john-cardiff / -cyborg-cage-2Links
☆11Updated 2 years ago
Alternatives and similar repositories for -cyborg-cage-2
Users that are interested in -cyborg-cage-2 are comparing it to the libraries listed below
Sorting:
- TTCP CAGE Challenge 2☆50Updated 3 weeks ago
- TTCP CAGE Challenge 3☆36Updated last year
- ☆55Updated 3 weeks ago
- An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym☆84Updated 7 months ago
- Deep RL agents for NASimEmu. See also https://github.com/jaromiru/NASimEmu.☆15Updated last year
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆39Updated last year
- A Simulated Optimal Intrusion Response Game☆21Updated 3 years ago
- Cyber Operations Research Gym☆94Updated last year
- Adversarial attacks on Deep Reinforcement Learning (RL)☆95Updated 4 years ago
- An environment for testing AI pentesting agents against a simulated network.☆193Updated last year
- Adversarial Example Attacks on Policy Learners☆40Updated 5 years ago
- ☆23Updated 3 years ago
- The official implementation of A Unified Game-Theoretic Interpretation of Adversarial Robustness.☆22Updated 3 years ago
- Code for the paper "Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks"☆13Updated 3 years ago
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆65Updated last year
- Morphence: An implementation of a moving target defense against adversarial example attacks demonstrated for image classification models …☆23Updated last year
- ☆27Updated 2 years ago
- Code for ICML2019 Paper "On the Convergence and Robustness of Adversarial Training"☆34Updated 5 years ago
- Repository for Certified Defenses for Adversarial Patch ICLR-2020☆34Updated 5 years ago
- Code for paper "PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking"☆71Updated 3 years ago
- A defense algorithm which utilizes the combination of an auto- encoder and block-switching architecture. Auto-coder is intended to remove…☆20Updated 3 years ago
- A united toolbox for running major robustness verification approaches for DNNs. [S&P 2023]☆90Updated 2 years ago
- A Python library for Secure and Explainable Machine Learning☆189Updated 3 months ago
- Implementation of adversarial training under fast-gradient sign method (FGSM), projected gradient descent (PGD) and CW using Wide-ResNet-…☆40Updated 5 years ago
- This course introduced me to three cutting-edge technologies for privacy-preserving AI: Federated Learning, Differential Privacy, and Enc…☆11Updated 6 years ago
- The TTCP CAGE Challenges are a series of public challenges instigated to foster the development of autonomous cyber defensive agents. Thi…☆60Updated 5 months ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆131Updated 3 weeks ago
- Fighting Gradients with Gradients: Dynamic Defenses against Adversarial Attacks☆39Updated 4 years ago
- [NeurIPS 2020, Spotlight] State-Adversarial DQN (SA-DQN) for robust deep reinforcement learning☆34Updated 4 years ago
- Certified Object Detection with Randomized Median Smoothing☆12Updated 4 years ago