共 50 条
- [1] Relay Selection with No Side Information: An Adversarial Bandit Approach [J]. 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 715 - 720
- [2] Clustering of Bandit with Frequency-Dependent Information Sharing [J]. ADVANCES IN INFORMATION RETRIEVAL, ECIR 2023, PT II, 2023, 13981 : 274 - 287
- [3] Secure Information Sharing in Adversarial Adaptive Diffusion Networks [J]. IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2018, 4 (01): : 111 - 124
- [4] The Nash and the Bandit Approaches for Adversarial Portfolios [J]. 2014 IEEE CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND GAMES (CIG), 2014,
- [5] Meta-Learning Adversarial Bandit Algorithms [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 36 (NEURIPS 2023), 2023,
- [6] Algorithms for Adversarial Bandit Problems with Multiple Plays [J]. ALGORITHMIC LEARNING THEORY, ALT 2010, 2010, 6331 : 375 - 389
- [7] Impact of Trust Management and Information Sharing to Adversarial Cost in Ranking Systems [J]. TRUST MANAGEMENT IV, 2010, 321 : 108 - 124
- [8] Safety-Aware Algorithms for Adversarial Contextual Bandit [J]. INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 70, 2017, 70
- [9] Achieving Privacy in the Adversarial Multi-Armed Bandit [J]. THIRTY-FIRST AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 2653 - 2659