john-cardiff / -cyborg-cage-2Links
☆11Updated 2 years ago
Alternatives and similar repositories for -cyborg-cage-2
Users that are interested in -cyborg-cage-2 are comparing it to the libraries listed below
Sorting:
- TTCP CAGE Challenge 2☆48Updated last year
- TTCP CAGE Challenge 3☆36Updated last year
- Morphence: An implementation of a moving target defense against adversarial example attacks demonstrated for image classification models …☆23Updated 11 months ago
- ☆55Updated 2 years ago
- A Simulated Optimal Intrusion Response Game☆21Updated 3 years ago
- An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym☆82Updated 4 months ago
- Cyber Operations Research Gym☆87Updated last year
- ☆16Updated 2 years ago
- An environment for testing AI pentesting agents against a simulated network.☆189Updated last year
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆38Updated 10 months ago
- Repository for Certified Defenses for Adversarial Patch ICLR-2020☆33Updated 4 years ago
- ☆23Updated 3 years ago
- Adversarial attacks on Deep Reinforcement Learning (RL)☆91Updated 4 years ago
- The official implementation of A Unified Game-Theoretic Interpretation of Adversarial Robustness.☆22Updated 3 years ago
- Code for the paper "Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks"☆12Updated 2 years ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19Updated 3 years ago
- Team Mindrake's hierarchical RL solution to the second CybORG CAGE challenge.☆13Updated 7 months ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆31Updated 2 months ago
- ☆27Updated 2 years ago
- The TTCP CAGE Challenges are a series of public challenges instigated to foster the development of autonomous cyber defensive agents. Thi…☆56Updated 2 months ago
- Multi-Agent Reinforcement Learning on network-security☆19Updated 3 years ago
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆64Updated last year
- Adversarial Example Attacks on Policy Learners☆40Updated 4 years ago
- [NeurIPS 2020, Spotlight] State-Adversarial DQN (SA-DQN) for robust deep reinforcement learning☆34Updated 4 years ago
- Repository for Knowledge Enhanced Machine Learning Pipeline (KEMLP)☆10Updated 4 years ago
- ☆44Updated 2 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆12Updated 4 years ago
- A united toolbox for running major robustness verification approaches for DNNs. [S&P 2023]☆90Updated 2 years ago
- ☆66Updated 4 years ago
- Bullseye Polytope Clean-Label Poisoning Attack☆14Updated 4 years ago