john-cardiff / -cyborg-cage-2
☆10Updated last year
Alternatives and similar repositories for -cyborg-cage-2:
Users that are interested in -cyborg-cage-2 are comparing it to the libraries listed below
- TTCP CAGE Challenge 2☆47Updated 10 months ago
- TTCP CAGE Challenge 3☆36Updated last year
- A Simulated Optimal Intrusion Response Game☆21Updated 3 years ago
- Cyber Operations Research Gym☆77Updated 10 months ago
- ☆54Updated 2 years ago
- ☆23Updated 3 years ago
- Team Mindrake's hierarchical RL solution to the second CybORG CAGE challenge.☆12Updated 4 months ago
- Bullseye Polytope Clean-Label Poisoning Attack☆14Updated 4 years ago
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆25Updated 3 years ago
- Morphence: An implementation of a moving target defense against adversarial example attacks demonstrated for image classification models …☆22Updated 7 months ago
- ☆44Updated last year
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆35Updated 6 months ago
- Multi-Agent Reinforcement Learning on network-security☆19Updated 2 years ago
- This repository contains code and data of the paper **On the Limitations of Continual Learning for Malware Classification**, accepted to …☆17Updated last year
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19Updated 2 years ago
- The TTCP CAGE Challenges are a series of public challenges instigated to foster the development of autonomous cyber defensive agents. Thi…☆50Updated 7 months ago
- ☆64Updated 4 years ago
- Code for the paper "Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks"☆12Updated 2 years ago
- Fighting Gradients with Gradients: Dynamic Defenses against Adversarial Attacks☆38Updated 3 years ago
- Official repository for CVPR'23 paper: Detecting Backdoors in Pre-trained Encoders☆32Updated last year
- An evaluation framework for mitigating DNN backdoor attacks using data augmentations☆10Updated 4 years ago
- The code is for our NeurIPS 2019 paper: https://arxiv.org/abs/1910.04749☆34Updated 5 years ago
- code release for "Unrolling SGD: Understanding Factors Influencing Machine Unlearning" published at EuroS&P'22☆22Updated 3 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆58Updated 2 years ago
- Repository for Knowledge Enhanced Machine Learning Pipeline (KEMLP)☆10Updated 3 years ago
- Defending Against Backdoor Attacks Using Robust Covariance Estimation☆21Updated 3 years ago
- Source code for the Energy-Latency Attacks via Sponge Poisoning paper.☆15Updated 3 years ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆86Updated 4 years ago
- Official implementation of the CVPR 2022 paper "Backdoor Attacks on Self-Supervised Learning".☆72Updated last year
- This repository contains code implementation of the paper "AI-Guardian: Defeating Adversarial Attacks using Backdoors, at IEEE Security a…☆13Updated last year