Vasilios Mavroudis

Orcid: 0000-0003-2667-5906

According to our database1, Vasilios Mavroudis authored at least 31 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Environment Complexity and Nash Equilibria in a Sequential Social Dilemma.
CoRR, 2024

Online Convex Optimisation: The Optimal Switching Regret for all Segmentations Simultaneously.
CoRR, 2024

A View on Out-of-Distribution Identification from a Statistical Testing Theory Perspective.
CoRR, 2024

Fusion Encoder Networks.
CoRR, 2024

Mitigating Deep Reinforcement Learning Backdoors in the Neural Activation Space.
Proceedings of the IEEE Security and Privacy, 2024

WENDIGO: Deep Reinforcement Learning for Denial-of-Service Query Discovery in GraphQL.
Proceedings of the IEEE Security and Privacy, 2024

Entity-based Reinforcement Learning for Autonomous Cyber Defence.
Proceedings of the Workshop on Autonomous Cybersecurity, 2024

2023
A Hierarchical Nearest Neighbour Approach to Contextual Bandits.
CoRR, 2023

Nearest Neighbour with Bandit Feedback.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Adaptive Webpage Fingerprinting from TLS Traces.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

Canaries and Whistles: Resilient Drone Communication Networks with (or without) Deep Reinforcement Learning.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023

Reward Shaping for Happier Autonomous Cyber Security Agents.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023

2022
SIMple ID: QR Codes for Authentication Using Basic Mobile Phones in Developing Countries.
Proceedings of the Security and Trust Management - 18th International Workshop, 2022

Inroads into Autonomous Network Defence using Explained Reinforcement Learning.
Proceedings of the Conference on Applied Machine Learning in Information Security, 2022

Autonomous Network Defence using Reinforcement Learning.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
An Interface Between Legacy and Modern Mobile Devices for Digital Identity.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2021

2020
Adaptive Traffic Fingerprinting: Large-scale Inference under Realistic Assumptions.
CoRR, 2020

Snappy: Fast On-chain Payments with Practical Collaterals.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages.
IACR Cryptol. ePrint Arch., 2019

Market Manipulation as a Security Problem.
CoRR, 2019

Bounded Temporal Fairness for FIFO Financial Markets (Transcript of Discussion).
Proceedings of the Security Protocols XXVII, 2019

Bounded Temporal Fairness for FIFO Financial Markets.
Proceedings of the Security Protocols XXVII, 2019

Market Manipulation as a Security Problem: Attacks and Defenses.
Proceedings of the 12th European Workshop on Systems Security, 2019

Libra: Fair Order-Matching for Electronic Financial Exchanges.
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019

2018
Towards Low-level Cryptographic Primitives for JavaCards.
CoRR, 2018

Eavesdropping Whilst You're Shopping: Balancing Personalisation and Privacy in Connected Retail Spaces.
CoRR, 2018

VAMS: Verifiable Auditing of Access to Confidential Data.
CoRR, 2018

2017
On the Privacy and Security of the Ultrasound Ecosystem.
Proc. Priv. Enhancing Technol., 2017

A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2014
Visual Analytics for Enhancing Supervised Attack Attribution in Mobile Networks.
Proceedings of the Information Sciences and Systems 2014, 2014


  Loading...