@article{McFaddenDRMD2026,title={DRMD: Deep Reinforcement Learning for Malware Detection Under Concept Drift},volume={40},url={https://ojs.aaai.org/index.php/AAAI/article/view/37053},doi={10.1609/aaai.v40i2.37053},number={2},journal={Proceedings of the AAAI Conference on Artificial Intelligence},author={McFadden, Shae and Foley, Myles and D’Onghia, Mario and Hicks, Chris and Mavroudis, Vasilios and Paoletti, Nicola and Pierazzi, Fabio},year={2026},month=mar,pages={854--862},}
Beyond Training-time Poisoning: Component-level and Post-training Backdoors in Deep Reinforcement Learning
Sanyam Vyas, Alberto Caron, Chris Hicks, and
2 more authors
Proceedings of the AAAI Conference on Artificial Intelligence, Mar 2026
@article{VyasCLPTbackdoors2026,title={Beyond Training-time Poisoning: Component-level and Post-training Backdoors in Deep Reinforcement Learning},volume={40},url={https://ojs.aaai.org/index.php/AAAI/article/view/39809},doi={10.1609/aaai.v40i31.39809},number={31},journal={Proceedings of the AAAI Conference on Artificial Intelligence},author={Vyas, Sanyam and Caron, Alberto and Hicks, Chris and Burnap, Pete and Mavroudis, Vasilios},year={2026},month=mar,pages={26072--26080},}
One Pic is All it Takes: Poisoning Visual Document Retrieval Augmented Generation with a Single Image
Ezzeldin Shereen, Dan Ristea, Shae McFadden, and
3 more authors
Transactions on Machine Learning Research, Mar 2026
@article{shereen2026one,title={One Pic is All it Takes: Poisoning Visual Document Retrieval Augmented Generation with a Single Image},author={Shereen, Ezzeldin and Ristea, Dan and McFadden, Shae and Hasircioglu, Burak and Mavroudis, Vasilios and Hicks, Chris},journal={Transactions on Machine Learning Research},issn={2835-8856},year={2026},month=mar,url={https://openreview.net/forum?id=CLkjUidlYg},}
2025
Poisoning Attacks on LLMs Require a Near-constant Number of Poison Samples
Alexandra Souly, Javier Rando, Ed Chapman, and
10 more authors
@misc{souly2025poisoningllmsr,title={Poisoning Attacks on LLMs Require a Near-constant Number of Poison Samples},author={Souly, Alexandra and Rando, Javier and Chapman, Ed and Davies, Xander and Hasircioglu, Burak and Shereen, Ezzeldin and Mougan, Carlos and Mavroudis, Vasilios and Jones, Erik and Hicks, Chris and Carlini, Nicholas and Gal, Yarin and Kirk, Robert},year={2025},month=oct,eprint={2510.07192},archiveprefix={arXiv},primaryclass={cs.LG},}
A Hierarchical Nearest Neighbour Approach to Contextual Bandits
Stephen Pasteris, Madeleine Dwyer, Chris Hicks, and
1 more author
Transactions on Machine Learning Research, Oct 2025
@article{pasteris2025a,title={A Hierarchical Nearest Neighbour Approach to Contextual Bandits},author={Pasteris, Stephen and Dwyer, Madeleine and Hicks, Chris and Mavroudis, Vasilios},journal={Transactions on Machine Learning Research},issn={2835-8856},year={2025},month=oct,url={https://openreview.net/forum?id=4bJMIrI5oX},}
On Efficient Bayesian Exploration in Model-Based Reinforcement Learning
Alberto Caron, Vasilios Mavroudis, and Chris Hicks
Transactions on Machine Learning Research, Jul 2025
@article{caron2025mbrl,title={On Efficient Bayesian Exploration in Model-Based Reinforcement Learning},author={Caron, Alberto and Mavroudis, Vasilios and Hicks, Chris},journal={Transactions on Machine Learning Research},issn={2835-8856},year={2025},month=jul,url={https://openreview.net/forum?id=Na02hDWqkF},}
Less is more? Rewards in RL for Cyber Defence
Elizabeth Bates, Chris Hicks, and Vasilios Mavroudis
@article{bates2025less,title={Less is more? Rewards in RL for Cyber Defence},author={Bates, Elizabeth and Hicks, Chris and Mavroudis, Vasilios},journal={Presented at RLDM 2025, arXiv:2503.03245},year={2025},}
2024
Entity-based reinforcement learning for autonomous cyber defence
Isaac Symes Thompson, Alberto Caron, Chris Hicks, and
1 more author
In Proceedings of the Workshop on Autonomous Cybersecurity, 2024
@inproceedings{thompson2024entity,title={Entity-based reinforcement learning for autonomous cyber defence},author={Thompson, Isaac Symes and Caron, Alberto and Hicks, Chris and Mavroudis, Vasilios},booktitle={Proceedings of the Workshop on Autonomous Cybersecurity},pages={56--67},year={2024},}
