{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T14:56:48Z","timestamp":1777042608737,"version":"3.51.4"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,25]],"date-time":"2023-06-25T00:00:00Z","timestamp":1687651200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,25]],"date-time":"2023-06-25T00:00:00Z","timestamp":1687651200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006754","name":"Army Research Laboratory","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,25]]},"DOI":"10.1109\/isit54713.2023.10206591","type":"proceedings-article","created":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T13:31:15Z","timestamp":1692711075000},"page":"1312-1317","source":"Crossref","is-referenced-by-count":4,"title":["Multi-Arm Bandits over Action Erasure Channels"],"prefix":"10.1109","author":[{"given":"Osama A.","family":"Hanna","sequence":"first","affiliation":[{"name":"University of California,Los Angeles"}]},{"given":"Merve","family":"Karakas","sequence":"additional","affiliation":[{"name":"University of California,Los Angeles"}]},{"given":"Lin F.","family":"Yang","sequence":"additional","affiliation":[{"name":"University of California,Los Angeles"}]},{"given":"Christina","family":"Fragouli","sequence":"additional","affiliation":[{"name":"University of California,Los Angeles"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/icra.2013.6631223"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/cec48606.2020.9185782"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/aisy.202200168"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/s42005-022-00935-x"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1023\/a:1013689704352"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.2307\/2332286"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176350495"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/sfcs.1995.492488"},{"key":"ref9","first-page":"42.1","article-title":"The best of both worlds: Stochastic and adversarial bandits","volume-title":"Proceedings of the 25th Annual Conference on Learning Theory","volume":"23","author":"Bubeck"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1137\/s0097539701398375"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/icassp.2017.7952664"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2014.2302471"},{"key":"ref14","first-page":"109","article-title":"Distributed cooperative decision making in multi-agent multi-armed bandits","volume-title":"Automatica","volume":"125","author":"Landgren","year":"2021","ISSN":"https:\/\/id.crossref.org\/issn\/0005-1098","issn-type":"print"},{"key":"ref15","article-title":"Distributed multi-agent multi-armed ban-dits","author":"Landgren","year":"2019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3188745.3188918"},{"key":"ref17","first-page":"1562","article-title":"Better algorithms for stochastic bandits with adversarial corruptions","volume-title":"Proceedings of the Thirty-Second Conference on Learning Theory","volume":"99","author":"Gupta"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-018-5758-5"},{"key":"ref19","first-page":"14 315","article-title":"Prediction with corrupted expert advice","volume":"33","author":"Amir","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/0196-8858(85)90002-8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1995.492488"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10998-010-3055-6"}],"event":{"name":"2023 IEEE International Symposium on Information Theory (ISIT)","location":"Taipei, Taiwan","start":{"date-parts":[[2023,6,25]]},"end":{"date-parts":[[2023,6,30]]}},"container-title":["2023 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206429\/10206441\/10206591.pdf?arnumber=10206591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:27:09Z","timestamp":1773347229000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10206591\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,25]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/isit54713.2023.10206591","relation":{},"subject":[],"published":{"date-parts":[[2023,6,25]]}}}