no code implementations • 24 Feb 2024 • Stephen Pasteris, Chris Hicks, Vasilios Mavroudis
In this paper we present fusion encoder networks (FENs): a class of algorithms for creating neural networks that map sequences to outputs.
no code implementations • 14 Dec 2023 • Stephen Pasteris, Chris Hicks, Vasilios Mavroudis
In this paper we consider the adversarial contextual bandit problem in metric spaces.
no code implementations • 8 Dec 2023 • Chris Hicks, Vasilios Mavroudis, Myles Foley, Thomas Davies, Kate Highnam, Tim Watson
Communication networks able to withstand hostile environments are critically important for disaster relief operations.
no code implementations • 20 Oct 2023 • Elizabeth Bates, Vasilios Mavroudis, Chris Hicks
We first show that deep reinforcement learning algorithms are sensitive to the magnitude of the penalties and their relative size.
no code implementations • NeurIPS 2023 • Stephen Pasteris, Chris Hicks, Vasilios Mavroudis
In this paper we adapt the nearest neighbour rule to the contextual bandit problem.
no code implementations • 15 Jun 2023 • Myles Foley, Mia Wang, Zoe M, Chris Hicks, Vasilios Mavroudis
Computer network defence is a complicated task that has necessitated a high degree of human involvement.
no code implementations • 19 Oct 2020 • Vasilios Mavroudis, Jamie Hayes
In webpage fingerprinting, an on-path adversary infers the specific webpage loaded by a victim user by analysing the patterns in the encrypted TLS traffic exchanged between the user's browser and the website's servers.
no code implementations • 5 Jan 2020 • Vasilios Mavroudis, Karl Wüst, Aritra Dhar, Kari Kostiainen, Srdjan Capkun
Snappy overcomes the main problems of previous solutions: a single customer collateral can be used to shop with many merchants; merchant collaterals are independent of the number of customers; and validators do not have to be trusted.
Cryptography and Security Distributed, Parallel, and Cluster Computing
no code implementations • 20 Nov 2019 • Vasilios Mavroudis
Financial exchange operators cater to the needs of their users while simultaneously ensuring compliance with the financial regulations.
1 code implementation • 3 Oct 2018 • Vasilios Mavroudis, Petr Svenda
While the underlying hardware has those capabilities, the JavaCard API does not provide calls for the corresponding functionality.
Cryptography and Security Software Engineering
no code implementations • 12 May 2018 • Alexander Hicks, Vasilios Mavroudis, Mustafa Al-Bassam, Sarah Meiklejohn, Steven J. Murdoch
We propose VAMS, a system that enables transparency for audits of access to data requests without compromising the privacy of parties in the system.
Cryptography and Security
1 code implementation • 12 Sep 2017 • Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, George Danezis
To evaluate our design, we build a Hardware Security Module that provides the highest level of assurance possible with COTS components.
Cryptography and Security