Repository containing the PhD Thesis "Formal Verification of Deep Reinforcement Learning Agents"
☆11Aug 29, 2022Updated 3 years ago
Alternatives and similar repositories for SafeDRL
Users that are interested in SafeDRL are comparing it to the libraries listed below
Sorting:
- The Verifiably Safe Reinforcement Learning Framework☆57Jul 22, 2021Updated 4 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- A template for creating new SBTs inheriting from the Masa SBT smart contracts, using ZKP.☆11Nov 25, 2024Updated last year
- zkSnark circuit compiler☆12Feb 19, 2026Updated last week
- ☆12Nov 26, 2019Updated 6 years ago
- ☆11Mar 31, 2023Updated 2 years ago
- Safe SLAC, an algorithm for safe cost-constrained reinforcement learning in high-dimensional POMDPs.☆11Mar 1, 2023Updated 3 years ago
- Library built from scratch to implement zk-protocols☆13Dec 13, 2023Updated 2 years ago
- Artemis Academy capstone project☆10Sep 10, 2022Updated 3 years ago
- A python tool for solving reachability/safety, parity, weak parity and generalized parity games☆13Aug 16, 2018Updated 7 years ago
- ☆12Nov 29, 2023Updated 2 years ago
- PATRIOTIC - Pervasive Anti-Tampering and Anti-Repackaging for IoT for Integrated C-based Firmware☆10Jan 26, 2023Updated 3 years ago
- Cynthia Solomon's history of Logo☆12Jan 21, 2025Updated last year
- オリジナルの漢字テストを作成するWebアプリ☆12Mar 5, 2024Updated last year
- Open-source textbook about CHERI capabilities, for a developer audience☆18May 29, 2025Updated 9 months ago
- Examples for the VSRL-Framework☆11Sep 17, 2025Updated 5 months ago
- For TAMP experiments using Drake☆13Jun 4, 2024Updated last year
- Discord Bot that moderates Harassment along with Toxicity and Depressive Behavior☆12May 3, 2025Updated 9 months ago
- this will be used for attack graph engine MulVAL to evaluate risk assessment results for different network topologies.☆12Feb 23, 2016Updated 10 years ago
- [NeurIPS 2023] and [ICLR 2024] for robustness certification.☆10Nov 30, 2024Updated last year
- BandMaxSAT: Multi-armed Bandit for the Local Search MaxSAT Solver☆11Mar 28, 2023Updated 2 years ago
- ☆10Dec 9, 2021Updated 4 years ago
- A little sketch of a text-based time-rewinding game☆17Sep 24, 2011Updated 14 years ago
- An implementation of vdist2vec model in paper A Learning Based Approach to Predict Shortest-Path Distances☆11Apr 8, 2022Updated 3 years ago
- On Simple Reactive Neural Networks for Behaviour-Based Reinforcement Learning by Ameya Pore and Gerardo Aragon-Camarasa☆10Jan 28, 2020Updated 6 years ago
- Machine Learning meets eBPF☆15Apr 24, 2023Updated 2 years ago
- Compile circom code to llvm partially☆12Feb 14, 2023Updated 3 years ago
- banyan's hot on-chain data storage zk proofs☆14May 22, 2025Updated 9 months ago
- The Zero Knowledge Whitelist Tool is a powerful utility for managing an address whitelist using Zero-Knowledge (ZK) proofs.☆11Oct 3, 2025Updated 4 months ago
- ☆14Mar 11, 2021Updated 4 years ago
- In this project I implemented the Unscented Kalman Filter to estimate the state of multiple cars on a highway using noisy lidar and radar…☆12Feb 21, 2020Updated 6 years ago
- Fast subset and superset queries based on tries.☆11Jun 21, 2023Updated 2 years ago
- ☆12Oct 17, 2024Updated last year
- PDDL+ planning through compilation to SMT☆51Feb 15, 2023Updated 3 years ago
- The zero knowledge proof system used in Delta.☆13Mar 17, 2023Updated 2 years ago
- Aptos Keyless ZK circuit implementation in circom, together with a Rust-based ZK proving service☆20Feb 12, 2026Updated 2 weeks ago
- Solution to Kaggle's Google Research Football Competition☆14Dec 2, 2020Updated 5 years ago
- Tool to symbolically execute eBPF programs☆17Mar 5, 2024Updated last year
- A peer-to-peer network allowing private peer search proposed by Barry Whitehat and Kobi Gurkan.☆15Oct 29, 2024Updated last year