Academic literature on the topic 'Adversarial bandits'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Adversarial bandits.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Adversarial bandits"
Lu, Shiyin, Guanghui Wang, and Lijun Zhang. "Stochastic Graphical Bandits with Adversarial Corruptions." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 10 (May 18, 2021): 8749–57. http://dx.doi.org/10.1609/aaai.v35i10.17060.
Full textPacchiano, Aldo, Heinrich Jiang, and Michael I. Jordan. "Robustness Guarantees for Mode Estimation with an Application to Bandits." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 10 (May 18, 2021): 9277–84. http://dx.doi.org/10.1609/aaai.v35i10.17119.
Full textWang, Zhiwei, Huazheng Wang, and Hongning Wang. "Stealthy Adversarial Attacks on Stochastic Multi-Armed Bandits." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 14 (March 24, 2024): 15770–77. http://dx.doi.org/10.1609/aaai.v38i14.29506.
Full textEsfandiari, Hossein, Amin Karbasi, Abbas Mehrabian, and Vahab Mirrokni. "Regret Bounds for Batched Bandits." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 8 (May 18, 2021): 7340–48. http://dx.doi.org/10.1609/aaai.v35i8.16901.
Full textChen, Cheng, Canzhe Zhao, and Shuai Li. "Simultaneously Learning Stochastic and Adversarial Bandits under the Position-Based Model." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 6 (June 28, 2022): 6202–10. http://dx.doi.org/10.1609/aaai.v36i6.20569.
Full textWang, Lingda, Bingcong Li, Huozhi Zhou, Georgios B. Giannakis, Lav R. Varshney, and Zhizhen Zhao. "Adversarial Linear Contextual Bandits with Graph-Structured Side Observations." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 11 (May 18, 2021): 10156–64. http://dx.doi.org/10.1609/aaai.v35i11.17218.
Full textWachel, Pawel, and Cristian Rojas. "An Adversarial Approach to Adaptive Model Predictive Control." Journal of Advances in Applied & Computational Mathematics 9 (September 19, 2022): 135–46. http://dx.doi.org/10.15377/2409-5761.2022.09.10.
Full textXu, Xiao, and Qing Zhao. "Memory-Constrained No-Regret Learning in Adversarial Multi-Armed Bandits." IEEE Transactions on Signal Processing 69 (2021): 2371–82. http://dx.doi.org/10.1109/tsp.2021.3070201.
Full textShi, Chengshuai, and Cong Shen. "On No-Sensing Adversarial Multi-Player Multi-Armed Bandits With Collision Communications." IEEE Journal on Selected Areas in Information Theory 2, no. 2 (June 2021): 515–33. http://dx.doi.org/10.1109/jsait.2021.3076027.
Full textTae, Ki Hyun, Hantian Zhang, Jaeyoung Park, Kexin Rong, and Steven Euijong Whang. "Falcon: Fair Active Learning Using Multi-Armed Bandits." Proceedings of the VLDB Endowment 17, no. 5 (January 2024): 952–65. http://dx.doi.org/10.14778/3641204.3641207.
Full textDissertations / Theses on the topic "Adversarial bandits"
Maillard, Odalric-Ambrym. "APPRENTISSAGE SÉQUENTIEL : Bandits, Statistique et Renforcement." Phd thesis, Université des Sciences et Technologie de Lille - Lille I, 2011. http://tel.archives-ouvertes.fr/tel-00845410.
Full textAubert, Julien. "Théorie de l'estimation pour les processus d'apprentissage." Electronic Thesis or Diss., Université Côte d'Azur, 2025. http://www.theses.fr/2025COAZ5001.
Full textThis thesis considers the problem of estimating the learning process of an individual during a task based on observed choices or actions of that individual. This question lies at the intersection of cognition, statistics, and reinforcement learning, and involves developing models that accurately capture the dynamics of learning, estimating model parameters, and selecting the best-fitting model. A key difficulty is that learning, by nature, leads to non-independent and non-stationary data, as the individual selects its actions depending on the outcome of its previous choices.Existing statistical theories and methods are well-established for independent and stationary data, but their application to a learning framework introduces significant challenges. This thesis seeks to bridge the gap between empirical methods and theoretical guarantees in computational modeling. I first explore the properties of maximum likelihood estimation on a model of learning based on a bandit problem. I then present general theoretical results on penalized log-likelihood model selection for non-stationary and dependent data, for which I develop a new concentration inequality for the suprema of renormalized processes. I also introduce a hold-out procedure and theoretical guarantees for it in a learning framework. These theoretical results are supported with applications on synthetic data and on real cognitive experiments in psychology and ethology
Books on the topic "Adversarial bandits"
Parsons, Dave. Bandits!: Pictorial history of American adversarial aircraft. Osceola, WI: Motorbooks International, 1993.
Find full textNelson, Derek, and Dave Parsons. Bandits!: Pictorial History of American Adversarial Aircraft. Motorbooks Intl, 1993.
