pkiourti / rl_backdoor
Open source implementation of the TrojDRL algorithm presented in TrojDRL: Evaluation of backdoor attacks on Deep Reinforcement Learning
☆18Updated 4 years ago
Alternatives and similar repositories for rl_backdoor:
Users that are interested in rl_backdoor are comparing it to the libraries listed below
- Replication Package for "Mind Your Data! Hiding Backdoors in Offline Reinforcement Learning Datasets", IEEE S&P 2024.☆28Updated 3 months ago
- [NeurIPS 2020, Spotlight] Code for "Robust Deep Reinforcement Learning against Adversarial Perturbations on Observations"☆127Updated 3 years ago
- Robust Reinforcement Learning with the Alternating Training of Learned Adversaries (ATLA) framework☆63Updated 4 years ago
- [NeurIPS 2020, Spotlight] State-Adversarial DQN (SA-DQN) for robust deep reinforcement learning☆34Updated 4 years ago
- ☆16Updated 2 years ago
- Adversarial attacks on Deep Reinforcement Learning (RL)☆88Updated 4 years ago
- Adversarial attacks in consensus-based multi-agent reinforcement learning☆22Updated 2 years ago
- This repository contains the official code for our NeurIPS 2021 publication "Robust Deep Reinforcement Learning through Adversarial Loss…☆29Updated 3 years ago
- ☆26Updated 2 years ago
- Code used in our paper "Robust Deep Reinforment Learning through Adversarial Loss"☆33Updated last year
- [NeurIPS 2020 Spotlight] State-adversarial PPO for robust deep reinforcement learning☆27Updated 3 years ago
- A new model-based algorithm for offline inverse reinforcement learning☆14Updated 2 years ago
- ☆20Updated 3 years ago
- Code for the NeurIPS 2023 Paper: Robust Multi-Agent Reinforcement Learning via Adversarial Regularization: Theoretical Foundation and Sta…☆23Updated last year
- Code for "On the Robustness of Safe Reinforcement Learning under Observational Perturbations" (ICLR 2023)☆46Updated 4 months ago
- Adversarial Reinforcement Learning papers (single-agent setting and multi-agent setting)☆70Updated 2 years ago
- An implementation of Constrained Policy Optimization (Achiam 2017) in PyTorch☆24Updated 5 years ago
- Adversarial Example Attacks on Policy Learners☆40Updated 4 years ago
- ☆71Updated last year
- Attack AlphaZero Go agents (NeurIPS 2022)☆20Updated 2 years ago
- Code for "Constrained Variational Policy Optimization for Safe Reinforcement Learning" (ICML 2022)☆74Updated last year
- Value-Decomposition Multi-Agent Actor-Critics☆40Updated 2 years ago
- The offcial implementation of "ToM2C: Target-oriented Multi-agent Communication and Cooperation with Theory of Mind" (ICLR 2022) .☆62Updated 5 months ago
- Pytorch Implementation for First Order Constrained Optimization in Policy Space (FOCOPS).☆26Updated 3 years ago
- Deep Implicit Coordination Graphs☆41Updated 10 months ago
- Efficient Adversarial Training without Attacking: Worst-Case-Aware Robust Reinforcement Learning☆24Updated last year
- Pytorch implementation of Multi-Agent Generative Adversarial Imitation Learning☆41Updated 3 years ago
- [NeurIPS 2022 Oral] The official implementation of POR in "A Policy-Guided Imitation Approach for Offline Reinforcement Learning"☆58Updated 2 years ago
- pytorch implementation of "Efficient Communication in Multi-Agent Reinforcement Learning via Variance Based Control"☆53Updated 2 years ago
- Code accompanying the paper "Action Robust Reinforcement Learning and Applications in Continuous Control" https://arxiv.org/abs/1901.0918…☆43Updated 6 years ago