☆26Mar 24, 2023Updated 3 years ago
Alternatives and similar repositories for RL_attack
Users that are interested in RL_attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- ☆21Jan 17, 2022Updated 4 years ago
- [NeurIPS 2020, Spotlight] Code for "Robust Deep Reinforcement Learning against Adversarial Perturbations on Observations"☆143Nov 16, 2021Updated 4 years ago
- ☆19Mar 9, 2024Updated 2 years ago
- ☆43Jun 14, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆12Oct 24, 2024Updated last year
- ☆11Jul 8, 2024Updated last year
- ☆40Oct 15, 2025Updated 7 months ago
- ☆55Nov 3, 2019Updated 6 years ago
- ☆136Jul 25, 2024Updated last year
- ☆16Oct 1, 2025Updated 7 months ago
- Export files for GlobalPlatform APIs☆12Sep 30, 2020Updated 5 years ago
- Adversarial attacks in consensus-based multi-agent reinforcement learning☆25Feb 1, 2023Updated 3 years ago
- ☆12Jun 26, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- The implementation of the IEEE S&P 2024 paper MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Us…☆16May 12, 2024Updated 2 years ago
- ☆16Mar 24, 2023Updated 3 years ago
- ☆50Mar 10, 2016Updated 10 years ago
- 百度AI安全对抗赛第一名团队示例代码,基于官方给出的PGD修改,主要内容为L2-PGD+EOT。☆11Mar 17, 2021Updated 5 years ago
- Android application interacting with a JavaCard applet installed on SIM card☆18Sep 26, 2017Updated 8 years ago
- Circuit Synthesis for Yao's Garbled Circuit by TinyGarble☆11Sep 25, 2020Updated 5 years ago
- Code for paper: "Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures"☆21Jun 6, 2022Updated 3 years ago
- Defending AI-Based Automatic Modulation Recognition Models Against Adversarial Attacks☆11Jan 11, 2025Updated last year
- Tensorflow implementation of Generating Adversarial Examples with Adversarial Networks☆44Feb 7, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- The implementation of 1d-swin, an efficient transformer for capturing hierarchical 1-dimentional long range sequence☆23Jul 3, 2023Updated 2 years ago
- Code repository of the paper "Alleviating Adversarial Attacks on Variational Autoencoders with MCMC" published at NeurIPS 2022. https://a…☆10Dec 14, 2022Updated 3 years ago
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- ☆13Feb 5, 2025Updated last year
- Text file containing NSFW words aggregated from various sources.☆11Aug 23, 2020Updated 5 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆147Mar 25, 2023Updated 3 years ago
- A DSL for Linear Temporal Logic + Interface with Z3 for solving☆11Mar 12, 2015Updated 11 years ago
- Python package for ML developers and researchers to change certain variables while their code is executing to make the task of training a…☆11May 12, 2026Updated last week
- ☆16Aug 31, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆13Sep 28, 2024Updated last year
- Pytorch code for Sampling in Combinatorial Spaces with SurVAE Flow Augmented MCMC☆11Mar 1, 2021Updated 5 years ago
- Proof of concept code for DeepSteal (SP'22) Machine Learning model extraction (weight stealing) with memory side channel☆15Jun 22, 2023Updated 2 years ago
- Code and data for the ACM CIKM 2024 paper "Adversarial Text Rewriting for Text-aware Recommender Systems"☆12Aug 1, 2024Updated last year
- Code for identifying natural backdoors in existing image datasets.☆15Aug 24, 2022Updated 3 years ago
- Deep reinforcement learning for resource managment and job schedule. it is inspired by deeprm model and I will implement for in practica…☆12Jun 14, 2019Updated 6 years ago
- Official code for SA-Solver: Stochastic Adams Solver for Fast Sampling of Diffusion Models (NeurIPS 2023)☆13Mar 4, 2024Updated 2 years ago