xiaoweih / AISafetyLectureNotesLinks
Machine Learning Safety
☆39Updated 2 years ago
Alternatives and similar repositories for AISafetyLectureNotes
Users that are interested in AISafetyLectureNotes are comparing it to the libraries listed below
Sorting:
- Open source implementation of the TrojDRL algorithm presented in TrojDRL: Evaluation of backdoor attacks on Deep Reinforcement Learning☆19Updated 5 years ago
- Adversarial attacks on Deep Reinforcement Learning (RL)☆95Updated 4 years ago
- Attack AlphaZero Go agents (NeurIPS 2022)☆21Updated 2 years ago
- Robust Reinforcement Learning with the Alternating Training of Learned Adversaries (ATLA) framework☆66Updated 4 years ago
- alpha-beta-CROWN: An Efficient, Scalable and GPU Accelerated Neural Network Verifier (winner of VNN-COMP 2021, 2022, 2023, 2024, 2025)☆306Updated 7 months ago
- [S&P 2024] Replication Package for "Mind Your Data! Hiding Backdoors in Offline Reinforcement Learning Datasets".☆28Updated 8 months ago
- ☆21Updated 3 years ago
- ☆27Updated 2 years ago
- ☆16Updated 2 years ago
- [NeurIPS 2020, Spotlight] Code for "Robust Deep Reinforcement Learning against Adversarial Perturbations on Observations"☆136Updated 3 years ago
- Adversarial attacks in consensus-based multi-agent reinforcement learning☆24Updated 2 years ago
- Code used in our paper "Robust Deep Reinforment Learning through Adversarial Loss"☆33Updated last year
- auto_LiRPA: An Automatic Linear Relaxation based Perturbation Analysis Library for Neural Networks and General Computational Graphs☆325Updated 6 months ago
- CROWN: A Neural Network Verification Framework for Networks with General Activation Functions☆38Updated 6 years ago
- [NeurIPS 2020, Spotlight] State-Adversarial DQN (SA-DQN) for robust deep reinforcement learning☆34Updated 4 years ago
- Neural Network Verification Software Tool☆131Updated 3 weeks ago
- Codes for reproducing the robustness evaluation scores in “Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approac…☆52Updated 7 years ago
- A united toolbox for running major robustness verification approaches for DNNs. [S&P 2023]☆90Updated 2 years ago
- Official PyTorch implementation of "Query-Efficient and Scalable Black-Box Adversarial Attacks on Discrete Sequential Data via Bayesian O…☆25Updated last year
- A Survey on Explainable Reinforcement Learning: Concepts, Algorithms, Challenges☆247Updated 7 months ago
- β-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Neural Network Verification☆29Updated 3 years ago
- Official implementation of "Direct Preference-based Policy Optimization without Reward Modeling" (NeurIPS 2023)☆42Updated last year
- ☆39Updated 10 months ago
- This repository contains a simple implementation of Interval Bound Propagation (IBP) using TensorFlow: https://arxiv.org/abs/1810.12715☆161Updated 5 years ago
- Search-based Testing Approach of Reinforcement Learning Agent☆13Updated 9 months ago
- ☆68Updated this week
- Code for "A Cooperative-Competitive Multi-Agent Framework for Auto-bidding in Online Advertising" WSDM 2022☆24Updated 3 years ago
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- Repo for arXiv preprint "Gradient-based Adversarial Attacks against Text Transformers"☆108Updated 2 years ago
- A curated list of RL resources☆46Updated last month