Picture for Zhongyuan Hau

Zhongyuan Hau

Adversarial 3D Virtual Patches using Integrated Gradients

Add code
Jun 01, 2024
Figure 1 for Adversarial 3D Virtual Patches using Integrated Gradients
Figure 2 for Adversarial 3D Virtual Patches using Integrated Gradients
Figure 3 for Adversarial 3D Virtual Patches using Integrated Gradients
Figure 4 for Adversarial 3D Virtual Patches using Integrated Gradients
Viaarxiv icon

Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception

Add code
Apr 29, 2022
Figure 1 for Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception
Figure 2 for Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception
Figure 3 for Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception
Figure 4 for Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception
Viaarxiv icon

Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks

Add code
Apr 19, 2022
Figure 1 for Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks
Figure 2 for Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks
Figure 3 for Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks
Figure 4 for Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks
Viaarxiv icon

Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception

Add code
Jun 15, 2021
Figure 1 for Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception
Figure 2 for Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception
Figure 3 for Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception
Figure 4 for Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception
Viaarxiv icon

Object Removal Attacks on LiDAR-based 3D Object Detectors

Add code
Feb 07, 2021
Figure 1 for Object Removal Attacks on LiDAR-based 3D Object Detectors
Figure 2 for Object Removal Attacks on LiDAR-based 3D Object Detectors
Figure 3 for Object Removal Attacks on LiDAR-based 3D Object Detectors
Viaarxiv icon