Mitigating Deep Reinforcement Learning Backdoors in the Neural Activation Space
Sanyam Vyas, Chris Hicks, and Vasilios Mavroudis
In 2024 IEEE Security and Privacy Workshops (SPW), 2024
@inproceedings{vyas2024mitigating,title={{Mitigating Deep Reinforcement Learning Backdoors in the Neural Activation Space}},author={Vyas, Sanyam and Hicks, Chris and Mavroudis, Vasilios},booktitle={2024 IEEE Security and Privacy Workshops (SPW)},pages={76--86},year={2024},organization={IEEE},}
Online Convex Optimisation: The Optimal Switching Regret for all Segmentations Simultaneously
Stephen Pasteris, Chris Hicks, Vasilios Mavroudis, and
1 more author
Advances in Neural Information Processing Systems, 2024
@article{pasteris2024online,title={{Online Convex Optimisation: The Optimal Switching Regret for all Segmentations Simultaneously}},author={Pasteris, Stephen and Hicks, Chris and Mavroudis, Vasilios and Herbster, Mark},journal={Advances in Neural Information Processing Systems},volume={37},pages={78278--78298},year={2024},}
WENDIGO: Deep Reinforcement Learning for Denial-of-Service Query Discovery in GraphQL
Shae McFadden, Marcello Maugeri, Chris Hicks, and
2 more authors
In 2024 IEEE Security and Privacy Workshops (SPW), 2024
@inproceedings{mcfadden2024wendigo,title={{WENDIGO: Deep Reinforcement Learning for Denial-of-Service Query Discovery in GraphQL}},author={McFadden, Shae and Maugeri, Marcello and Hicks, Chris and Mavroudis, Vasilios and Pierazzi, Fabio},booktitle={2024 IEEE Security and Privacy Workshops (SPW)},pages={68--75},year={2024},organization={IEEE},}
A view on out-of-distribution identification from a statistical testing theory perspective
Alberto Caron, Chris Hicks, and Vasilios Mavroudis
Trustworthy AI Workshop at the International Joint Conference on Artificial Intelligence (IJCAI), 2024
@article{caron2024view,title={A view on out-of-distribution identification from a statistical testing theory perspective},author={Caron, Alberto and Hicks, Chris and Mavroudis, Vasilios},journal={Trustworthy AI Workshop at the International Joint Conference on Artificial Intelligence (IJCAI)},year={2024},note={arXiv:2405.03052},}
2023
Canaries and Whistles: Resilient Drone Communication Networks with (or without) Deep Reinforcement Learning
Chris Hicks, Vasilios Mavroudis, Myles Foley, and
3 more authors
In Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023
@inproceedings{hicksCAGE3_23,author={Hicks, Chris and Mavroudis, Vasilios and Foley, Myles and Davies, Thomas and Highnam, Kate and Watson, Tim},title={{Canaries and Whistles: Resilient Drone Communication Networks with (or without) Deep Reinforcement Learning}},year={2023},isbn={9798400702600},publisher={Association for Computing Machinery},doi={10.1145/3605764.3623986},booktitle={Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security},pages={91-101},numpages={11},series={AISec '23},}
Reward Shaping for Happier Autonomous Cyber Security Agents
Elizabeth Bates, Vasilios Mavroudis, and Chris Hicks
In Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023
@inproceedings{batesCAGE2_23,author={Bates, Elizabeth and Mavroudis, Vasilios and Hicks, Chris},title={{Reward Shaping for Happier Autonomous Cyber Security Agents}},year={2023},isbn={9798400702600},publisher={Association for Computing Machinery},doi={10.1145/3605764.3623916},booktitle={Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security},pages={221-232},numpages={12},series={AISec '23},}
Nearest Neighbour with Bandit Feedback
Stephen Pasteris, Chris Hicks, and Vasilios Mavroudis
In Advances in Neural Information Processing Systems, 2023
@inproceedings{pasterisConBan2023,author={Pasteris, Stephen and Hicks, Chris and Mavroudis, Vasilios},booktitle={Advances in Neural Information Processing Systems},publisher={Curran Associates, Inc.},title={{Nearest Neighbour with Bandit Feedback}},year={2023},series={NeurIPS 2023},}
2022
Inroads into Autonomous Network Defence using Explained Reinforcement Learning
Myles Foley, Mia Wang, Zoe M, and
2 more authors
In Conference on Applied Machine Learning in Information Security (CAMLIS), 2022
