Vasilios Mavroudis

Orcid: 0000-0003-2667-5906

According to our database1, Vasilios Mavroudis authored at least 55 papers between 2014 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
International AI Safety Report 2025: First Key Update: Capabilities and Risk Implications.
CoRR, October, 2025

Poisoning Attacks on LLMs Require a Near-constant Number of Poison Samples.
CoRR, October, 2025

What if we could hot swap our Biometrics?
CoRR, September, 2025

DRMD: Deep Reinforcement Learning for Malware Detection under Concept Drift.
CoRR, August, 2025

Analysis of Publicly Accessible Operational Technology and Associated Risks.
CoRR, August, 2025

Beyond Training-time Poisoning: Component-level and Post-training Backdoors in Deep Reinforcement Learning.
CoRR, July, 2025

From Promise to Peril: Rethinking Cybersecurity Red and Blue Teaming in the Age of LLMs.
CoRR, June, 2025

Quantifying Mix Network Privacy Erosion with Generative Models.
CoRR, June, 2025

One Pic is All it Takes: Poisoning Visual Document Retrieval Augmented Generation with a Single Image.
CoRR, April, 2025

Towards Causal Model-Based Policy Optimization.
CoRR, March, 2025

Guidelines for Applying RL and MARL in Cybersecurity Applications.
CoRR, March, 2025

Less is more? Rewards in RL for Cyber Defence.
CoRR, March, 2025

International AI Safety Report.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
CoRR, January, 2025

A Hierarchical Nearest Neighbour Approach to Contextual Bandits.
Trans. Mach. Learn. Res., 2025

On Efficient Bayesian Exploration in Model-Based Reinforcement Learning.
Trans. Mach. Learn. Res., 2025

Towards Autonomous Cyber Defence: Applying Systems Theoretic Process Analysis to Human-Machine Teaming.
Proceedings of the International Joint Conference on Neural Networks, 2025

2024
SoK: On Closing the Applicability Gap in Automated Vulnerability Detection.
CoRR, 2024

International Scientific Report on the Safety of Advanced AI (Interim Report).
CoRR, 2024

Fair Exploration and Exploitation.
CoRR, 2024

Benchmarking OpenAI o1 in Cyber Security.
CoRR, 2024

Zero-Trust Network Access (ZTNA).
CoRR, 2024

CybORG++: An Enhanced Gym for the Development of Autonomous Cyber Agents.
CoRR, 2024

Environment Complexity and Nash Equilibria in a Sequential Social Dilemma.
CoRR, 2024

A View on Out-of-Distribution Identification from a Statistical Testing Theory Perspective.
CoRR, 2024

Fusion Encoder Networks.
CoRR, 2024

Mitigating Deep Reinforcement Learning Backdoors in the Neural Activation Space.
Proceedings of the IEEE Security and Privacy, 2024

WENDIGO: Deep Reinforcement Learning for Denial-of-Service Query Discovery in GraphQL.
Proceedings of the IEEE Security and Privacy, 2024

Online Convex Optimisation: The Optimal Switching Regret for all Segmentations Simultaneously.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

Empirical Mixnet Design.
Proceedings of the Game Theory and AI for Security, 2024

Entity-based Reinforcement Learning for Autonomous Cyber Defence.
Proceedings of the Workshop on Autonomous Cybersecurity, 2024

Inherently Interpretable and Uncertainty-Aware Models for Online Learning in Cyber-Security Problems.
Proceedings of the Annual Computer Security Applications Conference, 2024

2023
A Hierarchical Nearest Neighbour Approach to Contextual Bandits.
CoRR, 2023

Nearest Neighbour with Bandit Feedback.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Adaptive Webpage Fingerprinting from TLS Traces.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

Canaries and Whistles: Resilient Drone Communication Networks with (or without) Deep Reinforcement Learning.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023

Reward Shaping for Happier Autonomous Cyber Security Agents.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023

2022
SIMple ID: QR Codes for Authentication Using Basic Mobile Phones in Developing Countries.
Proceedings of the Security and Trust Management - 18th International Workshop, 2022

Inroads into Autonomous Network Defence using Explained Reinforcement Learning.
Proceedings of the Conference on Applied Machine Learning in Information Security, 2022

Autonomous Network Defence using Reinforcement Learning.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
An Interface Between Legacy and Modern Mobile Devices for Digital Identity.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2021

2020
Adaptive Traffic Fingerprinting: Large-scale Inference under Realistic Assumptions.
CoRR, 2020

Snappy: Fast On-chain Payments with Practical Collaterals.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
Market Manipulation as a Security Problem.
CoRR, 2019

Bounded Temporal Fairness for FIFO Financial Markets (Transcript of Discussion).
Proceedings of the Security Protocols XXVII, 2019

Bounded Temporal Fairness for FIFO Financial Markets.
Proceedings of the Security Protocols XXVII, 2019

Market Manipulation as a Security Problem: Attacks and Defenses.
Proceedings of the 12th European Workshop on Systems Security, 2019

Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

Libra: Fair Order-Matching for Electronic Financial Exchanges.
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019

2018
Towards Low-level Cryptographic Primitives for JavaCards.
CoRR, 2018

Eavesdropping Whilst You're Shopping: Balancing Personalisation and Privacy in Connected Retail Spaces.
CoRR, 2018

VAMS: Verifiable Auditing of Access to Confidential Data.
CoRR, 2018

2017
On the Privacy and Security of the Ultrasound Ecosystem.
Proc. Priv. Enhancing Technol., 2017

A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2014
Visual Analytics for Enhancing Supervised Attack Attribution in Mobile Networks.
Proceedings of the Information Sciences and Systems 2014, 2014


  Loading...