john-cardiff / -cyborg-cage-2
☆10Updated last year
Alternatives and similar repositories for -cyborg-cage-2:
Users that are interested in -cyborg-cage-2 are comparing it to the libraries listed below
- TTCP CAGE Challenge 2☆46Updated 9 months ago
- ☆53Updated 2 years ago
- Cyber Operations Research Gym☆73Updated 9 months ago
- TTCP CAGE Challenge 3☆36Updated 11 months ago
- Morphence: An implementation of a moving target defense against adversarial example attacks demonstrated for image classification models …☆22Updated 6 months ago
- A Simulated Optimal Intrusion Response Game☆21Updated 2 years ago
- ☆64Updated 4 years ago
- A defense algorithm which utilizes the combination of an auto- encoder and block-switching architecture. Auto-coder is intended to remove…☆21Updated 2 years ago
- ☆23Updated 3 years ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19Updated 2 years ago
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆25Updated 2 years ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆13Updated 2 months ago
- Repository for Knowledge Enhanced Machine Learning Pipeline (KEMLP)☆10Updated 3 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Updated 5 years ago
- The TTCP CAGE Challenges are a series of public challenges instigated to foster the development of autonomous cyber defensive agents. Thi…☆49Updated 6 months ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Updated 3 years ago
- The official implementation of A Unified Game-Theoretic Interpretation of Adversarial Robustness.☆22Updated 2 years ago
- Code for the paper "Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks"☆12Updated 2 years ago
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆11Updated 2 years ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆86Updated 4 years ago
- Repository for Certified Defenses for Adversarial Patch ICLR-2020☆32Updated 4 years ago
- The official implementation of CVPR 2021 paper "Simulating Unknown Target Models for Query-Efficient Black-box Attacks"☆57Updated 3 years ago
- Fighting Gradients with Gradients: Dynamic Defenses against Adversarial Attacks☆38Updated 3 years ago
- Is RobustBench/AutoAttack a suitable Benchmark for Adversarial Robustness?☆11Updated 2 years ago
- Code for ICML2019 Paper "On the Convergence and Robustness of Adversarial Training"☆34Updated 4 years ago
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆33Updated 5 months ago
- Reference implementation of the PRADA model stealing defense. IEEE Euro S&P 2019.☆33Updated 5 years ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆31Updated 11 months ago
- Craft poisoned data using MetaPoison☆49Updated 3 years ago
- An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym☆77Updated last week