Incentive-aware PAC learning

H Zhang, V Conitzer - Proceedings of the AAAI Conference on Artificial …, 2021 - ojs.aaai.org
We study PAC learning in the presence of strategic manipulation, where data points may
modify their features in certain predefined ways in order to receive a better outcome. We …

Adversarial bandits with corruptions: Regret lower bound and no-regret algorithm

M Hajiesmaili, MS Talebi, J Lui… - Advances in Neural …, 2020 - proceedings.neurips.cc
This paper studies adversarial bandits with corruptions. In the basic adversarial bandit
setting, the reward of arms is predetermined by an adversary who is oblivious to the …

Incentive-aware contextual pricing with non-parametric market noise

N Golrezaei, P Jaillet… - … Conference on Artificial …, 2023 - proceedings.mlr.press
We consider a dynamic pricing problem for repeated contextual second-price auctions with
multiple strategic buyers who aim to maximize their long-term time discounted utility. The …

Learning with exposure constraints in recommendation systems

O Ben-Porat, R Torkan - Proceedings of the ACM Web Conference 2023, 2023 - dl.acm.org
Recommendation systems are dynamic economic systems that balance the needs of
multiple stakeholders. A recent line of work studies incentives from the content providers' …

Robust and performance incentivizing algorithms for multi-armed bandits with strategic agents

SA Esmaeili, S Shin, A Slivkins - arxiv preprint arxiv:2312.07929, 2023 - arxiv.org
We consider a variant of the stochastic multi-armed bandit problem. Specifically, the arms
are strategic agents who can improve their rewards or absorb them. The utility of an agent …

An intelligent distributed ledger construction algorithm for IoT

CC Rawlins, S Jagannathan - IEEe Access, 2022 - ieeexplore.ieee.org
Blockchain is the next generation of secure data management that creates near-immutable
decentralized storage. Secure cryptography created a niche for blockchain to provide …

Bandits meet mechanism design to combat clickbait in online recommendation

TK Buening, A Saha, C Dimitrakakis, H Xu - arxiv preprint arxiv …, 2023 - arxiv.org
We study a strategic variant of the multi-armed bandit problem, which we coin the strategic
click-bandit. This model is motivated by applications in online recommendation where the …

Strategic Multi-Armed Bandit Problems Under Debt-Free Reporting

A Ben Yahmed, C Calauzènes… - Advances in Neural …, 2025 - proceedings.neurips.cc
We examine multi-armed bandit problems featuring strategic arms under debt-free reporting.
In this context, each arm is characterized by a bounded support reward distribution and …

Action-manipulation attacks against stochastic bandits: Attacks and defense

G Liu, L Lai - IEEE Transactions on Signal Processing, 2020 - ieeexplore.ieee.org
Due to the broad range of applications of stochastic multi-armed bandit model,
understanding the effects of adversarial attacks and designing bandit algorithms robust to …

Reward teaching for federated multiarmed bandits

C Shi, W **ong, C Shen, J Yang - IEEE Transactions on Signal …, 2023 - ieeexplore.ieee.org
Most of the existing federated multi-armed bandits (FMAB) designs are based on the
presumption that clients will implement the specified design to collaborate with the server. In …