Better algorithms for stochastic bandits with adversarial corruptions

A Gupta, T Koren, K Talwar - Conference on Learning …, 2019 - proceedings.mlr.press
We study the stochastic multi-armed bandits problem in the presence of adversarial
corruption. We present a new algorithm for this problem whose regret is nearly optimal …

Stochastic linear bandits robust to adversarial attacks

I Bogunovic, A Losalka, A Krause… - International …, 2021 - proceedings.mlr.press
We consider a stochastic linear bandit problem in which the rewards are not only subject to
random noise, but also adversarial attacks subject to a suitable budget $ C $(ie, an upper …

Corruption-tolerant gaussian process bandit optimization

I Bogunovic, A Krause… - … Conference on Artificial …, 2020 - proceedings.mlr.press
We consider the problem of optimizing an unknown (typically non-convex) function with a
bounded norm in some Reproducing Kernel Hilbert Space (RKHS), based on noisy bandit …

Incentivized learning in principal-agent bandit games

A Scheid, D Tiapkin, E Boursier, A Capitaine… - arxiv preprint arxiv …, 2024 - arxiv.org
This work considers a repeated principal-agent bandit game, where the principal can only
interact with her environment through the agent. The principal and the agent have …

Byzantine-robust distributed online learning: Taming adversarial participants in an adversarial environment

X Dong, Z Wu, Q Ling, Z Tian - IEEE Transactions on Signal …, 2023 - ieeexplore.ieee.org
This paper studies distributed online learning under Byzantine attacks. The performance of
an online learning algorithm is often characterized by (adversarial) regret, which evaluates …

Adversarial attacks on linear contextual bandits

E Garcelon, B Roziere, L Meunier… - Advances in …, 2020 - proceedings.neurips.cc
Contextual bandit algorithms are applied in a wide range of domains, from advertising to
recommender systems, from clinical trials to education. In many of these domains, malicious …

Robust stochastic linear contextual bandits under adversarial attacks

Q Ding, CJ Hsieh, J Sharpnack - … Conference on Artificial …, 2022 - proceedings.mlr.press
Stochastic linear contextual bandit algorithms have substantial applications in practice, such
as recommender systems, online advertising, clinical trials, etc. Recent works show that …

Robust multi-agent multi-armed bandits

D Vial, S Shakkottai, R Srikant - … Design for Mobile Networks and Mobile …, 2021 - dl.acm.org
Recent works have shown that agents facing independent instances of a stochastic K-armed
bandit can collaborate to decrease regret. However, these works assume that each agent …

Learning product rankings robust to fake users

N Golrezaei, V Manshadi, J Schneider… - Proceedings of the 22nd …, 2021 - dl.acm.org
In many online platforms, customers' decisions are substantially influenced by product
rankings as most customers only examine a few top-ranked products. Concurrently, such …

Towards best-of-all-worlds online learning with feedback graphs

L Erez, T Koren - Advances in Neural Information …, 2021 - proceedings.neurips.cc
We study the online learning with feedback graphs framework introduced by Mannor and
Shamir (2011), in which the feedback received by the online learner is specified by a graph …