Homepage
Open in app
Sign in
Get started
d*classified
field notes from the defence tech frontier
Follow
HIGHLIGHTS
Training Dogfighting Agents with Multi-Agent Reinforcement Learning (Part 1 of 2)
Training Dogfighting Agents with Multi-Agent Reinforcement Learning (Part 1 of 2)
Hey there! Welcome to Part 1 of my Multi-Agent Reinforcement Learning (MARL) series. I’m Ryan Quek, a final-year Industrial Systems…
d*classified
Oct 9
Training Dogfighting Agents with Multi-Agent Reinforcement Learning Part 2 of 2 — additional work…
Training Dogfighting Agents with Multi-Agent Reinforcement Learning Part 2 of 2 — additional work…
Following his first post on Multi-Agent Reinforcement Learning, Ryan Quek shares about making reinforcement learning (RL) policies more…
d*classified
Oct 9
Speed Read: frontiers in Hexapod Robots and what’s holding it back?
Speed Read: frontiers in Hexapod Robots and what’s holding it back?
Hexapod robots are emerging as nimble contenders for tough terrains, thanks to their unique legged architecture. In this brief guide…
d*classified
Oct 9
BrainHack 2024: Learning the Challenges of Fake News Detection and the Importance of Fact-Checking…
BrainHack 2024: Learning the Challenges of Fake News Detection and the Importance of Fact-Checking…
Ong Zong Xian was part of the Organising Committee team for SeeTrue 2024 — Information Programme Centre’s vertical for DSTA’s flagship…
Zong Xian
Oct 3
Building a UX Analytics Dashboard to Quantify Attitudinal User Data
Building a UX Analytics Dashboard to Quantify Attitudinal User Data
Yong Liang built a UX analytics dashboard to quantify attitudinal user data. The project evolved through three versions, focusing on…
d*classified
Aug 4
Navigating Multi-Agentic Workflows for Problem-Solving
Navigating Multi-Agentic Workflows for Problem-Solving
Large Language Models (LLMs) and agentic workflows are useful for tackling more complex problems. Tan Yan Chi explored how multi-agent…
Leslie Lim
Jul 31
Understanding Social Media Manipulation and Complex Networks: Insights from the Centre for Onling…
Understanding Social Media Manipulation and Complex Networks: Insights from the Centre for Onling…
In an era where digital interactions shape public opinion and influence behaviors, understanding the mechanisms behind information…
d*classified
Jul 18
How to Hack: Unveiling an Automated Web Impersonation Attack
How to Hack: Unveiling an Automated Web Impersonation Attack
Budding cybersecurity engineer, Lucas Chin, uncovered a Man-in-the-Middle (MitM) web impersonation attack within a Keycloak-protected…
d*classified
Jul 3
Brainhack 2024: Mastering the Drone Maze Challenge
Brainhack 2024: Mastering the Drone Maze Challenge
Our maze-masters share about the Drone Maze Challenge at Brainhack 2024.
d*classified
Jun 14
Using NVIDIA’s Triton Inference Server for Person Re-Identification (ReID)
Using NVIDIA’s Triton Inference Server for Person Re-Identification (ReID)
Jonathon Low built a pipeline with NVIDIA’s Triton Inference Server for running ReID tasks using the PEEPS platform.
d*classified
Jun 12
About d*classified
Latest Stories
Archive
About Medium
Terms
Privacy
Teams