Code Repository to check robustness of 3D Deep Learning (Volumetric and PointNet) to occlusion attacks
☆15Apr 2, 2019Updated 7 years ago
Alternatives and similar repositories for IterativeSalienceOcclusion
Users that are interested in IterativeSalienceOcclusion are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for Geometry-Aware Generation of Adversarial Point Clouds☆35Jul 15, 2021Updated 4 years ago
- ☆25Oct 3, 2023Updated 2 years ago
- Repository containing code for getting statistical guarantees on properties of BNNs☆13Apr 24, 2019Updated 7 years ago
- official Pytorch implementation of paper 'Improving transferability of 3D adversarial attacks with scale and shear transformations', Info…☆10Apr 26, 2024Updated 2 years ago
- New distributional and shape attacks on neural networks that process 3D point cloud data.☆42Mar 24, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Research on adversarial attacks and defenses for deep neural network 3D point cloud classifiers like PointNet and PointNet++.☆27May 22, 2020Updated 5 years ago
- The code of "Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds" CVPR 2024☆35Mar 23, 2024Updated 2 years ago
- AdvPC: Transferable Adversarial Perturbations on 3D Point Clouds (ECCV 2020)☆44Oct 19, 2020Updated 5 years ago
- Generating 3D Adversarial Point Clouds☆104Jun 6, 2020Updated 5 years ago
- Tensorflow Implementation of "LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud-based Deep Networks", …☆25Aug 28, 2021Updated 4 years ago
- The code for AAAI2023 (Generating Transferable 3D Adversarial Point Cloud via Random Perturbation Factorization)☆13Dec 24, 2022Updated 3 years ago
- Optimizers for performing approximate Bayesian inference on neural network parameters with Tensorflow and JAX☆13Feb 17, 2024Updated 2 years ago
- ☆17Aug 17, 2021Updated 4 years ago
- A Game-Based Approximate Verification of Deep Neural Networks with Provable Guarantees☆20Dec 16, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Public repository for paper "Finding Your (3D) Center: 3D object detection using a learned loss"☆17Nov 21, 2022Updated 3 years ago
- Repository for our ICCV 2019 paper: Adversarial Defense via Learning to Generate Diverse Attacks☆22Sep 6, 2021Updated 4 years ago
- An unofficial PyTorch implementation of MixMatch - A Holistic Approach to Semi-Supervised Learning☆14Aug 10, 2021Updated 4 years ago
- [CVPR 2022] Shape-invariant Adversarial Point Clouds☆48Nov 30, 2023Updated 2 years ago
- ☆14Oct 14, 2020Updated 5 years ago
- SegGCN: Efficient 3D Point Cloud Segmentation with Fuzzy Spherical Kernel☆31Jun 4, 2020Updated 5 years ago
- Code for "Unsupervised Visuomotor Control through Distributional Planning Networks"☆10Jun 27, 2019Updated 6 years ago
- code for "Exploring the Devil in Graph Spectral Domain for 3D Point Cloud Attacks"☆27Aug 8, 2023Updated 2 years ago
- Universal Adversarial Perturbations based on the (p, q)-singular vectors.☆12Jan 8, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Code of our recently published attack FDA: Feature Disruptive Attack. Colab Notebook: https://colab.research.google.com/drive/1WhkKCrzFq5…☆21Nov 11, 2019Updated 6 years ago
- PyTorch implementation to train MortonNet and use it to compute point features. MortonNet is trained in a self-supervised fashion, and th…☆22May 29, 2019Updated 6 years ago
- A Backdoor Attack against 3D Point Cloud Classifiers (ICCV2021)☆18Oct 20, 2021Updated 4 years ago
- ☆21Jan 15, 2024Updated 2 years ago
- [CVPR 2018] Tensorflow implementation of NAG : Network for Adversary Generation☆33May 24, 2018Updated 7 years ago
- [ACM MM 2023] Improving the Transferability of Adversarial Examples with Arbitrary Style Transfer.☆22Feb 23, 2024Updated 2 years ago
- ☆12Aug 17, 2020Updated 5 years ago
- Implementation for paper "PointMixup: Augmentation for Point Cloud". Accepted to ECCV 2020 as spotlight presentation☆97Dec 5, 2020Updated 5 years ago
- Code for "Testing Robustness Against Unforeseen Adversaries"☆80Jul 25, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Official code of paper "Efficient Joint Gradient Based Attack Against SOR Defense for 3D Point Cloud Classification" (MM'2020)☆22Oct 21, 2020Updated 5 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Apr 29, 2020Updated 6 years ago
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Jun 12, 2018Updated 7 years ago
- Code and Data for the paper "LPF-Defense: 3D Adversarial Defense based on Frequency Analysis", PLoS ONE☆16Nov 5, 2024Updated last year
- Source code for the paper "Policy Architectures for Compositional Generalization in Control"☆30May 19, 2022Updated 3 years ago
- The JPEG toolbox for Python☆16Mar 31, 2025Updated last year
- support code for "Leveraging Contact Forces for Learning to Grasp" , ICRA 2019☆23May 29, 2019Updated 6 years ago