{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T09:42:59Z","timestamp":1769852579416,"version":"3.49.0"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,17]]},"DOI":"10.1109\/infocom53939.2023.10228900","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T17:40:43Z","timestamp":1693330843000},"page":"1-10","source":"Crossref","is-referenced-by-count":11,"title":["Adversarial Group Linear Bandits and Its Application to Collaborative Edge Inference"],"prefix":"10.1109","author":[{"given":"Yin","family":"Huang","sequence":"first","affiliation":[{"name":"University of Miami,Department of Electrical and Computer Engineering"}]},{"given":"Letian","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Miami,Department of Electrical and Computer Engineering"}]},{"given":"Jie","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Miami,Department of Electrical and Computer Engineering"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398375"},{"key":"ref3","first-page":"10007","article-title":"Optimal best-arm identification in linear bandits","volume":"33","author":"Jedra","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref4","first-page":"2443","article-title":"Structure adaptive algorithms for stochastic bandits","volume-title":"International Conference on Machine Learning","author":"Degenne"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3406325.3451004"},{"key":"ref6","article-title":"Online exp3 learning in adversarial bandits with delayed feedback","volume":"32","author":"Bistritz","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref7","first-page":"3988","article-title":"Adapting to delays and data in adversarial multi-armed bandits","volume-title":"International Conference on Machine Learning","author":"Gyorgy"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2019.00022"},{"key":"ref9","article-title":"Improved algorithms for linear stochastic bandits","volume":"24","author":"Abbasi-Yadkori","year":"2011","journal-title":"Advances in neural information processing systems"},{"key":"ref10","first-page":"42","article-title":"The best of both worlds: Stochastic and adversarial bandits","volume-title":"Conference on Learning Theory. JMLR Workshop and Conference Proceedings","author":"Bubeck"},{"key":"ref11","first-page":"1287","article-title":"One practical algorithm for both stochastic and adversarial bandits","volume-title":"International Conference on Machine Learning","author":"Seldin"},{"key":"ref12","first-page":"467","article-title":"An optimal algorithm for stochastic and adversarial bandits","volume-title":"The 22nd International Conference on Artificial Intelligence and Statistics","author":"Zimmert"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3188745.3188918"},{"key":"ref14","first-page":"1562","article-title":"Better algorithms for stochastic bandits with adversarial corruptions","volume-title":"Conference On Learning Theory","author":"Gupta"},{"key":"ref15","author":"Li","year":"2019","journal-title":"Stochastic linear optimization with adversarial corruption"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3093337.3037698"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2947893"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835811"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1017\/9781108571401"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1561\/2200000024"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/336"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33013445"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380148"},{"key":"ref25","first-page":"2392","article-title":"Stochastic linear contextual bandits with diverse contexts","volume-title":"International Conference on Artificial Intelligence and Statistics","author":"Wu"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16108-7_30"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.10896"},{"issue":"28","key":"ref28","first-page":"1","article-title":"Tsallis-inf: An optimal algorithm for stochastic and adversarial bandits","volume":"22","author":"Zimmert","year":"2021","journal-title":"J. Mach. Learn. Res."},{"key":"ref29","first-page":"7111","article-title":"Robust stochastic linear contextual bandits under adversarial attacks","volume-title":"International Conference on Artificial Intelligence and Statistics","author":"Ding"},{"key":"ref30","first-page":"1071","article-title":"Corruption-tolerant gaussian process bandit optimization","volume-title":"International Conference on Artificial Intelligence and Statistics","author":"Bogunovic"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450051"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2015.2448520"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2593486"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2881191"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2019.00025"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2983119"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2985080"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10228901"},{"key":"ref39","article-title":"No-regret caching for partial-observation regime","volume-title":"IEEE INFOCOM 2023-IEEE Conference on Computer Communications.","author":"Jia"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref42","article-title":"Netscope analyzer"}],"event":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","location":"New York City, NY, USA","start":{"date-parts":[[2023,5,17]]},"end":{"date-parts":[[2023,5,20]]}},"container-title":["IEEE INFOCOM 2023 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10228851\/10228852\/10228900.pdf?arnumber=10228900","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T21:55:04Z","timestamp":1709330104000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10228900\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,17]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/infocom53939.2023.10228900","relation":{},"subject":[],"published":{"date-parts":[[2023,5,17]]}}}