alan-turing-institute / cage-challenge-2-publicView external linksLinks
Team Mindrake's hierarchical RL solution to the second CybORG CAGE challenge.
☆13Dec 2, 2024Updated last year
Alternatives and similar repositories for cage-challenge-2-public
Users that are interested in cage-challenge-2-public are comparing it to the libraries listed below
Sorting:
- GNN MARL Approach for the CAGE-4 automated cyber defense challenge☆13Nov 18, 2025Updated 2 months ago
- TTCP CAGE Challenge 2☆56Sep 25, 2025Updated 4 months ago
- Official Repository of the Entity-based Reinforcement Learning for Autonomous Cyber Defence paper.☆18Jan 24, 2025Updated last year
- The TTCP CAGE Challenges are a series of public challenges instigated to foster the development of autonomous cyber defensive agents. Thi…☆70Oct 27, 2025Updated 3 months ago
- CAGE Challenge 2 with bug fixes, an alternate simplified version and discussion/clarification about gameplay and using this environment.☆52Jan 7, 2026Updated last month
- Cyber Operations Research Gym☆111Jun 3, 2024Updated last year
- ARCD Primary-Level AI Training Environment (PrimAITE)☆26Mar 18, 2025Updated 10 months ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated 11 months ago
- Export files for GlobalPlatform APIs☆12Sep 30, 2020Updated 5 years ago
- Ethereum Identity Research for MSc Thesis at Trinity College Dublin☆10May 17, 2017Updated 8 years ago
- ☆14Feb 26, 2025Updated 11 months ago
- This approach of Intrusion Detection uses two GPT models, which are trained on normal network traffic, to predict sequences of communicat…☆11Oct 3, 2023Updated 2 years ago
- ☆10Aug 27, 2022Updated 3 years ago
- This repo contains the codes and the notebooks used for the paper "DarkVec: Automatic Analysis of Darknet Traffic with Word Embeddings".☆13Feb 3, 2024Updated 2 years ago
- The official implementation for Common Sense Enhanced Knowledge-based Recommendation with Large Language Model☆13Apr 21, 2024Updated last year
- 这个仓库包含了我在上人工智能课时完成的拼音输入法作业。☆11Feb 16, 2022Updated 4 years ago
- One-Pixel Shortcut: on the Learning Preference of Deep Neural Networks (ICLR 2023 Spotlight)☆14Sep 28, 2025Updated 4 months ago
- [NDSS'25] "Provably Unlearnable Data Examples"☆22Dec 10, 2025Updated 2 months ago
- ☆14Feb 11, 2022Updated 4 years ago
- Python scripts to download imagenet images and pre-proccess them☆11Jun 29, 2020Updated 5 years ago
- Usenix Security'23☆16Feb 14, 2023Updated 3 years ago
- Code for "LLM Embeddings Improve Test-time Adaptation to Tabular Y|X-Shifts"☆11Oct 17, 2024Updated last year
- Code of Multi-Defendant Legal Judgment Prediction via Hierarchical Reasoning☆13Apr 29, 2024Updated last year
- A Python library for processing and filtering TabLib☆13Aug 24, 2024Updated last year
- Towards an Explainable Artificial Intelligence Framework for Enhancing Explainability in Network Intrusion Detection Systems☆21Nov 30, 2024Updated last year
- This platform is designed and implemented for encrypted traffic classification using deep learning☆18Oct 7, 2023Updated 2 years ago
- ☆14Jul 24, 2024Updated last year
- Machine learning model for detecting DDoS attacks, CIC-DDoS2019 dataset☆22Nov 25, 2024Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆18Mar 3, 2022Updated 3 years ago
- Working examples of Deep Q Network of Reinforcement Learning☆14Apr 7, 2020Updated 5 years ago
- ☆20Nov 1, 2024Updated last year
- ☆16Jul 17, 2022Updated 3 years ago
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆27Apr 4, 2025Updated 10 months ago
- 词、句拼音转汉字、拼音分割、拼音补全、pygame输入中文☆15Mar 21, 2020Updated 5 years ago
- Breaking Certifiable Defenses☆17Nov 22, 2022Updated 3 years ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆18Jul 28, 2021Updated 4 years ago
- ☆17Nov 11, 2021Updated 4 years ago
- ☆20Oct 22, 2021Updated 4 years ago
- Invert the color of MNIST images with PyTorch (2017)☆16Jan 3, 2018Updated 8 years ago