https://winterwindwang.github.io/Full-coverage-camouflage-adversarial-attack/
☆20May 9, 2022Updated 3 years ago
Alternatives and similar repositories for Full-coverage-camouflage-adversarial-attack
Users that are interested in Full-coverage-camouflage-adversarial-attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A PyTorch port of the Neural 3D Mesh Renderer☆12Jul 27, 2022Updated 3 years ago
- ☆67Jun 2, 2022Updated 3 years ago
- https://idrl-lab.github.io/Full-coverage-camouflage-adversarial-attack/☆58Oct 25, 2022Updated 3 years ago
- ☆22Jan 12, 2024Updated 2 years ago
- [TDSC 2025] Toward Robust and Accurate Adversarial Camouflage Generation against Vehicle Detectors☆16Aug 12, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- [ICML 2024] RAUCA: A robust and accurate adversarial camouflage generation method☆25Nov 29, 2025Updated 4 months ago
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆93Mar 24, 2023Updated 3 years ago
- ☆44May 8, 2020Updated 5 years ago
- A Paperlist of Adversarial Attack on Object Detection☆124Mar 16, 2023Updated 3 years ago
- [ECCV'24 Oral] The official GitHub page for ''Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking …☆35Oct 23, 2024Updated last year
- MSF-ADV is a novel physical-world adversarial attack method, which can fool the Multi Sensor Fusion (MSF) based autonomous driving (AD) p…☆81Aug 4, 2021Updated 4 years ago
- https://arxiv.org/pdf/1906.11897.pdf☆23Oct 27, 2021Updated 4 years ago
- code for ICML 2021 paper in which we explore the relationship between adversarial transferability and knowledge transferability.☆16Dec 8, 2022Updated 3 years ago
- What's in the black box? As we go forward we will need a model and machine readable bill of materials.☆13Oct 17, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- object detection, adversarial robustness, ICIP2021☆17Jan 10, 2021Updated 5 years ago
- ☆75Mar 30, 2025Updated last year
- The official implementation for "Towards Transferable Targeted 3D Adversarial Attack in the Physical World" (CVPR, 2024))☆42Aug 6, 2024Updated last year
- ☆23Sep 1, 2020Updated 5 years ago
- Code repo of our paper Towards Understanding Jailbreak Attacks in LLMs: A Representation Space Analysis (https://arxiv.org/abs/2406.10794…☆24Jul 26, 2024Updated last year
- Patch adversarial attack; object detection; CIKM2020 安全AI挑战者计划第四期:通用目标检测的对抗攻击☆44Oct 24, 2021Updated 4 years ago
- [InterSpeech'2023] "Betray Oneself: A Novel Audio DeepFake Detection Model via Mono-to-Stereo Conversion"☆13Mar 14, 2024Updated 2 years ago
- Automated Simulations of Adversarial Attacks on Arbitrary Objects in Realistic Scenes☆14Oct 5, 2025Updated 6 months ago
- 使用open3d显示kitti数据的3D视角和BEV视角☆14Sep 26, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Code for Geometry-Aware Generation of Adversarial Point Clouds☆35Jul 15, 2021Updated 4 years ago
- ☆16Dec 12, 2022Updated 3 years ago
- ACL 2025 (Main) HiddenDetect: Detecting Jailbreak Attacks against Multimodal Large Language Models via Monitoring Hidden States☆159Jun 8, 2025Updated 10 months ago
- A pytorch implementation of "Adversarial Examples in the Physical World"☆18Sep 4, 2019Updated 6 years ago
- Grid Patch Attack for Object Detection☆43Mar 31, 2022Updated 4 years ago
- A Framework for Evaluating AI Agent Safety in Realistic Environments☆31Oct 2, 2025Updated 6 months ago
- ☆12Sep 22, 2023Updated 2 years ago
- Efficient Adversarial Attack Strategy Against 3D Object Detection in Autonomous Driving Systems☆39Oct 7, 2025Updated 6 months ago
- Pytorch implementation of Location-free Camouflge Generation Network☆23May 9, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛☆24Oct 24, 2021Updated 4 years ago
- Table top manipulation calibration between the robot arm, the fixed cameras and the camera in hand.☆11Apr 12, 2024Updated 2 years ago
- Code for the paper: Adversarial Training Against Location-Optimized Adversarial Patches. ECCV-W 2020.☆47Oct 3, 2023Updated 2 years ago
- A novel physical adversarial attack tackling the Digital-to-Physical Visual Inconsistency problem.☆12Feb 5, 2025Updated last year
- CNCA: Toward Customizable and Natural Generation of Adversarial Camouflage for Vehicle Detectors☆15Nov 3, 2024Updated last year
- Code for the paper "Jailbreak Large Vision-Language Models Through Multi-Modal Linkage"☆29Dec 6, 2024Updated last year
- [ICLR 2024] Inducing High Energy-Latency of Large Vision-Language Models with Verbose Images☆42Jan 25, 2024Updated 2 years ago