An awesome & curated list of autonomous driving security papers
☆76Jan 12, 2026Updated 3 months ago
Alternatives and similar repositories for Awesome-Autonomous-Driving-Security
Users that are interested in Awesome-Autonomous-Driving-Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repo for USENIX security 2024 paper "On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures" https://arxi…☆21Oct 19, 2025Updated 5 months ago
- Efficient Adversarial Attack Strategy Against 3D Object Detection in Autonomous Driving Systems☆39Oct 7, 2025Updated 6 months ago
- http://arxiv.org/abs/2403.17301☆54Jan 4, 2026Updated 3 months ago
- Implementation of "Physical Attack on Monocular Depth Estimation with Optimal Adversarial Patches"☆26Aug 31, 2022Updated 3 years ago
- The Pytorch implementation for the paper "Fusion is Not Enough: Single Modal Attack on Fusion Models for 3D Object Detection"☆20Mar 9, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆93Apr 1, 2026Updated 2 weeks ago
- ☆40Jan 7, 2023Updated 3 years ago
- Artifacts for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations☆28Oct 22, 2021Updated 4 years ago
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated last year
- ☆20Jan 15, 2024Updated 2 years ago
- This repository contains the implementation of DPMLBench: Holistic Evaluation of Differentially Private Machine Learning☆11Nov 24, 2023Updated 2 years ago
- [ICCV2021 Oral] Fooling LiDAR by Attacking GPS Trajectory☆71Jul 5, 2022Updated 3 years ago
- [TDSC 2025] Toward Robust and Accurate Adversarial Camouflage Generation against Vehicle Detectors☆16Aug 12, 2025Updated 8 months ago
- Evaluating Adversarial Attacks on Driving Safety in Vision-Based Autonomous Vehicles☆20Jul 26, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A Survey of Physical Adversarial Attack in Computer Vision☆30Jul 23, 2024Updated last year
- Implementation of the paper "An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models"☆18May 5, 2020Updated 5 years ago
- A demonstration codebase for the routing anomaly detection system featured in the USENIX Security 2024 paper, Learning with Semantics: To…☆27May 9, 2025Updated 11 months ago
- MSF-ADV is a novel physical-world adversarial attack method, which can fool the Multi Sensor Fusion (MSF) based autonomous driving (AD) p…☆82Aug 4, 2021Updated 4 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆15Oct 16, 2025Updated 6 months ago
- ☆11Feb 22, 2024Updated 2 years ago
- Code for "ObjectSeeker: Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking"☆15Jul 13, 2022Updated 3 years ago
- Sparse Video Generation Model for Embodied Navigation conditioned on loose language guidance, 100% real world verification☆70Mar 31, 2026Updated 2 weeks ago
- Forest of random partitioning trees for point-wise and collective anomaly detection☆12Nov 1, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆21Oct 9, 2020Updated 5 years ago
- ☆25Jun 9, 2022Updated 3 years ago
- Matrix multiplication on the NPU inside RK3588☆17Jun 27, 2024Updated last year
- [T-ITS 2024] EchoTrack: Auditory Referring Multi-Object Tracking for Autonomous Driving☆13Jun 8, 2025Updated 10 months ago
- ☆16Jan 5, 2024Updated 2 years ago
- ☆36Feb 8, 2026Updated 2 months ago
- ☆25Nov 14, 2022Updated 3 years ago
- [USENIX'23] TPatch: A Triggered Physical Adversarial Patch☆24Aug 8, 2023Updated 2 years ago
- Attacking Vision based Perception in End-to-end Autonomous Driving Models☆33Nov 22, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A pytorch implementation of the paper "Auditing Privacy Defenses in Federated Learning via Generative Gradient Leakage".☆62Oct 24, 2022Updated 3 years ago
- Is Your HD Map Constructor Reliable under Sensor Corruptions?☆37Aug 18, 2024Updated last year
- 基于Django 的漏洞管理预警系统☆31Feb 13, 2025Updated last year
- A PyTorch port of the Neural 3D Mesh Renderer☆12Jul 27, 2022Updated 3 years ago
- Leveraging BEV Maps in LLMs for Robust Closed-Loop Driving☆64Mar 11, 2026Updated last month
- code for AAAI accepted paper Similarity Distribution based Membership Inference Attack on Person Re-Identification.☆11Sep 29, 2024Updated last year
- Classification, Object Detection, Adversarial Attack of Chinese Traffic Signs // 中式交通标志图片的分类、目标检测、对抗性攻击☆10Aug 12, 2020Updated 5 years ago