@inproceedings{foleyCAGEII22,title={{Inroads into Autonomous Network Defence using Explained Reinforcement Learning}},year={2022},author={Foley, Myles and Wang, Mia and M, Zoe and Hicks, Chris and Mavroudis, Vasilios},booktitle={Conference on Applied Machine Learning in Information Security (CAMLIS)},}
SIMple ID: QR Codes for Authentication Using Basic Mobile Phones in Developing Countries
Chris Hicks, Vasilios Mavroudis, and Jon Crowcroft
In Security and Trust Management (STM), 18th International Workshop, 2022
@inproceedings{hicksSIMpleID22,author={Hicks, Chris and Mavroudis, Vasilios and Crowcroft, Jon},editor={Lenzini, Gabriele and Meng, Weizhi},title={{SIMple ID: QR Codes for Authentication Using Basic Mobile Phones in Developing Countries}},booktitle={Security and Trust Management (STM), 18th International Workshop},year={2022},pages={3-23},}
Autonomous Network Defence Using Reinforcement Learning
Myles Foley, Chris Hicks, Kate Highnam, and
1 more author
In Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, 2022
@inproceedings{foleyCAGEI22,author={Foley, Myles and Hicks, Chris and Highnam, Kate and Mavroudis, Vasilios},title={{Autonomous Network Defence Using Reinforcement Learning}},year={2022},publisher={Association for Computing Machinery},url={https://doi.org/10.1145/3488932.3527286},booktitle={Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security},pages={1252-1254},series={ASIA CCS '22},doi={10.1145/3488932.3527286},}
2021
An Interface Between Legacy and Modern Mobile Devices for Digital Identity
Vasilios Mavroudis, Chris Hicks, and Jon Crowcroft
In Emerging Technologies for Authorization and Authentication (ETAA), 2021
@inproceedings{mavroudisGRID21,author={Mavroudis, Vasilios and Hicks, Chris and Crowcroft, Jon},editor={Saracino, Andrea and Mori, Paolo},title={{An Interface Between Legacy and Modern Mobile Devices for Digital Identity}},booktitle={Emerging Technologies for Authorization and Authentication (ETAA)},year={2021},publisher={Springer International Publishing},pages={68-76},isbn={978-3-030-93747-8},doi={10.1007/978-3-030-93747-8_5},}
Differentially Private Health Tokens for Estimating COVID-19 Risk
David Butler, Chris Hicks, James Bell, and
2 more authors
@article{Butler2020DifferentiallyPH,title={{Differentially Private Health Tokens for Estimating COVID-19 Risk}},author={Butler, David and Hicks, Chris and Bell, James and Maple, Carsten and Crowcroft, Jon A.},journal={CoronaDef Workshop 2021},year={2021},volume={abs/2006.14329},doi={10.14722/coronadef.2021.23006}}
2020
A Vehicular DAA Scheme for Unlinkable ECDSA Pseudonyms in V2X
Christopher Hicks, and Flavio D. Garcia
In 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 2020
@inproceedings{hicksVDAA20,author={Hicks, Christopher and Garcia, Flavio D.},booktitle={2020 IEEE European Symposium on Security and Privacy (EuroS&P)},title={{A Vehicular DAA Scheme for Unlinkable ECDSA Pseudonyms in V2X}},year={2020},pages={460-473},doi={10.1109/EuroSP48549.2020.00036},}
2019
IFAL: Issue First Activate Later Certificates for V2X
Eric Verheul, Chris Hicks, and Flavio Garcia D
In IEEE European Symposium on Security and Privacy (EuroS&P), 2019
@inproceedings{hicksifal2019,title={{IFAL: Issue First Activate Later Certificates for V2X}},author={Verheul, Eric and Hicks, Chris and Garcia D, Flavio},year={2019},booktitle={IEEE European Symposium on Security and Privacy (EuroS&P)},pages={279-293},doi={10.1109/EuroSP.2019.00029},}
2018
Dismantling the AUT64 Automotive Cipher
Chris Hicks, Flavio Garcia D, and David Oswald
In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2018
@inproceedings{hicksaut642018,title={{Dismantling the AUT64 Automotive Cipher}},author={Hicks, Chris and Garcia D, Flavio and Oswald, David},year={2018},booktitle={IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES)},pages={46-69},doi={10.13154/tches.v2018.i2.46-69},}
2015
Gaining insight into virtualised host disk activity
@article{hicksthesis2015,title={{Gaining insight into virtualised host disk activity}},year={2015},author={Hicks, Chris},note={The University of Birmingham},journal={M.Eng Electronic & Software Engineering Thesis}}