Publications

2026

  1. McFaddenDRMD2026.png
    DRMD: Deep Reinforcement Learning for Malware Detection Under Concept Drift
    Shae McFadden, Myles Foley, Mario D’Onghia, and 4 more authors
    Proceedings of the AAAI Conference on Artificial Intelligence, Mar 2026
  2. Beyond Training-time Poisoning: Component-level and Post-training Backdoors in Deep Reinforcement Learning
    Sanyam Vyas, Alberto Caron, Chris Hicks, and 2 more authors
    Proceedings of the AAAI Conference on Artificial Intelligence, Mar 2026
  3. shereen2026one.png
    One Pic is All it Takes: Poisoning Visual Document Retrieval Augmented Generation with a Single Image
    Ezzeldin Shereen, Dan Ristea, Shae McFadden, and 3 more authors
    Transactions on Machine Learning Research, Mar 2026

2025

  1. souly2025poisoningllmsr.png
    Poisoning Attacks on LLMs Require a Near-constant Number of Poison Samples
    Alexandra Souly, Javier Rando, Ed Chapman, and 10 more authors
    Oct 2025
  2. A Hierarchical Nearest Neighbour Approach to Contextual Bandits
    Stephen Pasteris, Madeleine Dwyer, Chris Hicks, and 1 more author
    Transactions on Machine Learning Research, Oct 2025
  3. On Efficient Bayesian Exploration in Model-Based Reinforcement Learning
    Alberto Caron, Vasilios Mavroudis, and Chris Hicks
    Transactions on Machine Learning Research, Jul 2025
  4. bates2025less.png
    Less is more? Rewards in RL for Cyber Defence
    Elizabeth Bates, Chris Hicks, and Vasilios Mavroudis
    Presented at RLDM 2025, arXiv:2503.03245, 2025

2024

  1. thompson2024entity.png
    Entity-based reinforcement learning for autonomous cyber defence
    Isaac Symes Thompson, Alberto Caron, Chris Hicks, and 1 more author
    In Proceedings of the Workshop on Autonomous Cybersecurity, 2024
  2. vyas2024mitigating.png
    Mitigating Deep Reinforcement Learning Backdoors in the Neural Activation Space
    Sanyam Vyas, Chris Hicks, and Vasilios Mavroudis
    In 2024 IEEE Security and Privacy Workshops (SPW), 2024
  3. pasteris2024online.png
    Online Convex Optimisation: The Optimal Switching Regret for all Segmentations Simultaneously
    Stephen Pasteris, Chris Hicks, Vasilios Mavroudis, and 1 more author
    Advances in Neural Information Processing Systems, 2024
  4. wendigo.png
    WENDIGO: Deep Reinforcement Learning for Denial-of-Service Query Discovery in GraphQL
    Shae McFadden, Marcello Maugeri, Chris Hicks, and 2 more authors
    In 2024 IEEE Security and Privacy Workshops (SPW), 2024
  5. A view on out-of-distribution identification from a statistical testing theory perspective
    Alberto Caron, Chris Hicks, and Vasilios Mavroudis
    Trustworthy AI Workshop at the International Joint Conference on Artificial Intelligence (IJCAI), 2024
    arXiv:2405.03052

2023

  1. CybORG3.png
    Canaries and Whistles: Resilient Drone Communication Networks with (or without) Deep Reinforcement Learning
    Chris Hicks, Vasilios Mavroudis, Myles Foley, and 3 more authors
    In Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023
  2. Reward Shaping for Happier Autonomous Cyber Security Agents
    Elizabeth Bates, Vasilios Mavroudis, and Chris Hicks
    In Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023
  3. Nearest Neighbour with Bandit Feedback
    Stephen Pasteris, Chris Hicks, and Vasilios Mavroudis
    In Advances in Neural Information Processing Systems, 2023

2022

  1. CybORG2.png
    Inroads into Autonomous Network Defence using Explained Reinforcement Learning
    Myles Foley, Mia Wang, Zoe M, and 2 more authors
    In Conference on Applied Machine Learning in Information Security (CAMLIS), 2022
  2. 120x120.png
    SIMple ID: QR Codes for Authentication Using Basic Mobile Phones in Developing Countries
    Chris Hicks, Vasilios Mavroudis, and Jon Crowcroft
    In Security and Trust Management (STM), 18th International Workshop, 2022
  3. CybORG.png
    Autonomous Network Defence Using Reinforcement Learning
    Myles Foley, Chris Hicks, Kate Highnam, and 1 more author
    In Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, 2022

2021

  1. grID.png
    An Interface Between Legacy and Modern Mobile Devices for Digital Identity
    Vasilios Mavroudis, Chris Hicks, and Jon Crowcroft
    In Emerging Technologies for Authorization and Authentication (ETAA), 2021
  2. Differentially Private Health Tokens for Estimating COVID-19 Risk
    David Butler, Chris Hicks, James Bell, and 2 more authors
    CoronaDef Workshop 2021, 2021

2020

  1. A Vehicular DAA Scheme for Unlinkable ECDSA Pseudonyms in V2X
    Christopher Hicks, and Flavio D. Garcia
    In 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 2020

2019

  1. IFAL: Issue First Activate Later Certificates for V2X
    Eric Verheul, Chris Hicks, and Flavio Garcia D
    In IEEE European Symposium on Security and Privacy (EuroS&P), 2019

2018

  1. Dismantling the AUT64 Automotive Cipher
    Chris Hicks, Flavio Garcia D, and David Oswald
    In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2018

2015

  1. Gaining insight into virtualised host disk activity
    Chris Hicks
    M.Eng Electronic & Software Engineering Thesis, 2015
    The University of Birmingham