{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:40:06Z","timestamp":1773376806113,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,25]],"date-time":"2023-06-25T00:00:00Z","timestamp":1687651200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,25]],"date-time":"2023-06-25T00:00:00Z","timestamp":1687651200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,25]]},"DOI":"10.1109\/isit54713.2023.10206552","type":"proceedings-article","created":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T13:31:15Z","timestamp":1692711075000},"page":"1460-1465","source":"Crossref","is-referenced-by-count":4,"title":["On High-dimensional and Low-rank Tensor Bandits"],"prefix":"10.1109","author":[{"given":"Chengshuai","family":"Shi","sequence":"first","affiliation":[{"name":"University of Virginia,Charlottesville,VA,USA,22904"}]},{"given":"Cong","family":"Shen","sequence":"additional","affiliation":[{"name":"University of Virginia,Charlottesville,VA,USA,22904"}]},{"given":"Nicholas D.","family":"Sidiropoulos","sequence":"additional","affiliation":[{"name":"University of Virginia,Charlottesville,VA,USA,22904"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT54713.2023.10206552"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1017\/9781108571401"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1561\/2200000024"},{"key":"ref4","article-title":"Improved algorithms for linear stochastic bandits","volume":"24","author":"Abbasi-Yadkori","year":"2011","journal-title":"Advances in neural information processing systems"},{"key":"ref5","first-page":"208","article-title":"Contextual bandits with linear payoff functions","volume-title":"Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics","author":"Chu"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1201"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41357-0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2915921"},{"key":"ref9","first-page":"3163","article-title":"Bilinear bandits with low-rank structure","volume-title":"International Conference on Machine Learning","author":"Jun"},{"key":"ref10","article-title":"Efficient frameworks for generalized low-rank matrix bandit problems","author":"Kang","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref11","first-page":"arXiv","article-title":"Stochastic low-rank tensor bandits for multi-dimensional online decision making","author":"Zhou","year":"2020"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1137\/07070111X"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2017.2690524"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2013.776499"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s12561-018-9215-6"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCI.2019.2940916"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2019.2952044"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1088\/0266-5611\/27\/2\/025010"},{"key":"ref19","article-title":"Provable tensor factorization with missing data","volume":"27","author":"Jain","year":"2014","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1137\/19M126476X"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1137\/19M1299335"},{"key":"ref22","first-page":"460","article-title":"Low-rank generalized linear bandit problems","volume-title":"International Conference on Artificial Intelligence and Statistics","author":"Lu"},{"key":"ref23","first-page":"46","article-title":"Spectral bandits for smooth graph functions","volume-title":"International Conference on Machine Learning","author":"Valko"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1214\/21-AOS2061"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1214\/20-AOS1942"},{"key":"ref26","first-page":"4744","article-title":"Improved regret bounds of bilinear bandits using action space analysis","volume-title":"International Conference on Machine Learning","author":"Jang"},{"key":"ref27","article-title":"Targeted advertising on social networks using online variational tensor regression","author":"Id\u00e9","year":"2022"}],"event":{"name":"2023 IEEE International Symposium on Information Theory (ISIT)","location":"Taipei, Taiwan","start":{"date-parts":[[2023,6,25]]},"end":{"date-parts":[[2023,6,30]]}},"container-title":["2023 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206429\/10206441\/10206552.pdf?arnumber=10206552","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:28:27Z","timestamp":1773347307000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10206552\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,25]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/isit54713.2023.10206552","relation":{},"subject":[],"published":{"date-parts":[[2023,6,25]]}}}