Probabilistic Sequential Shrinking: A Best Arm Identification Algorithm for Stochastic Bandits with Corruptions

被引:0
|
作者
Zhong, Zixin [1 ]
Cheung, Wang Chi [2 ,3 ]
Tan, Vincent Y. F. [1 ,3 ,4 ]
机构
[1] Natl Univ Singapore, Dept Math, Singapore, Singapore
[2] Natl Univ Singapore, Dept Ind Syst & Management, Singapore, Singapore
[3] Natl Univ Singapore, Inst Operat Res & Analyt, Singapore, Singapore
[4] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore, Singapore
基金
新加坡国家研究基金会;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We consider a best arm identification (BAI) problem for stochastic bandits with adversarial corruptions in the fixed-budget setting of T steps. We design a novel randomized algorithm, PROBABILISTIC SEQUENTIAL SHRINKING(u) (PSS(u)), which is agnostic to the amount of corruptions. When the amount of corruptions per step (CPS) is below a threshold, PSS(u) identifies the best arm or item with probability tending to 1 as T -> infinity. Otherwise, the optimality gap of the identified item degrades gracefully with the CPS. We argue that such a bifurcation is necessary. In PSS(u), the parameter u serves to balance between the optimality gap and success probability. The injection of randomization is shown to be essential to mitigate the impact of corruptions. To demonstrate this, we design two attack strategies that are applicable to any algorithm. We apply one of them to a deterministic analogue of PSS(u) known as SUCCESSIVE HALVING (SH) by Karnin et al. (2013). The attack strategy results in a high failure probability for SH, but PSS (u) remains robust. In the absence of corruptions, PSS (2)'s performance guarantee matches SH's. We show that when the CPS is sufficiently large, no algorithm can achieve a BAI probability tending to 1 as T -> infinity. Numerical experiments corroborate our theoretical findings.
引用
收藏
页数:10
相关论文
共 36 条
  • [21] Best-Arm Identification in Correlated Multi-Armed Bandits
    Gupta S.
    Joshi G.
    Yagan O.
    IEEE Journal on Selected Areas in Information Theory, 2021, 2 (02): : 549 - 563
  • [22] Best Arm Identification in Restless Markov Multi-Armed Bandits
    Karthik, P. N.
    Reddy, Kota Srinivas
    Tan, Vincent Y. F.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (05) : 3240 - 3262
  • [23] Nonlinear Sequential Accepts and Rejects for Identification of Top Arms in Stochastic Bandits
    Shahrampour, Shahin
    Tarokh, Vahid
    2017 55TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2017, : 228 - 235
  • [24] A Non-asymptotic Approach to Best-Arm Identification for Gaussian Bandits
    Barrier, Antoine
    Garivier, Aurelien
    Kocak, Tomas
    INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND STATISTICS, VOL 151, 2022, 151
  • [25] Minimax Optimal Fixed-Budget Best Arm Identification in Linear Bandits
    Yang, Junwen
    Tan, Vincent Y. F.
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 35, NEURIPS 2022, 2022,
  • [26] Non-stochastic Best Arm Identification and Hyperparameter Optimization
    Jamieson, Kevin
    Talwalkar, Ameet
    ARTIFICIAL INTELLIGENCE AND STATISTICS, VOL 51, 2016, 51 : 240 - 248
  • [27] A/B Testing and Best-arm Identification for Linear Bandits with Robustness to Non-stationarity
    Xiong, Zhihan
    Camilleri, Romain
    Fazel, Maryam
    Jain, Lalit
    Jamieson, Kevin
    INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND STATISTICS, VOL 238, 2024, 238
  • [28] Closing the Computational-Statistical Gap in Best Arm Identification for Combinatorial Semi-bandits
    Tzeng, Ruo-Chun
    Wang, Po-An
    Proutiere, Alexandre
    Lu, Chi-Jen
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 36 (NEURIPS 2023), 2023,
  • [29] Statistically Robust, Risk-Averse Best Arm Identification in Multi-Armed Bandits
    Kagrecha, Anmol
    Nair, Jayakrishnan
    Jagannathan, Krishna
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (08) : 5248 - 5267
  • [30] Best-arm Identification Algorithms for Multi-Armed Bandits in the Fixed Confidence Setting
    Jamieson, Kevin
    Nowak, Robert
    2014 48TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2014,