Shorya-Sharma / Game-Theory-For-Adversarial-Attacks-And-Defenses
This repo contains the code for the preprint 'Game Theory for Adversarial Attacks and Defenses' (https://arxiv.org/abs/2110.06166v2)
☆9Updated 3 years ago
Alternatives and similar repositories for Game-Theory-For-Adversarial-Attacks-And-Defenses:
Users that are interested in Game-Theory-For-Adversarial-Attacks-And-Defenses are comparing it to the libraries listed below
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆11Updated 2 years ago
- ☆9Updated 3 years ago
- This repo contains code and visualisation for "Robust moving target defence against false data injection attacks in power grids"☆22Updated 2 years ago
- This is code for finding the minimax/nash/stackelberg strategy of players in Markov Games.☆24Updated 5 years ago
- This repo contains all the codes and data for 'Blending Data and Physics Against False Data Injection Attack: An Event-Triggered Moving T…☆31Updated 2 years ago
- This is the code provided to support the paper of "Stackelberg Game Theory Based Optimization Model for the Design of Payment Mechanism i…☆25Updated 5 years ago
- ☆12Updated 5 years ago
- SFedChain: blockchain-based federated learning scheme for secure data sharing in distributed energy storage networks☆13Updated 2 years ago
- This repository includes a realization of the resilient projection-based consensus actor-critic algorithm that is resilient to adversaria…☆10Updated 2 years ago
- ☆13Updated last year
- This is the code repository for the paper "Zero-Sum Stochastic Stackelberg Games".☆15Updated 2 years ago
- ☆14Updated 3 years ago
- Solves a Mixed Integer Linear Program to generate the Stacklberg Equilibrium of a General-sum (+Bayesian) Games.☆36Updated 5 years ago
- A model free reinforcement learning algorithm for detect and defense task in a smart power system☆9Updated 6 years ago
- Locational Detection of False Data Injection Attack in Smart Grid: a Multi-label Classification Approach☆88Updated 2 years ago
- Computing Nash, Stackelberg game, and other types of equilibrium☆26Updated 4 years ago
- Developed a Moving Target Defense mechanism to prevent IP scanning from inside & outside the network. Controlled the packet flow in a SDN…☆28Updated 7 years ago
- This repository will have pre-processed dataset and related scripts for building Machine learning based model for classification of False…☆13Updated 4 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆11Updated last year
- Attacks and detection technique using matlab simulink in CPS.☆16Updated 4 years ago
- Adversarial attacks on Deep Reinforcement Learning (RL)☆87Updated 4 years ago
- Adversarial attacks in consensus-based multi-agent reinforcement learning☆22Updated 2 years ago
- ML framework for anomaly detection in the state estimation of the power system☆17Updated 2 years ago
- Contact: Maximilian Bachl, Alexander Hartl. Explores defenses against backdoors and poisoning attacks for Intrusion Detection Systems. Co…☆9Updated 4 years ago
- ☆12Updated 2 years ago
- ☆14Updated 10 months ago
- Supporting code for https://arxiv.org/abs/2010.00753.☆18Updated 3 years ago
- ☆14Updated 5 years ago
- matlab☆8Updated 6 years ago
- ☆12Updated 5 years ago