☆17Nov 15, 2021Updated 4 years ago
Alternatives and similar repositories for A-Paperlist-of-Adversarial-Attack-on-3D-Object-Detection
Users that are interested in A-Paperlist-of-Adversarial-Attack-on-3D-Object-Detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Paperlist of Adversarial Attack on Object Detection☆124Mar 16, 2023Updated 3 years ago
- ☆17Aug 17, 2021Updated 4 years ago
- ☆22Jan 12, 2024Updated 2 years ago
- ☆12Sep 22, 2023Updated 2 years ago
- ☆12Sep 14, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- https://arxiv.org/pdf/1906.11897.pdf☆23Oct 27, 2021Updated 4 years ago
- Geometric Adversarial Attacks and Defenses on 3D Point Clouds (3DV 2021)☆26Jun 25, 2023Updated 2 years ago
- Code for the paper: Adversarial Training Against Location-Optimized Adversarial Patches. ECCV-W 2020.☆47Oct 3, 2023Updated 2 years ago
- Generating 3D Adversarial Point Clouds☆106Jun 6, 2020Updated 5 years ago
- Diverse Generative Perturbations on Attention Space for Transferable Adversarial Attacks (ICIP 2022 Oral)☆19Oct 11, 2022Updated 3 years ago
- Evaluating Adversarial Attacks on Driving Safety in Vision-Based Autonomous Vehicles☆20Jul 26, 2023Updated 2 years ago
- (ICME2021) RPATTACK: REFINED PATCH ATTACK ON GENERAL OBJECT DETECTORS☆45Feb 14, 2022Updated 4 years ago
- 中国矿业大学本科毕业论文word模板2023版☆16Mar 29, 2023Updated 3 years ago
- MSF-ADV is a novel physical-world adversarial attack method, which can fool the Multi Sensor Fusion (MSF) based autonomous driving (AD) p…☆81Aug 4, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- [ECCV 2022] Shape Matters: Deformable Patch Attack☆22Feb 22, 2023Updated 3 years ago
- 本项目是将本文论文和项目中部分功能进行开源,可实现电动车头盔检测。采用SSD作为检测网络。涉及知识蒸馏、剪枝、多目标以及多窗口显示、trt推理等☆11Jun 19, 2023Updated 2 years ago
- Code for "Adversarial Attack Generation Empowered by Min-Max Optimization", NeurIPS 2021☆19Dec 6, 2021Updated 4 years ago
- Code for the paper entitled "Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack"…☆38Aug 12, 2021Updated 4 years ago
- [NeurIPS2021] Code Release of Learning Transferable Perturbations☆29Mar 28, 2026Updated last week
- ☆67Jun 2, 2022Updated 3 years ago
- List of state of the art papers, code, and other resources☆112Dec 3, 2022Updated 3 years ago
- [ICCV23] MixCycle: Mixup Assisted Semi-Supervised 3D Single Object Tracking witd Cycle Consistency☆14Dec 21, 2023Updated 2 years ago
- Towards Defending against Adversarial Examples via Attack-Invariant Features☆12Oct 12, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- [ICLR 2022] "Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?" by Yonggan Fu, Shunyao Zhang, Shang Wu…☆35Mar 16, 2022Updated 4 years ago
- A Backdoor Attack against 3D Point Cloud Classifiers (ICCV2021)☆18Oct 20, 2021Updated 4 years ago
- Short Summaries for papers in Adversarial Attacks and Defenses. Linked to a related blog post:☆28Sep 11, 2019Updated 6 years ago
- A comprehensive overview of Data Distillation and Condensation (DDC). DDC is a data-centric task where a representative (i.e., small but …☆13Dec 1, 2022Updated 3 years ago
- CVPR 2023 Use NeRF-generated images to train your model.☆79Jul 27, 2023Updated 2 years ago
- Code of our CVPR 2022 paper "Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Natural Phenomenon"☆64Sep 16, 2025Updated 6 months ago
- [TMLR 2024] On the Adversarial Robustness of Camera-based 3D Object Detection☆31Apr 23, 2024Updated last year
- ☆38Jul 13, 2020Updated 5 years ago
- ☆10Mar 20, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- code for "Exploring the Devil in Graph Spectral Domain for 3D Point Cloud Attacks"☆27Aug 8, 2023Updated 2 years ago
- 无需node环境在线编译运行react多文件代码,包含插件机制,支持简易定制化。☆13Mar 6, 2023Updated 3 years ago
- ☆11Jan 22, 2024Updated 2 years ago
- our code for paper '3D Adversarial Attacks Beyond Point Cloud ', Information Sciences, 2023☆36Mar 15, 2023Updated 3 years ago
- Code for "DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks"☆15Jul 13, 2022Updated 3 years ago
- A PyTorch port of the Neural 3D Mesh Renderer☆12Jul 27, 2022Updated 3 years ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆25Nov 30, 2023Updated 2 years ago