ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2405.19424
  4. Cited By
Diffusion Policy Attacker: Crafting Adversarial Attacks for
  Diffusion-based Policies

Diffusion Policy Attacker: Crafting Adversarial Attacks for Diffusion-based Policies

29 May 2024
Yipu Chen
Haotian Xue
Yongxin Chen
    AAML
ArXivPDFHTML

Papers citing "Diffusion Policy Attacker: Crafting Adversarial Attacks for Diffusion-based Policies"

5 / 5 papers shown
Title
How vulnerable is my policy? Adversarial attacks on modern behavior cloning policies
How vulnerable is my policy? Adversarial attacks on modern behavior cloning policies
Basavasagar Patil
Akansha Kalra
Guanhong Tao
Daniel S. Brown
AAML
69
0
0
06 Feb 2025
Mobile ALOHA: Learning Bimanual Mobile Manipulation with Low-Cost
  Whole-Body Teleoperation
Mobile ALOHA: Learning Bimanual Mobile Manipulation with Low-Cost Whole-Body Teleoperation
Zipeng Fu
Tony Zhao
Chelsea Finn
100
281
0
04 Jan 2024
Planning with Diffusion for Flexible Behavior Synthesis
Planning with Diffusion for Flexible Behavior Synthesis
Michael Janner
Yilun Du
J. Tenenbaum
Sergey Levine
DiffM
202
622
0
20 May 2022
What Matters in Learning from Offline Human Demonstrations for Robot
  Manipulation
What Matters in Learning from Offline Human Demonstrations for Robot Manipulation
Ajay Mandlekar
Danfei Xu
J. Wong
Soroush Nasiriany
Chen Wang
Rohun Kulkarni
Li Fei-Fei
Silvio Savarese
Yuke Zhu
Roberto Martín-Martín
OffRL
139
461
0
06 Aug 2021
Adversarial Camouflage: Hiding Physical-World Attacks with Natural
  Styles
Adversarial Camouflage: Hiding Physical-World Attacks with Natural Styles
Ranjie Duan
Xingjun Ma
Yisen Wang
James Bailey
•. A. K. Qin
Yun Yang
AAML
151
222
0
08 Mar 2020
1