☆30Nov 19, 2025Updated 3 months ago
Alternatives and similar repositories for CARLA-GeAR
Users that are interested in CARLA-GeAR are comparing it to the libraries listed below
Sorting:
- ☆28Sep 22, 2022Updated 3 years ago
- This repository contains the ViewFool and ImageNet-V proposed by the paper “ViewFool: Evaluating the Robustness of Visual Recognition to …☆33Dec 18, 2023Updated 2 years ago
- Implementation of Deep Adaptive LiDAR: End-to-end Optimization of Sampling and Depth Completion at Low Sampling Rates☆15May 21, 2020Updated 5 years ago
- A Paperlist of Adversarial Attack on Object Detection☆125Mar 16, 2023Updated 2 years ago
- PyTorch implementation of Expectation over Transformation☆13Jul 18, 2025Updated 7 months ago
- ☆17Nov 15, 2021Updated 4 years ago
- code for ICML 2021 paper in which we explore the relationship between adversarial transferability and knowledge transferability.☆17Dec 8, 2022Updated 3 years ago
- ☆22Jan 12, 2024Updated 2 years ago
- Conditional Driving from Natural Language Instructions☆16Dec 9, 2022Updated 3 years ago
- Code for the paper "Rotation-Equivariant Conditional Spherical Neural Fields for Learning a Natural Illumination Prior" https://arxiv.org…☆45Nov 27, 2023Updated 2 years ago
- Tools for dataset generation based on CARLA simulator. (Data Collector)☆137Jan 13, 2026Updated last month
- Code for "Adversarial Attack Generation Empowered by Min-Max Optimization", NeurIPS 2021☆19Dec 6, 2021Updated 4 years ago
- ☆44May 8, 2020Updated 5 years ago
- ☆25Nov 10, 2021Updated 4 years ago
- MSF-ADV is a novel physical-world adversarial attack method, which can fool the Multi Sensor Fusion (MSF) based autonomous driving (AD) p…☆81Aug 4, 2021Updated 4 years ago
- Code associated with the paper "Keyhole Imaging: Non-Line-of-Sight Imaging and Tracking of Moving Objects Along a Single Optical Path"☆26Jan 6, 2022Updated 4 years ago
- [ECCV 2022] Shape Matters: Deformable Patch Attack☆22Feb 22, 2023Updated 3 years ago
- https://idrl-lab.github.io/Full-coverage-camouflage-adversarial-attack/☆57Oct 25, 2022Updated 3 years ago
- Diffraction model-informed neural network for unsupervised layer-based computer-generated holography☆25Mar 7, 2023Updated 3 years ago
- https://arxiv.org/pdf/1906.11897.pdf☆23Oct 27, 2021Updated 4 years ago
- 😎 A curated list of awesome real-world adversarial examples resources☆62Jul 29, 2020Updated 5 years ago
- ☆23Sep 1, 2020Updated 5 years ago
- Code for the CVPR 2022 paper "Quantization-aware Deep Optics for Diffractive Snapshot Hyperspectral Imaging".☆27Oct 6, 2022Updated 3 years ago
- Official implementation for ICCV 2021 paper - Learning Privacy-preserving Optics for Human Pose Estimation☆30Jun 3, 2022Updated 3 years ago
- collection with description of super-resolution related papers, repositories, datasets, loss functions and etc.☆11Dec 12, 2023Updated 2 years ago
- ICCV 2021☆32Oct 6, 2021Updated 4 years ago
- Code for "Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink" (CVPR 2021)☆34Aug 18, 2021Updated 4 years ago
- ☆13Apr 14, 2025Updated 10 months ago
- PyTorch Implementation for the paper "Let Me Help You! Neuro-Symbolic Short-Context Action Anticipation" accepted to RA-L'24.☆12Nov 27, 2024Updated last year
- [CVPR 2025] Silence is Golden: Leveraging Adversarial Examples to Nullify Audio Control in LDM-based Talking-Head Generation☆19Dec 18, 2025Updated 2 months ago
- Project creates BEV image of the given multi sensor data from CARLA simulator.☆12Oct 23, 2023Updated 2 years ago
- ☆14Mar 27, 2025Updated 11 months ago
- ☆11Dec 27, 2022Updated 3 years ago
- ☆42Jan 25, 2024Updated 2 years ago
- Public repository for the 3DV 2024 spotlight paper "SALUDA: Surface-based Automotive Lidar Unsupervised Domain Adaptation".☆38Oct 30, 2024Updated last year
- Felzenszwalb and Huttenlocher's graph-based image segmentation algorithm, extended to use depth data in various ways☆11Oct 4, 2012Updated 13 years ago
- ☆15Sep 14, 2025Updated 5 months ago
- Transformer-based Trajectory Prediction using Higher-order Representations☆17Apr 4, 2025Updated 11 months ago
- Code and some materials from the papers "Selection of Source Images Heavily Influences the Effectiveness of Adversarial Attacks" (BMVC 20…☆12Nov 23, 2021Updated 4 years ago