Closed pkel closed 1 year ago
The $B_k$ protocol has some hard-coded attack strategies but they are not nearly optimal. Consider this graph from https://github.com/pkel/cpr/blob/training/experiments/rl-eval/compare-models-and-find-breakeven.ipynb.
Two ways forward:
Addressed in #40. I chose option 1 above.
The $B_k$ protocol has some hard-coded attack strategies but they are not nearly optimal. Consider this graph from https://github.com/pkel/cpr/blob/training/experiments/rl-eval/compare-models-and-find-breakeven.ipynb.
Two ways forward: