Anonymous Bandits for Multi-User Systems

被引:0
|
作者
Esfandiari, Hossein [1 ]
Mirrokni, Vahab [1 ]
Schneider, Jon [1 ]
机构
[1] Google Res, Mountain View, CA 94043 USA
关键词
REGRET BOUNDS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this work, we present and study a new framework for online learning in systems with multiple users that provide user anonymity. Specifically, we extend the notion of bandits to obey the standard k-anonymity constraint by requiring each observation to be an aggregation of rewards for at least k users. This provides a simple yet effective framework where one can learn a clustering of users in an online fashion without observing any user's individual decision. We initiate the study of anonymous bandits and provide the first sublinear regret algorithms and lower bounds for this setting.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Deep Contextual Bandits for Orchestrating Multi-User MISO Systems with Multiple RISs
    Stylianopoulos, Kyriakos
    Alexandropoulos, George
    Huang, Chongwen
    Yuen, Chau
    Bennis, Mehdi
    Debbah, Merouane
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 1556 - 1561
  • [2] ADVERSARIAL MULTI-USER BANDITS FOR UNCOORDINATED SPECTRUM ACCESS
    Bande, Meghana
    Veeravalli, Venugopal V.
    2019 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2019, : 4514 - 4518
  • [3] Multi-User Multi-Armed Bandits for Uncoordinated Spectrum Access
    Bande, Meghana
    Veeravalli, Venugopal V.
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 653 - 657
  • [4] Adversarial Bandits With Multi-User Delayed Feedback: Theory and Application
    Li, Yandi
    Guo, Jianxiong
    Li, Yupeng
    Wang, Tian
    Jia, Weijia
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (10) : 9383 - 9397
  • [5] Dynamic Spectrum Access Using Stochastic Multi-User Bandits
    Bande, Meghana
    Magesh, Akshayaa
    Veeravalli, Venugopal V.
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (05) : 953 - 956
  • [6] Revocable and anonymous searchable encryption in multi-user setting
    Miao, Yinbin
    Ma, Jianfeng
    Liu, Zhiquan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04): : 1204 - 1218
  • [7] Anonymous Searchable Encryption Scheme for Multi-User Databases
    Varadharajan, Vijayaraghavan
    Mani, Raghubansh
    Nallusamy, Rajarathnam
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2013), 2013, : 225 - 232
  • [8] Turbo multi-user receiver for asynchronous multi-user OFDM systems
    Jung, HJ
    Zoltowski, MD
    2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING, 2005, : 693 - 696
  • [9] Restless Video Bandits: Optimal SVC Streaming in a Multi-User Wireless Network
    Hosseini, S. Amir
    Panwar, Shivendra S.
    IEEE ACCESS, 2019, 7 : 150805 - 150822
  • [10] Roaming Electric Vehicle Charging and Billing: an Anonymous Multi-User Protocol
    Mustafa, Mustafa A.
    Zhang, Ning
    Kalogridis, Georgios
    Fan, Zhong
    2014 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2014, : 939 - 945