Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Better algorithms for stochastic bandits with adversarial corruptions
We study the stochastic multi-armed bandits problem in the presence of adversarial
corruption. We present a new algorithm for this problem whose regret is nearly optimal …
corruption. We present a new algorithm for this problem whose regret is nearly optimal …
Stochastic linear bandits robust to adversarial attacks
We consider a stochastic linear bandit problem in which the rewards are not only subject to
random noise, but also adversarial attacks subject to a suitable budget $ C $(ie, an upper …
random noise, but also adversarial attacks subject to a suitable budget $ C $(ie, an upper …
Corruption-tolerant gaussian process bandit optimization
We consider the problem of optimizing an unknown (typically non-convex) function with a
bounded norm in some Reproducing Kernel Hilbert Space (RKHS), based on noisy bandit …
bounded norm in some Reproducing Kernel Hilbert Space (RKHS), based on noisy bandit …
Incentivized learning in principal-agent bandit games
This work considers a repeated principal-agent bandit game, where the principal can only
interact with her environment through the agent. The principal and the agent have …
interact with her environment through the agent. The principal and the agent have …
Byzantine-robust distributed online learning: Taming adversarial participants in an adversarial environment
This paper studies distributed online learning under Byzantine attacks. The performance of
an online learning algorithm is often characterized by (adversarial) regret, which evaluates …
an online learning algorithm is often characterized by (adversarial) regret, which evaluates …
Adversarial attacks on linear contextual bandits
Contextual bandit algorithms are applied in a wide range of domains, from advertising to
recommender systems, from clinical trials to education. In many of these domains, malicious …
recommender systems, from clinical trials to education. In many of these domains, malicious …
Robust stochastic linear contextual bandits under adversarial attacks
Stochastic linear contextual bandit algorithms have substantial applications in practice, such
as recommender systems, online advertising, clinical trials, etc. Recent works show that …
as recommender systems, online advertising, clinical trials, etc. Recent works show that …
Robust multi-agent multi-armed bandits
Recent works have shown that agents facing independent instances of a stochastic K-armed
bandit can collaborate to decrease regret. However, these works assume that each agent …
bandit can collaborate to decrease regret. However, these works assume that each agent …
Learning product rankings robust to fake users
In many online platforms, customers' decisions are substantially influenced by product
rankings as most customers only examine a few top-ranked products. Concurrently, such …
rankings as most customers only examine a few top-ranked products. Concurrently, such …
Towards best-of-all-worlds online learning with feedback graphs
L Erez, T Koren - Advances in Neural Information …, 2021 - proceedings.neurips.cc
We study the online learning with feedback graphs framework introduced by Mannor and
Shamir (2011), in which the feedback received by the online learner is specified by a graph …
Shamir (2011), in which the feedback received by the online learner is specified by a graph …