john-cardiff / -cyborg-cage-2
☆11Updated last year
Alternatives and similar repositories for -cyborg-cage-2:
Users that are interested in -cyborg-cage-2 are comparing it to the libraries listed below
- TTCP CAGE Challenge 2☆46Updated 8 months ago
- A Simulated Optimal Intrusion Response Game☆21Updated 2 years ago
- ☆52Updated 2 years ago
- TTCP CAGE Challenge 3☆35Updated 9 months ago
- Morphence: An implementation of a moving target defense against adversarial example attacks demonstrated for image classification models …☆21Updated 5 months ago
- ☆64Updated 4 years ago
- Cyber Operations Research Gym☆67Updated 7 months ago
- ☆23Updated 3 years ago
- An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym☆75Updated last year
- ☆44Updated last year
- The TTCP CAGE Challenges are a series of public challenges instigated to foster the development of autonomous cyber defensive agents. Thi…☆45Updated 5 months ago
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆33Updated 4 months ago
- The code is for our NeurIPS 2019 paper: https://arxiv.org/abs/1910.04749☆32Updated 4 years ago
- Code for the paper "Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks"☆12Updated 2 years ago
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆25Updated 2 years ago
- code release for "Unrolling SGD: Understanding Factors Influencing Machine Unlearning" published at EuroS&P'22☆22Updated 2 years ago
- CROWN: A Neural Network Verification Framework for Networks with General Activation Functions☆38Updated 6 years ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆18Updated 2 years ago
- [NeurIPS 2020, Spotlight] State-Adversarial DQN (SA-DQN) for robust deep reinforcement learning☆34Updated 3 years ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆12Updated last month
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Updated 3 years ago
- Fighting Gradients with Gradients: Dynamic Defenses against Adversarial Attacks☆38Updated 3 years ago
- Repository for Certified Defenses for Adversarial Patch ICLR-2020☆32Updated 4 years ago
- A united toolbox for running major robustness verification approaches for DNNs. [S&P 2023]☆88Updated last year
- Bullseye Polytope Clean-Label Poisoning Attack☆14Updated 4 years ago
- Adversarial Example Attacks on Policy Learners☆40Updated 4 years ago
- Adversarial attacks in consensus-based multi-agent reinforcement learning☆20Updated last year
- ☆25Updated 2 years ago
- ☆24Updated 3 years ago
- The official implementation of A Unified Game-Theoretic Interpretation of Adversarial Robustness.☆22Updated 2 years ago