On Private and Robust Bandits

被引:0
|
作者
Wu, Yulian [1 ]
Zhou, Xingyu [2 ]
Tao, Youming [3 ]
Wang, Di [1 ]
机构
[1] KAUST, Thuwal, Saudi Arabia
[2] Wayne State Univ, Wayne, NJ USA
[3] Shandong Univ, Jinan, Peoples R China
来源
ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 36 (NEURIPS 2023) | 2023年
关键词
MULTIARMED BANDIT;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We study private and robust multi-armed bandits (MABs), where the agent receives Huber's contaminated heavy-tailed rewards and meanwhile needs to ensure differential privacy. We consider both the finite k-th raw moment and the finite k-th central moment settings for heavy-tailed rewards distributions with k >= 2. We first present its minimax lower bound, characterizing the information-theoretic limit of regret with respect to privacy budget, contamination level, and heavy-tailedness. Then, we propose a meta-algorithm that builds on a private and robust mean estimation sub-routine PRM that essentially relies on reward truncation and the Laplace mechanism. For the above two different heavy-tailed settings, we give corresponding schemes of PRM, which enable us to achieve nearly-optimal regrets. Moreover, our two proposed truncation-based or histogram-based PRM schemes achieve the optimal trade-off between estimation accuracy, privacy and robustness. Finally, we support our theoretical results and show the effectiveness of our algorithms with experimental studies.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Robust and private stochastic linear bandits
    Charisopoulos, Vasileios
    Esfandiari, Hossein
    Mirrokni, Vahab
    INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 202, 2023, 202
  • [2] Shuffle Private Linear Contextual Bandits
    Chowdhury, Sayak Ray
    Zhou, Xingyu
    INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 162, 2022,
  • [3] Differentially Private Contextual Linear Bandits
    Shariff, Roshan
    Sheffet, Or
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 31 (NIPS 2018), 2018, 31
  • [4] Differentially Private Algorithm for Graphical Bandits
    Lu S.-Y.
    Wang G.-H.
    Qiu Z.-H.
    Zhang L.-J.
    Ruan Jian Xue Bao/Journal of Software, 2022, 33 (09):
  • [5] Robust Contextual Bandits via Bootstrapping
    Tang, Qiao
    Xie, Hong
    Xia, Yunni
    Lee, Jia
    Zhu, Qingsheng
    THIRTY-FIFTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THIRTY-THIRD CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE AND THE ELEVENTH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2021, 35 : 12182 - 12189
  • [6] Robust Causal Bandits for Linear Models
    Yan, Zirui
    Mukherjee, Arpan
    Varici, Burak
    Tajer, Ali
    IEEE JOURNAL ON SELECTED AREAS IN INFORMATION THEORY, 2024, 5 : 78 - 93
  • [7] Distributed Robust Bandits With Efficient Communication
    Wang, Ao
    Qin, Zhida
    Zheng, Lu
    Li, Dapeng
    Gao, Lin
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (03): : 1586 - 1598
  • [8] Extreme Bandits Using Robust Statistics
    Bhatt, Sujay
    Li, Ping
    Samorodnitsky, Gennady
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (03) : 1761 - 1776
  • [9] (Private) Kernelized Bandits with Distributed Biased Feedback
    Li, Fengjiao
    Zhou, Xingyu
    Ji, Bo
    PROCEEDINGS OF THE ACM ON MEASUREMENT AND ANALYSIS OF COMPUTING SYSTEMS, 2023, 7 (01)
  • [10] Stochastic Bandits Robust to Adversarial Corruptions
    Lykouris, Thodoris
    Mirrokni, Vahab
    Leme, Renato Paes
    STOC'18: PROCEEDINGS OF THE 50TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2018, : 114 - 122