🕹️ Flappy Bird hack using Deep Reinforcement Learning with Double Q-learning
☆18Oct 9, 2021Updated 4 years ago
Alternatives and similar repositories for DQN-Flappy-Bird
Users that are interested in DQN-Flappy-Bird are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Deep Q Learning via Pytorch☆86Jan 9, 2018Updated 8 years ago
- Code implementation of: "Graying the black box: Understanding DQNs"☆20Feb 23, 2017Updated 9 years ago
- Pytorch implementation of Human-Level Control through Deep Reinforcement Learning☆11May 31, 2017Updated 8 years ago
- ☆42Oct 31, 2012Updated 13 years ago
- paper <<Hierarchical Deep Reinforcement Learning: Integrating Temporal Abstraction and Intrinsic Motivation>> python implementation☆10Mar 27, 2018Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Official repo of Object Detection with Self-Supervised Scene Adaptation [CVPR 2023] and Efficiency-preserving Scene-adaptive Object Detec…☆27Nov 10, 2024Updated last year
- A PyTorch implementation of Human-Level Control through Deep Reinforcement Learning☆24Jun 6, 2017Updated 8 years ago
- This reposotory is for a project about Distributed TDMA for Mobile UWB Network Localization☆15Jun 1, 2021Updated 4 years ago
- Simple GStreamer test programs for learning puporses.☆13Jul 27, 2013Updated 12 years ago
- ROMFS文件系统固件解析与提取☆12Dec 24, 2023Updated 2 years ago
- Trust Region Policy Optimization with Generalized Advantage Estimator☆16Nov 15, 2018Updated 7 years ago
- Gstreamer, Qt, RTSP server☆15Sep 7, 2018Updated 7 years ago
- Genetic algorithms for the placement of services in Fog domains☆14Apr 4, 2022Updated 4 years ago
- 使用Python的LeetCode解题笔记,详情访问 http://leetcode.xyu.ink/☆11Sep 7, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆39Oct 16, 2017Updated 8 years ago
- Cordova plugin for Foxit PDF SDK to View PDF Files☆22Aug 1, 2025Updated 9 months ago
- 🎸 Scaffold AI-friendly project structures for Vibe Coding☆56Jan 21, 2026Updated 3 months ago
- Option Critic with subgoal discovery by spectral decomposition of the Successor Features Matrix or clustering in Successor features space…☆24Nov 29, 2018Updated 7 years ago
- [Findings of EMNLP 2022] Expose Backdoors on the Way: A Feature-Based Efficient Defense against Textual Backdoor Attacks☆13Feb 26, 2023Updated 3 years ago
- ☆36Aug 2, 2016Updated 9 years ago
- ☆12Oct 11, 2020Updated 5 years ago
- 国内首款Java研发的xss跨站脚本漏洞测试平台☆21Dec 16, 2022Updated 3 years ago
- CVAE based School Idol image generation. Published in proc. of SSCC 2nd, 2017.☆12Nov 16, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Simple PuddleWorld DQN example using torch7☆29Jun 16, 2016Updated 9 years ago
- Using Kubernetes for Fog Computing☆38Dec 15, 2025Updated 4 months ago
- Official repository for AAAI'23 paper: Let Graph be the Go Board: Gradient-free Node Injection Attack for Graph Neural Networks via Reinf…☆30Nov 26, 2022Updated 3 years ago
- torch.optim.lr_scheduler☆10Mar 17, 2020Updated 6 years ago
- Mini Excel Reader(just .xlsx) for C++ & Lua☆21Aug 29, 2016Updated 9 years ago
- Code for the Adversarial Image Detectors and a Saliency Map☆12Mar 23, 2017Updated 9 years ago
- Security scanner for AI agent skills and MCP servers. Static analysis, incident response, no LLM. One binary. Detection engine behind o…☆76Apr 25, 2026Updated 2 weeks ago
- Code for "Training Adversarially Robust Sparse Networks via Bayesian Connectivity Sampling" [ICML 2021]☆10Mar 14, 2022Updated 4 years ago
- 自制安卓聊天app☆20Mar 1, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Reproducing Policy Distillation (DeepMind paper ICLR 2016)☆22Feb 17, 2020Updated 6 years ago
- These are the implementations of two service placement algorithms for fog computing in python 2.7. One is an ILP-based algorithm and the …☆24Apr 4, 2022Updated 4 years ago
- An on-demand application to allow ride sharing between users across longer distances than is feasible for common ride-sharing application…☆12May 29, 2017Updated 8 years ago
- ☆12Jun 18, 2020Updated 5 years ago
- Code for the paper Adversarial Robustness via Adversarial Label-Smoothing☆11Feb 5, 2020Updated 6 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Jun 7, 2021Updated 4 years ago
- [NeurIPS 2022] "Adversarial Training with Complementary Labels: On the Benefit of Gradually Informative Attacks"☆13Nov 11, 2022Updated 3 years ago