Alert button
Picture for Zhongyuan Hau

Zhongyuan Hau

Alert button

Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception

Add code
Bookmark button
Alert button
Apr 29, 2022
Zhongyuan Hau, Soteris Demetriou, Emil C. Lupu

Figure 1 for Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception
Figure 2 for Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception
Figure 3 for Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception
Figure 4 for Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception
Viaarxiv icon

Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks

Add code
Bookmark button
Alert button
Apr 19, 2022
Kenneth T. Co, David Martinez-Rego, Zhongyuan Hau, Emil C. Lupu

Figure 1 for Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks
Figure 2 for Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks
Figure 3 for Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks
Figure 4 for Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks
Viaarxiv icon

Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception

Add code
Bookmark button
Alert button
Jun 15, 2021
Chengzeng You, Zhongyuan Hau, Soteris Demetriou

Figure 1 for Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception
Figure 2 for Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception
Figure 3 for Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception
Figure 4 for Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception
Viaarxiv icon

Object Removal Attacks on LiDAR-based 3D Object Detectors

Add code
Bookmark button
Alert button
Feb 07, 2021
Zhongyuan Hau, Kenneth T. Co, Soteris Demetriou, Emil C. Lupu

Figure 1 for Object Removal Attacks on LiDAR-based 3D Object Detectors
Figure 2 for Object Removal Attacks on LiDAR-based 3D Object Detectors
Figure 3 for Object Removal Attacks on LiDAR-based 3D Object Detectors
Viaarxiv icon