☆26Mar 24, 2023Updated 2 years ago
Alternatives and similar repositories for RL_attack
Users that are interested in RL_attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- ☆21Jan 17, 2022Updated 4 years ago
- Robust Reinforcement Learning with the Alternating Training of Learned Adversaries (ATLA) framework☆68Jan 26, 2021Updated 5 years ago
- [NeurIPS 2020, Spotlight] Code for "Robust Deep Reinforcement Learning against Adversarial Perturbations on Observations"☆140Nov 16, 2021Updated 4 years ago
- ☆19Mar 9, 2024Updated 2 years ago
- ☆43Jun 14, 2022Updated 3 years ago
- ☆12Oct 24, 2024Updated last year
- ☆11Jul 8, 2024Updated last year
- ☆31Oct 15, 2025Updated 5 months ago
- ☆14Oct 10, 2025Updated 5 months ago
- ☆55Nov 3, 2019Updated 6 years ago
- ☆11Sep 3, 2020Updated 5 years ago
- ☆135Jul 25, 2024Updated last year
- Adversarial attacks in consensus-based multi-agent reinforcement learning☆25Feb 1, 2023Updated 3 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- Bullseye Polytope Clean-Label Poisoning Attack☆15Nov 5, 2020Updated 5 years ago
- ☆16Mar 24, 2023Updated 2 years ago
- AGAC: Adversarially Guided Actor-Critic☆47Sep 16, 2021Updated 4 years ago
- ☆50Mar 10, 2016Updated 10 years ago
- Boosting Transferability through Enhanced Momentum☆14Feb 23, 2024Updated 2 years ago
- ☆15Aug 12, 2024Updated last year
- Defending AI-Based Automatic Modulation Recognition Models Against Adversarial Attacks☆11Jan 11, 2025Updated last year
- Tensorflow implementation of Generating Adversarial Examples with Adversarial Networks☆43Feb 7, 2019Updated 7 years ago
- Code repository of the paper "Alleviating Adversarial Attacks on Variational Autoencoders with MCMC" published at NeurIPS 2022. https://a…☆10Dec 14, 2022Updated 3 years ago
- The implementation of 1d-swin, an efficient transformer for capturing hierarchical 1-dimentional long range sequence☆23Jul 3, 2023Updated 2 years ago
- ☆13Feb 5, 2025Updated last year
- Text file containing NSFW words aggregated from various sources.☆10Aug 23, 2020Updated 5 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆144Mar 25, 2023Updated 2 years ago
- Python package for ML developers and researchers to change certain variables while their code is executing to make the task of training a…☆11Apr 25, 2024Updated last year
- A DSL for Linear Temporal Logic + Interface with Z3 for solving☆11Mar 12, 2015Updated 11 years ago
- ☆26Nov 16, 2023Updated 2 years ago
- End-to-End Learning from Complex Multigraphs with Latent-Graph Convolutional Networks☆15Jul 25, 2024Updated last year
- Adversarial Reinforcement Learning papers (single-agent setting and multi-agent setting)☆76Sep 5, 2022Updated 3 years ago
- Code for identifying natural backdoors in existing image datasets.☆15Aug 24, 2022Updated 3 years ago
- Deep reinforcement learning for resource managment and job schedule. it is inspired by deeprm model and I will implement for in practica…☆12Jun 14, 2019Updated 6 years ago
- Official code for SA-Solver: Stochastic Adams Solver for Fast Sampling of Diffusion Models (NeurIPS 2023)☆13Mar 4, 2024Updated 2 years ago
- ☆17Oct 19, 2023Updated 2 years ago
- Operating system based off of blog_os, with the goal of running wasm modules as executables☆24Mar 29, 2023Updated 2 years ago
- Efficient multi-strategy Zotero search using code execution pattern☆43Jan 20, 2026Updated 2 months ago