{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T18:41:28Z","timestamp":1762368088256,"version":"build-2065373602"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001659","name":"German Research Foundation","doi-asserted-by":"publisher","award":["MA7111\/6-1 and MA7111\/7-1"],"award-info":[{"award-number":["MA7111\/6-1 and MA7111\/7-1"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,31]]},"DOI":"10.1109\/mlsp62443.2025.11204241","type":"proceedings-article","created":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T17:15:52Z","timestamp":1761326152000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Networked Contextual Bandits with Anomaly-Aware Learning"],"prefix":"10.1109","author":[{"given":"Xiaotong","family":"Cheng","sequence":"first","affiliation":[{"name":"Ruhr-University,Faculty of Electrical Engineering and Information Technology,Bochum,Germany"}]},{"given":"Setareh","family":"Maghsudi","sequence":"additional","affiliation":[{"name":"Ruhr-University,Faculty of Electrical Engineering and Information Technology,Bochum,Germany"}]}],"member":"263","reference":[{"issue":"1","key":"ref1","first-page":"96","article-title":"The epoch-greedy algorithm for contextual multi-armed bandits","volume":"20","author":"Langford","year":"2007","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835811"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3392717.3392748"},{"key":"ref5","article-title":"A gang of bandits","volume":"26","author":"Cesa-Bianchi","year":"2013","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2911528"},{"key":"ref7","first-page":"3133","article-title":"Laplacian-regularized graph bandits: Algorithms and theoretical analysis","volume-title":"International Conference on Artificial Intelligence and Statistics. PMLR","author":"Yang","year":"2020"},{"key":"ref8","first-page":"757","article-title":"Online clustering of bandits","volume-title":"International Conference on Machine Learning. PMLR","author":"Gentile","year":"2014"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/405"},{"key":"ref10","first-page":"5485","article-title":"Parallel online clustering of bandits via hedonic game","volume-title":"International Conference on Machine Learning. PMLR","author":"Cheng","year":"2023"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623682"},{"key":"ref12","article-title":"Identifying outlier arms in multi-armed bandit","volume":"30","author":"Zhuang","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403134"},{"key":"ref14","first-page":"11566","article-title":"Robust outlier arm identification","volume-title":"International Conference on Machine Learning. PMLR","author":"Zhu","year":"2020"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3290964"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3097137"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS57198.2023.10188761"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/299"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.10936"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11699"},{"key":"ref21","first-page":"878","article-title":"Thresholded lasso bandit","volume-title":"International Conference on Machine Learning. PMLR","author":"Ariu","year":"2022"},{"key":"ref22","article-title":"Improved algorithms for linear stochastic bandits","volume":"24","author":"Abbasi-Yadkori","year":"2011","journal-title":"Advances in Neural Information Processing Systems"}],"event":{"name":"2025 IEEE 35th International Workshop on Machine Learning for Signal Processing (MLSP)","start":{"date-parts":[[2025,8,31]]},"location":"Istanbul, Turkiye","end":{"date-parts":[[2025,9,3]]}},"container-title":["2025 IEEE 35th International Workshop on Machine Learning for Signal Processing (MLSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11204201\/11204202\/11204241.pdf?arnumber=11204241","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T18:37:13Z","timestamp":1762367833000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11204241\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,31]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/mlsp62443.2025.11204241","relation":{},"subject":[],"published":{"date-parts":[[2025,8,31]]}}}