Probabilistic Sequential Shrinking: A Best Arm Identification Algorithm for Stochastic Bandits with Corruptions

被引:0
|
作者
Zhong, Zixin [1 ]
Cheung, Wang Chi [2 ,3 ]
Tan, Vincent Y. F. [1 ,3 ,4 ]
机构
[1] Natl Univ Singapore, Dept Math, Singapore, Singapore
[2] Natl Univ Singapore, Dept Ind Syst & Management, Singapore, Singapore
[3] Natl Univ Singapore, Inst Operat Res & Analyt, Singapore, Singapore
[4] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore, Singapore
基金
新加坡国家研究基金会;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We consider a best arm identification (BAI) problem for stochastic bandits with adversarial corruptions in the fixed-budget setting of T steps. We design a novel randomized algorithm, PROBABILISTIC SEQUENTIAL SHRINKING(u) (PSS(u)), which is agnostic to the amount of corruptions. When the amount of corruptions per step (CPS) is below a threshold, PSS(u) identifies the best arm or item with probability tending to 1 as T -> infinity. Otherwise, the optimality gap of the identified item degrades gracefully with the CPS. We argue that such a bifurcation is necessary. In PSS(u), the parameter u serves to balance between the optimality gap and success probability. The injection of randomization is shown to be essential to mitigate the impact of corruptions. To demonstrate this, we design two attack strategies that are applicable to any algorithm. We apply one of them to a deterministic analogue of PSS(u) known as SUCCESSIVE HALVING (SH) by Karnin et al. (2013). The attack strategy results in a high failure probability for SH, but PSS (u) remains robust. In the absence of corruptions, PSS (2)'s performance guarantee matches SH's. We show that when the CPS is sufficiently large, no algorithm can achieve a BAI probability tending to 1 as T -> infinity. Numerical experiments corroborate our theoretical findings.
引用
收藏
页数:10
相关论文
共 36 条
  • [1] SPRT-Based Efficient Best Arm Identification in Stochastic Bandits
    Mukherjee A.
    Tajer A.
    IEEE Journal on Selected Areas in Information Theory, 2023, 4 : 128 - 143
  • [2] Best arm identification for contaminated bandits
    Altschuler, Jason
    Brunel, Victor-Emmanuel
    Malek, Alan
    Journal of Machine Learning Research, 2019, 20
  • [3] Best Arm Identification for Contaminated Bandits
    Altschuler, Jason
    Brunel, Victor-Emmanuel
    Malek, Alan
    JOURNAL OF MACHINE LEARNING RESEARCH, 2019, 20
  • [4] Best Arm Identification in Spectral Bandits
    Kocak, Tomas
    Garivier, Aurelien
    PROCEEDINGS OF THE TWENTY-NINTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2020, : 2220 - 2226
  • [5] Best Arm Identification for Both Stochastic and Adversarial Multi-armed Bandits
    Zhang, Hantao
    Shen, Cong
    2018 IEEE INFORMATION THEORY WORKSHOP (ITW), 2018, : 385 - 389
  • [6] Best Arm Identification in Graphical Bilinear Bandits
    Rizk, Geovani
    Thomas, Albert
    Colin, Igor
    Laraki, Rida
    Chevaleyre, Yann
    INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 139, 2021, 139
  • [7] On Sequential Elimination Algorithms for Best-Arm Identification in Multi-Armed Bandits
    Shahrampour, Shahin
    Noshad, Mohammad
    Tarokh, Vahid
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2017, 65 (16) : 4281 - 4292
  • [8] Best-Arm Identification in Linear Bandits
    Soare, Marta
    Lazaric, Alessandro
    Munos, Remi
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 27 (NIPS 2014), 2014, 27
  • [9] Epsilon Best Arm Identification in Spectral Bandits
    Kocak, Tomas
    Garivier, Aurelien
    PROCEEDINGS OF THE THIRTIETH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI 2021, 2021, : 2636 - 2642
  • [10] Best arm identification in generalized linear bandits
    Kazerouni, Abbas
    Wein, Lawrence M.
    OPERATIONS RESEARCH LETTERS, 2021, 49 (03) : 365 - 371