Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

A question on 'example.ipynb' #26

Open
2019211753 opened this issue May 4, 2023 · 1 comment
Open

A question on 'example.ipynb' #26

2019211753 opened this issue May 4, 2023 · 1 comment

Comments

@2019211753
Copy link

'Attack Pong-PPO policy with Uniform Attack with attack frequenc7 0.5. Moreover, let's suppose we don't know the agent policy is PPO and let's perform attacks on a A2C policy trained on the same environment.'
What does it mean?

@2019211753
Copy link
Author

For example, using A2C as the victim policy instead of the targeted PPO policy to initialize the C&W attack, but attacking PPO, what is the effect? Is this to verify the transferability in black-box scenarios?Thanks a lot!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant