Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Incentive-aware PAC learning
We study PAC learning in the presence of strategic manipulation, where data points may
modify their features in certain predefined ways in order to receive a better outcome. We …
modify their features in certain predefined ways in order to receive a better outcome. We …
Adversarial bandits with corruptions: Regret lower bound and no-regret algorithm
This paper studies adversarial bandits with corruptions. In the basic adversarial bandit
setting, the reward of arms is predetermined by an adversary who is oblivious to the …
setting, the reward of arms is predetermined by an adversary who is oblivious to the …
Incentive-aware contextual pricing with non-parametric market noise
We consider a dynamic pricing problem for repeated contextual second-price auctions with
multiple strategic buyers who aim to maximize their long-term time discounted utility. The …
multiple strategic buyers who aim to maximize their long-term time discounted utility. The …
Learning with exposure constraints in recommendation systems
Recommendation systems are dynamic economic systems that balance the needs of
multiple stakeholders. A recent line of work studies incentives from the content providers' …
multiple stakeholders. A recent line of work studies incentives from the content providers' …
Robust and performance incentivizing algorithms for multi-armed bandits with strategic agents
We consider a variant of the stochastic multi-armed bandit problem. Specifically, the arms
are strategic agents who can improve their rewards or absorb them. The utility of an agent …
are strategic agents who can improve their rewards or absorb them. The utility of an agent …
An intelligent distributed ledger construction algorithm for IoT
Blockchain is the next generation of secure data management that creates near-immutable
decentralized storage. Secure cryptography created a niche for blockchain to provide …
decentralized storage. Secure cryptography created a niche for blockchain to provide …
Bandits meet mechanism design to combat clickbait in online recommendation
We study a strategic variant of the multi-armed bandit problem, which we coin the strategic
click-bandit. This model is motivated by applications in online recommendation where the …
click-bandit. This model is motivated by applications in online recommendation where the …
Strategic Multi-Armed Bandit Problems Under Debt-Free Reporting
We examine multi-armed bandit problems featuring strategic arms under debt-free reporting.
In this context, each arm is characterized by a bounded support reward distribution and …
In this context, each arm is characterized by a bounded support reward distribution and …
Action-manipulation attacks against stochastic bandits: Attacks and defense
Due to the broad range of applications of stochastic multi-armed bandit model,
understanding the effects of adversarial attacks and designing bandit algorithms robust to …
understanding the effects of adversarial attacks and designing bandit algorithms robust to …
Reward teaching for federated multiarmed bandits
Most of the existing federated multi-armed bandits (FMAB) designs are based on the
presumption that clients will implement the specified design to collaborate with the server. In …
presumption that clients will implement the specified design to collaborate with the server. In …