Find full textBook chapters on the topic "Adversarial bandits"
Li, Yandi, and Jianxiong Guo. "A Modified EXP3 in Adversarial Bandits with Multi-user Delayed Feedback." In Lecture Notes in Computer Science, 263–78. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-49193-1_20.
Full textZheng, Rong, and Cunqing Hua. "Adversarial Multi-armed Bandit." In Wireless Networks, 41–57. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-50502-2_4.
Full textSt-Pierre, David L., and Olivier Teytaud. "Sharing Information in Adversarial Bandit." In Applications of Evolutionary Computation, 386–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-45523-4_32.
Full textUchiya, Taishi, Atsuyoshi Nakamura, and Mineichi Kudo. "Algorithms for Adversarial Bandit Problems with Multiple Plays." In Lecture Notes in Computer Science, 375–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16108-7_30.
Full textLee, Chia-Jung, Yalei Yang, Sheng-Hui Meng, and Tien-Wen Sung. "Adversarial Multiarmed Bandit Problems in Gradually Evolving Worlds." In Advances in Smart Vehicular Technology, Transportation, Communication and Applications, 305–11. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70730-3_36.
Full text"Exp3 for Adversarial Linear Bandits." In Bandit Algorithms, 278–85. Cambridge University Press, 2020. http://dx.doi.org/10.1017/9781108571401.034.
Full text"The Relation between Adversarial and Stochastic Linear Bandits." In Bandit Algorithms, 306–12. Cambridge University Press, 2020. http://dx.doi.org/10.1017/9781108571401.036.
Full textSrisawad, Phurinut, Juergen Branke, and Long Tran-Thanh. "Identifying the Best Arm in the Presence of Global Environment Shifts." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2024. http://dx.doi.org/10.3233/faia240735.
Full textWissow, Stephen, and Masataro Asai. "Scale-Adaptive Balancing of Exploration and Exploitation in Classical Planning." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2024. http://dx.doi.org/10.3233/faia240994.
Full textConference papers on the topic "Adversarial bandits"
Huang, Yin, Qingsong Liu, and Jie Xu. "Adversarial Combinatorial Bandits with Switching Cost and Arm Selection Constraints." In IEEE INFOCOM 2024 - IEEE Conference on Computer Communications, 371–80. IEEE, 2024. http://dx.doi.org/10.1109/infocom52122.2024.10621364.
Full textLi, Jinpeng, Yunni Xia, Xiaoning Sun, Peng Chen, Xiaobo Li, and Jiafeng Feng. "Delay-Aware Service Caching in Edge Cloud: An Adversarial Semi-Bandits Learning-Based Approach." In 2024 IEEE 17th International Conference on Cloud Computing (CLOUD), 411–18. IEEE, 2024. http://dx.doi.org/10.1109/cloud62652.2024.00053.
Full textLa-aiddee, Panithan, Paramin Sangwongngam, Lunchakorn Wuttisittikulkij, and Pisit Vanichchanunt. "A Generative Adversarial Network-Based Approach for Reflective-Metasurface Unit-Cell Synthesis in mmWave Bands." In 2024 International Technical Conference on Circuits/Systems, Computers, and Communications (ITC-CSCC), 1–5. IEEE, 2024. http://dx.doi.org/10.1109/itc-cscc62988.2024.10628337.
Full textImmorlica, Nicole, Karthik Abinav Sankararaman, Robert Schapire, and Aleksandrs Slivkins. "Adversarial Bandits with Knapsacks." In 2019 IEEE 60th Annual Symposium on Foundations of Computer Science (FOCS). IEEE, 2019. http://dx.doi.org/10.1109/focs.2019.00022.
Full textLykouris, Thodoris, Vahab Mirrokni, and Renato Paes Leme. "Stochastic bandits robust to adversarial corruptions." In STOC '18: Symposium on Theory of Computing. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3188745.3188918.
Full textWan, Zongqi, Xiaoming Sun, and Jialin Zhang. "Bounded Memory Adversarial Bandits with Composite Anonymous Delayed Feedback." In Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/486.
Full textBande, Meghana, and Venugopal V. Veeravalli. "Adversarial Multi-user Bandits for Uncoordinated Spectrum Access." In ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2019. http://dx.doi.org/10.1109/icassp.2019.8682263.
Full textHan, Shuguang, Michael Bendersky, Przemek Gajda, Sergey Novikov, Marc Najork, Bernhard Brodowsky, and Alexandrin Popescul. "Adversarial Bandits Policy for Crawling Commercial Web Content." In WWW '20: The Web Conference 2020. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3366423.3380125.
Full textHoward, William W., Anthony F. Martone, and R. Michael Buehrer. "Adversarial Multi-Player Bandits for Cognitive Radar Networks." In 2022 IEEE Radar Conference (RadarConf22). IEEE, 2022. http://dx.doi.org/10.1109/radarconf2248738.2022.9764226.
Full textRangi, Anshuka, Massimo Franceschetti, and Long Tran-Thanh. "Unifying the Stochastic and the Adversarial Bandits with Knapsack." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/459.
Full text