Probabilistic Sequential Shrinking: A Best Arm Identification Algorithm for Stochastic Bandits with Corruptions

被引:0
|
作者
Zhong, Zixin [1 ]
Cheung, Wang Chi [2 ,3 ]
Tan, Vincent Y. F. [1 ,3 ,4 ]
机构
[1] Natl Univ Singapore, Dept Math, Singapore, Singapore
[2] Natl Univ Singapore, Dept Ind Syst & Management, Singapore, Singapore
[3] Natl Univ Singapore, Inst Operat Res & Analyt, Singapore, Singapore
[4] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore, Singapore
基金
新加坡国家研究基金会;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We consider a best arm identification (BAI) problem for stochastic bandits with adversarial corruptions in the fixed-budget setting of T steps. We design a novel randomized algorithm, PROBABILISTIC SEQUENTIAL SHRINKING(u) (PSS(u)), which is agnostic to the amount of corruptions. When the amount of corruptions per step (CPS) is below a threshold, PSS(u) identifies the best arm or item with probability tending to 1 as T -> infinity. Otherwise, the optimality gap of the identified item degrades gracefully with the CPS. We argue that such a bifurcation is necessary. In PSS(u), the parameter u serves to balance between the optimality gap and success probability. The injection of randomization is shown to be essential to mitigate the impact of corruptions. To demonstrate this, we design two attack strategies that are applicable to any algorithm. We apply one of them to a deterministic analogue of PSS(u) known as SUCCESSIVE HALVING (SH) by Karnin et al. (2013). The attack strategy results in a high failure probability for SH, but PSS (u) remains robust. In the absence of corruptions, PSS (2)'s performance guarantee matches SH's. We show that when the CPS is sufficiently large, no algorithm can achieve a BAI probability tending to 1 as T -> infinity. Numerical experiments corroborate our theoretical findings.
引用
收藏
页数:10
相关论文
共 36 条
  • [31] Risk Control of Best Arm Identification in Multi-Armed Bandits via Successive Rejects
    Yu, Xiaotian
    King, Irwin
    Lyu, Michael R.
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2017, : 1147 - 1152
  • [32] ε-Best-Arm Identification in Pay-Per-Reward Multi-Armed Bandits
    Sabato, Sivan
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 32 (NIPS 2019), 2019, 32
  • [33] Quantile Multi-Armed Bandits: Optimal Best-Arm Identification and a Differentially Private Scheme
    Nikolakakis, Konstantinos E.
    Kalogerias, Dionysios S.
    Sheffet, Or
    Sarwate, Anand D.
    Nikolakakis, Konstantinos E. (k.nikolakakis@rutgers.edu), 1600, Institute of Electrical and Electronics Engineers Inc. (02): : 534 - 548
  • [34] On Best-Arm Identification with a Fixed Budget in Non-Parametric Multi-Armed Bandits
    Barrier, Antoine
    Garivier, Aurelien
    Stoltz, Gilles
    INTERNATIONAL CONFERENCE ON ALGORITHMIC LEARNING THEORY, VOL 201, 2023, 201 : 136 - 181
  • [35] Sequential estimation of quantiles with applications to A/B testing and best-arm identification
    Howard, Steven R.
    Ramdas, Aaditya
    BERNOULLI, 2022, 28 (03) : 1704 - 1728
  • [36] Multi-Armed Bandits with Bounded Arm-Memory: Near-Optimal Guarantees for Best-Arm Identification and Regret Minimization
    Maiti, Arnab
    Patil, Vishakha
    Khan, Arindam
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 34 (NEURIPS 2021), 2021, 34