{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T20:17:18Z","timestamp":1764793038819,"version":"3.37.3"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,23]]},"DOI":"10.1109\/icassp43922.2022.9747833","type":"proceedings-article","created":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T19:50:34Z","timestamp":1651089034000},"page":"5248-5252","source":"Crossref","is-referenced-by-count":3,"title":["Federated Multi-Armed Bandit Via Uncoordinated Exploration"],"prefix":"10.1109","author":[{"given":"Zirui","family":"Yan","sequence":"first","affiliation":[{"name":"Rensselaer Polytechnic Institute,Electrical, Computer, and Systems Engineering Department,Troy,NY"}]},{"given":"Quan","family":"Xiao","sequence":"additional","affiliation":[{"name":"Rensselaer Polytechnic Institute,Electrical, Computer, and Systems Engineering Department,Troy,NY"}]},{"given":"Tianyi","family":"Chen","sequence":"additional","affiliation":[{"name":"Rensselaer Polytechnic Institute,Electrical, Computer, and Systems Engineering Department,Troy,NY"}]},{"given":"Ali","family":"Tajer","sequence":"additional","affiliation":[{"name":"Rensselaer Polytechnic Institute,Electrical, Computer, and Systems Engineering Department,Troy,NY"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Differentially-private federated linear bandits","author":"dubey","year":"2020","journal-title":"Proc Neural Information Processing Systems"},{"key":"ref11","article-title":"Robust federated bestarm identification in multi-armed bandits","author":"mitra","year":"2021","journal-title":"arXiv 2109 05700"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7952664"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3466772.3467045"},{"key":"ref14","article-title":"Multi-agent multi-armed bandits with limited communication","author":"agarwal","year":"2021","journal-title":"arXiv 2102 08462"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3410220.3453919"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.23919\/ACC50511.2021.9483267"},{"key":"ref17","first-page":"2917","article-title":"Federated multi-armed bandits with personalization","author":"shi","year":"2021","journal-title":"Porc International Conference on Artificial Intelligence and Statistics"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110406"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1017\/9781108571401"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1098\/rsos.171377"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174297"},{"key":"ref7","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume":"54","author":"mcmahan","year":"2017","journal-title":"Proc Artificial Intelligence and Statistics"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9904-1952-09620-8"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2307\/2332286"},{"key":"ref9","article-title":"Distributed bandit learning: Near-optimal regret with efficient communication","author":"wang","year":"2019","journal-title":"Proc International Conference on Learning Representations"}],"event":{"name":"ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2022,5,23]]},"location":"Singapore, Singapore","end":{"date-parts":[[2022,5,27]]}},"container-title":["ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9745891\/9746004\/09747833.pdf?arnumber=9747833","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T20:11:07Z","timestamp":1661199067000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9747833\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,23]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icassp43922.2022.9747833","relation":{},"subject":[],"published":{"date-parts":[[2022,5,23]]}}}