no code implementations • 24 Feb 2024 • Stephen Pasteris, Chris Hicks, Vasilios Mavroudis
In this paper we present fusion encoder networks (FENs): a class of algorithms for creating neural networks that map sequences to outputs.
no code implementations • 14 Dec 2023 • Stephen Pasteris, Chris Hicks, Vasilios Mavroudis
In this paper we consider the adversarial contextual bandit problem in metric spaces.
no code implementations • 8 Dec 2023 • Chris Hicks, Vasilios Mavroudis, Myles Foley, Thomas Davies, Kate Highnam, Tim Watson
Communication networks able to withstand hostile environments are critically important for disaster relief operations.
no code implementations • 20 Oct 2023 • Elizabeth Bates, Vasilios Mavroudis, Chris Hicks
We first show that deep reinforcement learning algorithms are sensitive to the magnitude of the penalties and their relative size.
no code implementations • NeurIPS 2023 • Stephen Pasteris, Chris Hicks, Vasilios Mavroudis
In this paper we adapt the nearest neighbour rule to the contextual bandit problem.
no code implementations • 15 Jun 2023 • Myles Foley, Mia Wang, Zoe M, Chris Hicks, Vasilios Mavroudis
Computer network defence is a complicated task that has necessitated a high degree of human involvement.
no code implementations • 27 Sep 2020 • James Bell, Ginestra Bianconi, David Butler, Jon Crowcroft, Paul C. W Davies, Chris Hicks, Hyunju Kim, Istvan Z. Kiss, Francesco Di Lauro, Carsten Maple, Ayan Paul, Mikhail Prokopenko, Philip Tee, Sara I. Walker
On May $28^{th}$ and $29^{th}$, a two day workshop was held virtually, facilitated by the Beyond Center at ASU and Moogsoft Inc.
Physics and Society
1 code implementation • 25 Jun 2020 • David Butler, Chris Hicks, James Bell, Carsten Maple, Jon Crowcroft
Our experimental results show that for groups of size 500 or more, the error associated with our method can be as low as 0. 03 on average and thus the aggregated results can be useful in a number of identity-free contexts.
Cryptography and Security Computers and Society