Latest version: v0.5.0
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
A modular evolutionary algorithm framework, mostly tailored to a modular implementation of the CMA-ES
No known vulnerabilities found