Chris Hicks

Orcid: 0000-0002-6340-004X

According to our database1, Chris Hicks authored at least 38 papers between 2020 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
Building Better Environments for Autonomous Cyber Defence.
CoRR, April, 2026

On The Effectiveness of the UK NIS Regulations as a Mandatory Cybersecurity Reporting Regime.
CoRR, March, 2026

SoK: The Pitfalls of Deep Reinforcement Learning for Cybersecurity.
CoRR, February, 2026

Beyond Rewards in Reinforcement Learning for Cyber Defence.
CoRR, February, 2026

One Pic is All it Takes: Poisoning Visual Document Retrieval Augmented Generation with a Single Image.
Trans. Mach. Learn. Res., 2026

From Promise to Peril: Rethinking Cybersecurity Red and Blue Teaming in the Age of LLMs.
IEEE Secur. Priv., 2026

Beyond Training-time Poisoning: Component-level and Post-training Backdoors in Deep Reinforcement Learning.
Proceedings of the Fortieth AAAI Conference on Artificial Intelligence, 2026

DRMD: Deep Reinforcement Learning for Malware Detection Under Concept Drift.
Proceedings of the Fortieth AAAI Conference on Artificial Intelligence, 2026

2025
Poisoning Attacks on LLMs Require a Near-constant Number of Poison Samples.
CoRR, October, 2025

What if we could hot swap our Biometrics?
CoRR, September, 2025

Towards Causal Model-Based Policy Optimization.
CoRR, March, 2025

Less is more? Rewards in RL for Cyber Defence.
CoRR, March, 2025

A Hierarchical Nearest Neighbour Approach to Contextual Bandits.
Trans. Mach. Learn. Res., 2025

On Efficient Bayesian Exploration in Model-Based Reinforcement Learning.
Trans. Mach. Learn. Res., 2025

Towards Autonomous Cyber Defence: Applying Systems Theoretic Process Analysis to Human-Machine Teaming.
Proceedings of the International Joint Conference on Neural Networks, 2025

2024
SoK: On Closing the Applicability Gap in Automated Vulnerability Detection.
CoRR, 2024

Fair Exploration and Exploitation.
CoRR, 2024

Benchmarking OpenAI o1 in Cyber Security.
CoRR, 2024

CybORG++: An Enhanced Gym for the Development of Autonomous Cyber Agents.
CoRR, 2024

Environment Complexity and Nash Equilibria in a Sequential Social Dilemma.
CoRR, 2024

A View on Out-of-Distribution Identification from a Statistical Testing Theory Perspective.
CoRR, 2024

Fusion Encoder Networks.
CoRR, 2024

Mitigating Deep Reinforcement Learning Backdoors in the Neural Activation Space.
Proceedings of the IEEE Security and Privacy, 2024

WENDIGO: Deep Reinforcement Learning for Denial-of-Service Query Discovery in GraphQL.
Proceedings of the IEEE Security and Privacy, 2024

Online Convex Optimisation: The Optimal Switching Regret for all Segmentations Simultaneously.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

Entity-based Reinforcement Learning for Autonomous Cyber Defence.
Proceedings of the Workshop on Autonomous Cybersecurity, 2024

Inherently Interpretable and Uncertainty-Aware Models for Online Learning in Cyber-Security Problems.
Proceedings of the Annual Computer Security Applications Conference, 2024

2023
A Hierarchical Nearest Neighbour Approach to Contextual Bandits.
CoRR, 2023

Nearest Neighbour with Bandit Feedback.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Canaries and Whistles: Resilient Drone Communication Networks with (or without) Deep Reinforcement Learning.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023

Reward Shaping for Happier Autonomous Cyber Security Agents.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023

2022
SIMple ID: QR Codes for Authentication Using Basic Mobile Phones in Developing Countries.
Proceedings of the Security and Trust Management - 18th International Workshop, 2022

Inroads into Autonomous Network Defence using Explained Reinforcement Learning.
Proceedings of the Conference on Applied Machine Learning in Information Security, 2022

Autonomous Network Defence using Reinforcement Learning.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
An Interface Between Legacy and Modern Mobile Devices for Digital Identity.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2021

2020
Differentially Private Health Tokens for Estimating COVID-19 Risk.
CoRR, 2020

SecureABC: Secure AntiBody Certificates for COVID-19.
CoRR, 2020

TraceSecure: Towards Privacy Preserving Contact Tracing.
CoRR, 2020


  Loading...