☆30Nov 19, 2025Updated 4 months ago
Alternatives and similar repositories for CARLA-GeAR
Users that are interested in CARLA-GeAR are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Nov 15, 2021Updated 4 years ago
- ☆28Sep 22, 2022Updated 3 years ago
- Conditional Driving from Natural Language Instructions☆16Dec 9, 2022Updated 3 years ago
- This repository contains the ViewFool and ImageNet-V proposed by the paper “ViewFool: Evaluating the Robustness of Visual Recognition to …☆33Dec 18, 2023Updated 2 years ago
- A Paperlist of Adversarial Attack on Object Detection☆124Mar 16, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆22Jan 12, 2024Updated 2 years ago
- Tools for dataset generation based on CARLA simulator. (Data Collector)☆141Jan 13, 2026Updated 2 months ago
- Felzenszwalb and Huttenlocher's graph-based image segmentation algorithm, extended to use depth data in various ways☆11Oct 4, 2012Updated 13 years ago
- Public release of code for Robust Physical-World Attacks on Deep Learning Visual Classification (Eykholt et al., CVPR 2018)☆111Mar 25, 2021Updated 5 years ago
- PyTorch implementation of Expectation over Transformation☆13Jul 18, 2025Updated 8 months ago
- ☆19Oct 23, 2023Updated 2 years ago
- code for ICML 2021 paper in which we explore the relationship between adversarial transferability and knowledge transferability.☆16Dec 8, 2022Updated 3 years ago
- Examples of using Carla API for Autonomous Driving Simulation☆44Nov 10, 2023Updated 2 years ago
- Code for "Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink" (CVPR 2021)☆34Aug 18, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- HyperPose☆12Nov 6, 2025Updated 4 months ago
- 😎 A curated list of awesome real-world adversarial examples resources☆63Jul 29, 2020Updated 5 years ago
- Code for the paper "Rotation-Equivariant Conditional Spherical Neural Fields for Learning a Natural Illumination Prior" https://arxiv.org…☆45Nov 27, 2023Updated 2 years ago
- ☆18Dec 5, 2025Updated 3 months ago
- ☆44May 8, 2020Updated 5 years ago
- Main code of Dolphins dataset☆16Dec 29, 2022Updated 3 years ago
- This is an experiment platform with autonomous agent openpilot0.8.9 and simulator carla 9.11 without docker setups.☆11Jan 3, 2025Updated last year
- Code for "Adversarial Attack Generation Empowered by Min-Max Optimization", NeurIPS 2021☆19Dec 6, 2021Updated 4 years ago
- MSF-ADV is a novel physical-world adversarial attack method, which can fool the Multi Sensor Fusion (MSF) based autonomous driving (AD) p…☆81Aug 4, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- CARLA-KITTI generates synthetic data from the CARLA simulator for KITTI 2D/3D Object Detection task.☆47Sep 6, 2023Updated 2 years ago
- This repository contains our work on a comprehensive investigation on motion prediction for Autonomous Vehicles using the PowerBEV framew…☆11May 5, 2024Updated last year
- CDASim is an open-source simulation system supporting the development and testing of Cooperative Driving Automation applications.☆53Mar 10, 2026Updated 2 weeks ago
- Project creates BEV image of the given multi sensor data from CARLA simulator.☆12Oct 23, 2023Updated 2 years ago
- The first open-source synthetic dataset for collaborative perception focused on adverse weather conditions☆23Apr 29, 2025Updated 11 months ago
- ☆14Jul 26, 2021Updated 4 years ago
- https://winterwindwang.github.io/Full-coverage-camouflage-adversarial-attack/☆20May 9, 2022Updated 3 years ago
- Code for the paper entitled "Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack"…☆38Aug 12, 2021Updated 4 years ago
- CARLA-based 3D object detection and tracking dataset generator using KITTI-format☆14Jun 16, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- https://idrl-lab.github.io/Full-coverage-camouflage-adversarial-attack/☆58Oct 25, 2022Updated 3 years ago
- Git Repository for the ContextVLM paper and the DrivingContexts dataset☆14Sep 13, 2024Updated last year
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛☆24Oct 24, 2021Updated 4 years ago
- simulating sand cube collision using taichi mpm.☆12Aug 31, 2025Updated 6 months ago
- Conformal Trajectory Prediction with Multi-View Data Integration in Cooperative Driving☆15Aug 4, 2024Updated last year
- Log-Polar Space Convolution for Convolutional Neural Networks☆13Dec 12, 2022Updated 3 years ago
- This repository is the implementation of trajectory prediction's methods, such as LaneGCN, Vectornet, TNT...☆14May 26, 2023Updated 2 years ago