This repositoiry is built on the Flow software package to explore cyber-security attacks on intelligent transportation systems. Where Flow is focused on how sparesely adopted AVs can improve traffic, this repository explores the opposite question: How can sparsely cyber-compromised AVs be used to degrade traffic flow?

Getting started

To recreate simulations from “Compromised ACC vehicles can degrade current mixed-autonomy traffic
performance while remaining stealthy against detection.” run \examples\ to create attacked traffic.

For a guide on how to set up an adversarial simulation environment see \tutorials.

Installing flow

Follow these installation instructions to install Flow.


Cite the original flow repository using these papers:

C. Wu, A. Kreidieh, K. Parvate, E. Vinitsky, A. Bayen, “Flow: Architecture and Benchmarking for Reinforcement Learning in Traffic Control,” CoRR, vol. abs/1710.05465, 2017. [Online]. Available:

Vinitsky, E., Kreidieh, A., Le Flem, L., Kheterpal, N., Jang, K., Wu, F., … & Bayen, A. M, Benchmarks for reinforcement learning in mixed-autonomy traffic. In Conference on Robot Learning (pp. 399-409). Available:


View Github