…☆21Updated last year
- Adversarial Texture for Fooling Person Detectors in the Physical World☆58Updated 4 months ago
- Code and data for PAN and PAN-phys.☆11Updated last year
- ☆29Updated 2 years ago
- ☆23Updated last year
- A curated list of papers for the transferability of adversarial examples☆60Updated 7 months ago
- LiangSiyuan21 / Parallel-Rectangle-Flip-Attack-A-Query-based-Black-box-Attack-against-Object-DetectionA Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆28Updated 3 years ago
- ☆55Updated 2 years ago
- ☆19Updated 2 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆31Updated 2 years ago
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆32Updated 3 months ago
- Code for identifying natural backdoors in existing image datasets.☆15Updated 2 years ago
- ☆24Updated 2 years ago
- The official code of IEEE S&P 2024 paper "Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabili…☆17Updated 6 months ago