Code for the 'DARTS: Deceiving Autonomous Cars with Toxic Signs' paper
☆38Apr 21, 2018Updated 7 years ago
Alternatives and similar repositories for advml-traffic-sign
Users that are interested in advml-traffic-sign are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Classification, Object Detection, Adversarial Attack of Chinese Traffic Signs // 中式交通标志图片的分类、目标检测、对抗性攻击☆10Aug 12, 2020Updated 5 years ago
- ☆18Mar 26, 2019Updated 7 years ago
- Physical adversarial attack for fooling the Faster R-CNN object detector☆168Jan 13, 2020Updated 6 years ago
- YOLOv8 and CNN implemented for Sign Classification☆14May 11, 2023Updated 2 years ago
- ☆11Jun 21, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Artifacts for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations☆28Oct 22, 2021Updated 4 years ago
- A Game-Based Approximate Verification of Deep Neural Networks with Provable Guarantees☆20Dec 16, 2020Updated 5 years ago
- crawling google full size image☆10Nov 26, 2022Updated 3 years ago
- Code for "DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks"☆15Jul 13, 2022Updated 3 years ago
- Public release of code for Robust Physical-World Attacks on Deep Learning Visual Classification (Eykholt et al., CVPR 2018)☆111Mar 25, 2021Updated 5 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- ☆21Mar 14, 2025Updated last year
- https://arxiv.org/pdf/1906.11897.pdf☆23Oct 27, 2021Updated 4 years ago
- RISC-V YADAN Core, YADAN SoC, YADAN Board's Documentation, designed for engineering education. // 鸭蛋的文档。☆17Jan 16, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The implementation of our ICCV 2023 paper "Downstream-agnostic Adversarial Examples"☆69Aug 30, 2023Updated 2 years ago
- Ensemble Adversarial Black-Box Attacks against Deep Learning Systems Trained by MNIST, USPS and GTSRB Datasets☆34Dec 16, 2019Updated 6 years ago
- An example code of implement of PGD and FGSM algorithm for adversarial attack☆12Mar 3, 2022Updated 4 years ago
- Ensemble Adversarial Training on MNIST☆122Jun 20, 2017Updated 8 years ago
- Benchmarking and Visualization Tool for Adversarial Machine Learning☆188Apr 4, 2023Updated 3 years ago
- Paper https://arxiv.org/pdf/2306.06071.pdf Analysing how adversarial attacks aaffect YOLO Object Detection and visualising GradCAM☆23Dec 21, 2023Updated 2 years ago
- This is a simple Python implementation of the Real-Time Messaging Protocol (RTMP) server protocol. It provides basic handlers for process…☆17Jul 18, 2023Updated 2 years ago
- Implementation of Fast Reactive Control for Illumination Through Rain and Snow (de Charette et al., 2012)☆12Oct 29, 2024Updated last year
- [EMNLP 2025 Oral] IPIGuard: A Novel Tool Dependency Graph-Based Defense Against Indirect Prompt Injection in LLM Agents☆18Sep 16, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆38Jun 28, 2023Updated 2 years ago
- Game-Theoretic Adversarial Machine Learning Library☆60Oct 11, 2018Updated 7 years ago
- A repository for the paper "Real-Time Traffic Sign Recognition Based on Efficient CNNs in the Wild"☆154Apr 6, 2020Updated 6 years ago
- [Preprint] "Can 3D Adversarial Logos Cloak Humans?"☆18Dec 30, 2021Updated 4 years ago
- NDSS18: Detecting Adversarial Examples in Deep Neural Networks☆13Apr 20, 2017Updated 8 years ago
- [CVPR 2023] Official implementation of the Clean Feature Mixup (CFM) method☆23May 25, 2023Updated 2 years ago
- Code for "ObjectSeeker: Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking"☆14Jul 13, 2022Updated 3 years ago
- Code for our CVPR 2023 paper: Black-Box Sparse Adversarial Attack via Multi-Objective Optimisation☆29Jul 9, 2024Updated last year
- Adversarial Examples: Attacks and Defenses for Deep Learning☆31Apr 26, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆48Feb 9, 2021Updated 5 years ago
- A research workbench for developing and testing attacks against large language models, with a focus on prompt injection vulnerabilities a…☆47Apr 2, 2026Updated last week
- This is the official code implementation of A Survey on Unlearnable Data.☆26Apr 4, 2025Updated last year
- ML Open Sessions for Quant Club, SAIF http://www.saif.sjtu.edu.cn/☆18Oct 3, 2020Updated 5 years ago
- 📄 A Claude skill for comprehensive academic paper analysis — deep reports, mind maps, peer review, and promo scripts.☆60Mar 31, 2026Updated last week
- ROI_Align☆14Mar 11, 2020Updated 6 years ago
- 模型量化工程 Base pretrained models and datasets in pytorch (MNIST, SVHN, CIFAR10, CIFAR100, STL10, AlexNet, VGG16, VGG19, ResNet, Inception,…☆12Aug 3, 2018Updated 7 years ago