Open source implementation of the TrojDRL algorithm presented in TrojDRL: Evaluation of backdoor attacks on Deep Reinforcement Learning
☆20Jul 23, 2020Updated 5 years ago
Alternatives and similar repositories for rl_backdoor
Users that are interested in rl_backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [S&P 2024] Replication Package for "Mind Your Data! Hiding Backdoors in Offline Reinforcement Learning Datasets".☆32Dec 30, 2024Updated last year
- Code for ICLR 2022 publication: Who Is the Strongest Enemy? Towards Optimal and Efficient Evasion Attacks in Deep RL. https://openreview…☆10Aug 31, 2024Updated last year
- Adversarial attacks on Deep Reinforcement Learning (RL)☆98Feb 27, 2021Updated 5 years ago
- ☆11Apr 21, 2022Updated 3 years ago
- Iot-vulhub 自建镜像版☆12May 1, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Using PPO algorithm for collision avoidance training of unmanned vehicles in Gazebo☆25Dec 15, 2025Updated 3 months ago
- Adversarial attacks in consensus-based multi-agent reinforcement learning☆25Feb 1, 2023Updated 3 years ago
- Learning Backtracking Models, ICLR'19☆10Feb 2, 2018Updated 8 years ago
- A white box algorithm that generate adversarial examples according to the gradient☆11May 9, 2020Updated 5 years ago
- Safety Verification and Robustness Analysis of Neural Networks via Quadratic Constraints and Semidefinite Programming.☆14Jun 28, 2021Updated 4 years ago
- In this work, we propose a novel formulation titled Federated Deep Q Networks (F-DQN) to perform distributed learning for Deep RL algorit…☆21Dec 25, 2020Updated 5 years ago
- implementation for "learning weighted deterministic automata from queries and counterexamples", neurips 2019☆18Jan 8, 2020Updated 6 years ago
- PrivacyAsst: Safeguarding User Privacy in Tool-Using Large Language Model Agents (TDSC 2024)☆19Mar 29, 2024Updated 2 years ago
- a data collection of related work: Toward Understanding Deep Learning Framework Bugs☆17Oct 23, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Reference code modeling the communication framework conceived within the IEEE P1906.1 working group☆11Mar 22, 2017Updated 9 years ago
- RLCodebase: PyTorch Codebase For Deep Reinforcement Learning Algorithms☆28Jul 23, 2023Updated 2 years ago
- [NeurIPS 2020, Spotlight] Code for "Robust Deep Reinforcement Learning against Adversarial Perturbations on Observations"☆140Nov 16, 2021Updated 4 years ago
- Collections of powerful RL architectures with brief introductions.☆13Nov 20, 2020Updated 5 years ago
- Code for the paper "Reactive Exploration to Cope with Non-Stationarity in Lifelong Reinforcement Learning"☆15Jul 4, 2022Updated 3 years ago
- Code for paper "Universal Jailbreak Backdoors from Poisoned Human Feedback"☆65Apr 24, 2024Updated last year
- Target Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning☆10Jul 2, 2019Updated 6 years ago
- ☆13Mar 4, 2019Updated 7 years ago
- [COLM'24] "Deductive Beam Search: Decoding Deducible Rationale for Chain-of-Thought Reasoning"☆21Jun 14, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This repository contains a PyTorch implementation of the ICSE'26 paper "Scrub It Out! Erasing Sensitive Memorization in Code Language Mod…☆30Sep 18, 2025Updated 6 months ago
- MPTCP Deep Reinforcement Learning☆13Jun 22, 2018Updated 7 years ago
- Contains an implementation of "Imitation Learning via Kernel Mean Embedding (2018, AAAI)"☆11Oct 2, 2018Updated 7 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- 一些用于互联网算法岗面试复习用的常见手撕代码合集:排序算法、最短路算法、二叉树遍历算法、sql语句、nms算法、IOU算法、多头注意力MHA等☆21Mar 18, 2025Updated last year
- Comprehensive Assessment of Trustworthiness in Multimodal Foundation Models☆27Mar 15, 2025Updated last year
- [CCS 2025] DPImageBench is an open-source toolkit developed to facilitate the research and application of DP image synthesis.☆32Feb 19, 2026Updated last month
- ICL backdoor attack☆17Nov 4, 2024Updated last year
- A simple online questionnaire survey system☆23Sep 25, 2015Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Monitoring of AI Regulations☆19May 30, 2021Updated 4 years ago
- TRPO Implementation in Tensorflow 2.0 for Reinforcement Learning Project @ Sapienza☆16Mar 25, 2023Updated 3 years ago
- [ICLR 2021: Spotlight] Source code for the paper "A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Infer…☆14Feb 16, 2022Updated 4 years ago
- [ACL'25] UTBoost: Rigorous Evaluation of Coding Agents on SWE-Bench☆36Aug 12, 2025Updated 7 months ago
- Implementation of CoDAIL in the ICLR 2020 paper <Multi-Agent Interactions Modeling with Correlated Policies>☆19Jun 17, 2021Updated 4 years ago
- ☆15Oct 2, 2024Updated last year
- [ICLR 2025] Achieving Dimension-Free Communication in Federated Learning via Zeroth-Order Optimization☆26Jan 27, 2026Updated 2 months ago