https://winterwindwang.github.io/Full-coverage-camouflage-adversarial-attack/
☆20May 9, 2022Updated 3 years ago
Alternatives and similar repositories for Full-coverage-camouflage-adversarial-attack
Users that are interested in Full-coverage-camouflage-adversarial-attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A PyTorch port of the Neural 3D Mesh Renderer☆12Jul 27, 2022Updated 3 years ago
- ☆22Jan 12, 2024Updated 2 years ago
- [TDSC 2025] Toward Robust and Accurate Adversarial Camouflage Generation against Vehicle Detectors☆15Aug 12, 2025Updated 7 months ago
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆93Mar 24, 2023Updated 3 years ago
- A Paperlist of Adversarial Attack on Object Detection☆124Mar 16, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- [ECCV'24 Oral] The official GitHub page for ''Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking …☆35Oct 23, 2024Updated last year
- MSF-ADV is a novel physical-world adversarial attack method, which can fool the Multi Sensor Fusion (MSF) based autonomous driving (AD) p…☆81Aug 4, 2021Updated 4 years ago
- Code for the paper entitled "Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack"…☆38Aug 12, 2021Updated 4 years ago
- ☆28Sep 22, 2022Updated 3 years ago
- https://arxiv.org/pdf/1906.11897.pdf☆23Oct 27, 2021Updated 4 years ago
- ICCV 2021☆32Oct 6, 2021Updated 4 years ago
- What's in the black box? As we go forward we will need a model and machine readable bill of materials.☆13Oct 17, 2023Updated 2 years ago
- ☆75Mar 30, 2025Updated 11 months ago
- The official implementation for "Towards Transferable Targeted 3D Adversarial Attack in the Physical World" (CVPR, 2024))☆42Aug 6, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆23Sep 1, 2020Updated 5 years ago
- Code repo of our paper Towards Understanding Jailbreak Attacks in LLMs: A Representation Space Analysis (https://arxiv.org/abs/2406.10794…☆24Jul 26, 2024Updated last year
- ☆14Oct 6, 2024Updated last year
- 使用open3d显示kitti数据的3D视角和BEV视角☆14Sep 26, 2022Updated 3 years ago
- Code for Geometry-Aware Generation of Adversarial Point Clouds☆35Jul 15, 2021Updated 4 years ago
- Official Tensorflow implementation for "Improving the Transferability of Adversarial Samples by Path-Augmented Method" (CVPR 2023).☆12Jun 16, 2023Updated 2 years ago
- Membership Inference Attack against Graph Neural Networks☆12Nov 9, 2022Updated 3 years ago
- ACL 2025 (Main) HiddenDetect: Detecting Jailbreak Attacks against Multimodal Large Language Models via Monitoring Hidden States☆159Jun 8, 2025Updated 9 months ago
- A pytorch implementation of "Adversarial Examples in the Physical World"☆18Sep 4, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Grid Patch Attack for Object Detection☆43Mar 31, 2022Updated 3 years ago
- A Framework for Evaluating AI Agent Safety in Realistic Environments☆30Oct 2, 2025Updated 5 months ago
- ☆12Sep 22, 2023Updated 2 years ago
- Efficient Adversarial Attack Strategy Against 3D Object Detection in Autonomous Driving Systems☆39Oct 7, 2025Updated 5 months ago
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛☆24Oct 24, 2021Updated 4 years ago
- Code for the paper "Jailbreak Large Vision-Language Models Through Multi-Modal Linkage"☆28Dec 6, 2024Updated last year
- Table top manipulation calibration between the robot arm, the fixed cameras and the camera in hand.☆11Apr 12, 2024Updated last year
- A novel physical adversarial attack tackling the Digital-to-Physical Visual Inconsistency problem.☆12Feb 5, 2025Updated last year
- [ICLR 2024] Inducing High Energy-Latency of Large Vision-Language Models with Verbose Images☆43Jan 25, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆12May 6, 2022Updated 3 years ago
- ☆30Nov 19, 2025Updated 4 months ago
- ☆27Oct 14, 2021Updated 4 years ago
- Few training heuristics and small architectural changes that can significantly improve YOLOv3 performance with tiny increase in inference…☆12May 10, 2020Updated 5 years ago
- Implementation of the paper "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation".☆31Dec 12, 2021Updated 4 years ago
- a pytorch version of AdvGAN for cifar10 dataset☆10Dec 21, 2019Updated 6 years ago
- [ACM MM 2023] Improving the Transferability of Adversarial Examples with Arbitrary Style Transfer.☆22Feb 23, 2024Updated 2 years ago