john-cardiff / -cyborg-cage-2
☆11Updated last year
Alternatives and similar repositories for -cyborg-cage-2
Users that are interested in -cyborg-cage-2 are comparing it to the libraries listed below
Sorting:
- TTCP CAGE Challenge 2☆48Updated 11 months ago
- TTCP CAGE Challenge 3☆36Updated last year
- A Simulated Optimal Intrusion Response Game☆21Updated 3 years ago
- Cyber Operations Research Gym☆80Updated 11 months ago
- ☆54Updated 2 years ago
- Team Mindrake's hierarchical RL solution to the second CybORG CAGE challenge.☆14Updated 5 months ago
- ☆23Updated 3 years ago
- An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym☆80Updated 2 months ago
- Morphence: An implementation of a moving target defense against adversarial example attacks demonstrated for image classification models …☆22Updated 9 months ago
- Multi-Agent Reinforcement Learning on network-security☆19Updated 3 years ago
- The TTCP CAGE Challenges are a series of public challenges instigated to foster the development of autonomous cyber defensive agents. Thi…☆53Updated 3 weeks ago
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆37Updated 7 months ago
- ☆16Updated 2 years ago
- [NeurIPS 2020, Spotlight] State-Adversarial DQN (SA-DQN) for robust deep reinforcement learning☆34Updated 4 years ago
- Repository for Certified Defenses for Adversarial Patch ICLR-2020☆32Updated 4 years ago
- Deep RL agents for NASimEmu. See also https://github.com/jaromiru/NASimEmu.☆14Updated 10 months ago
- ☆66Updated 4 years ago
- Repository for Knowledge Enhanced Machine Learning Pipeline (KEMLP)☆10Updated 3 years ago
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆12Updated 2 years ago
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆34Updated 5 months ago
- Adversarial attacks on Deep Reinforcement Learning (RL)☆90Updated 4 years ago
- ☆27Updated 2 years ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19Updated 2 years ago
- Official PyTorch Implementation for Continual Learning and Private Unlearning☆14Updated 2 years ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆87Updated 4 years ago
- The official repo for GCP-CROWN paper☆13Updated 2 years ago
- Library for training globally-robust neural networks.☆28Updated last year
- Code for the paper "Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks"☆12Updated 2 years ago
- ☆20Updated 3 years ago
- Fighting Gradients with Gradients: Dynamic Defenses against Adversarial Attacks☆39Updated 3 years ago