official Pytorch implementation of paper 'Improving transferability of 3D adversarial attacks with scale and shear transformations', Information Sciences, 2024
☆11Apr 26, 2024Updated last year
Alternatives and similar repositories for SS-attack
Users that are interested in SS-attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The code of "Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds" CVPR 2024☆36Mar 23, 2024Updated 2 years ago
- The code for AAAI2023 (Generating Transferable 3D Adversarial Point Cloud via Random Perturbation Factorization)☆13Dec 24, 2022Updated 3 years ago
- AdvPC: Transferable Adversarial Perturbations on 3D Point Clouds (ECCV 2020)☆45Oct 19, 2020Updated 5 years ago
- Code for Geometry-Aware Generation of Adversarial Point Clouds☆35Jul 15, 2021Updated 4 years ago
- list of papers, code, datasets and other resources☆14Jul 22, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- code for "Exploring the Devil in Graph Spectral Domain for 3D Point Cloud Attacks"☆27Aug 8, 2023Updated 2 years ago
- List of state of the art papers, code, and other resources☆112Dec 3, 2022Updated 3 years ago
- New distributional and shape attacks on neural networks that process 3D point cloud data.☆43Mar 24, 2023Updated 3 years ago
- ICRA 2020 papers focusing on point cloud analysis☆11Sep 17, 2020Updated 5 years ago
- ☆17Aug 17, 2021Updated 4 years ago
- ☆26Oct 3, 2023Updated 2 years ago
- Code Repository to check robustness of 3D Deep Learning (Volumetric and PointNet) to occlusion attacks☆15Apr 2, 2019Updated 7 years ago
- Robust Adversarial Objects against Deep Learning Models☆12Mar 28, 2020Updated 6 years ago
- Official implementation of the paper: ANF: Crafting transferable adversarial point clouds via adversarial noise factorization☆30Oct 6, 2025Updated 6 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- our code for paper '3D Adversarial Attacks Beyond Point Cloud ', Information Sciences, 2023☆36Mar 15, 2023Updated 3 years ago
- [CVPR 2022] Shape-invariant Adversarial Point Clouds☆48Nov 30, 2023Updated 2 years ago
- Generating 3D Adversarial Point Clouds☆106Jun 6, 2020Updated 5 years ago
- ECCV 2020 papers focusing on point cloud analysis☆21Apr 10, 2021Updated 5 years ago
- SAGA: Spectral Adversarial Geometric Attack on 3D Meshes (ICCV 2023)☆25Sep 25, 2023Updated 2 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- Tensorflow Implementation of "LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud-based Deep Networks", …☆25Aug 28, 2021Updated 4 years ago
- KITTI Object Detection with Distance Prediction☆12Jun 3, 2024Updated last year
- ☆18Dec 5, 2025Updated 4 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- curvature calculation of point cloud using python☆25Nov 12, 2020Updated 5 years ago
- Implementation of "Physical Attack on Monocular Depth Estimation with Optimal Adversarial Patches"☆26Aug 31, 2022Updated 3 years ago
- ICCV 2019 oral presentation☆88Mar 1, 2020Updated 6 years ago
- ICCV 2021 papers and code focus on point cloud analysis☆15Oct 21, 2021Updated 4 years ago
- Converting bin files scanned by LIDAR of autonomous vehicles into pcd files for further processing☆30Sep 2, 2023Updated 2 years ago
- CVPR 2021 papers and code focus on 3D Obeject Detection☆13Jul 28, 2021Updated 4 years ago
- This is the official pytorch implementation for paper: IF-Defense: 3D Adversarial Point Cloud Defense via Implicit Function based Restora…☆68Jul 6, 2021Updated 4 years ago
- [ECCV 2024] "REVISION: Rendering Tools Enable Spatial Fidelity in Vision-Language Models"☆13Aug 6, 2024Updated last year
- ☆21Nov 26, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A Survey of Physical Adversarial Attack in Computer Vision☆30Jul 23, 2024Updated last year
- A project to translate the Voynich Manuscript into English☆11Jun 30, 2023Updated 2 years ago
- [CVPR 2023] Understanding the Robustness of 3D Object Detection With Bird's-Eye-View Representations in Autonomous Driving☆32Apr 3, 2024Updated 2 years ago
- [NeurIPS 2025] Official code repository for "Failure Prediction at Runtime for Generative Robot Policies".☆33Nov 3, 2025Updated 5 months ago
- Code for the paper "PAD: Patch-Agnostic Defense against Adversarial Patch Attacks" (CVPR 2024)☆28Apr 28, 2024Updated last year
- This is the open-source optimization scripts(Test)☆12Jan 29, 2025Updated last year
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated last year