{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:56:15Z","timestamp":1772906175791,"version":"3.50.1"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001381","name":"Singapore National Research Foundation (NRF) Fellowship","doi-asserted-by":"publisher","award":["A-0005077-01-00"],"award-info":[{"award-number":["A-0005077-01-00"]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001459","name":"Singapore Ministry of Education (MOE) Academic Research Fund (AcRF) Tier 1","doi-asserted-by":"publisher","award":["A-0009042-01-00"],"award-info":[{"award-number":["A-0009042-01-00"]}],"id":[{"id":"10.13039\/501100001459","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001459","name":"Singapore Ministry of Education (MOE) Academic Research Fund (AcRF) Tier 1","doi-asserted-by":"publisher","award":["A-8000189-01-00"],"award-info":[{"award-number":["A-8000189-01-00"]}],"id":[{"id":"10.13039\/501100001459","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1109\/tit.2022.3222231","type":"journal-article","created":{"date-parts":[[2022,11,14]],"date-time":"2022-11-14T21:51:55Z","timestamp":1668462715000},"page":"2603-2634","source":"Crossref","is-referenced-by-count":6,"title":["Almost Optimal Variance-Constrained Best Arm Identification"],"prefix":"10.1109","volume":"69","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3760-5284","authenticated-orcid":false,"given":"Yunlong","family":"Hou","sequence":"first","affiliation":[{"name":"Department of Mathematics, National University of Singapore, Queenstown, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5008-4527","authenticated-orcid":false,"given":"Vincent Y. F.","family":"Tan","sequence":"additional","affiliation":[{"name":"Department of Mathematics and the Department of Electrical and Computer Engineering, National University of Singapore, Queenstown, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9810-7599","authenticated-orcid":false,"given":"Zixin","family":"Zhong","sequence":"additional","affiliation":[{"name":"Department of Computing Science, University of Alberta, Edmonton, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1017\/9781108571401"},{"key":"ref2","first-page":"1295","article-title":"A general approach to multi-armed bandits under risk criteria","volume-title":"Proc. 31st Conf. Learn. Theory","volume":"75","author":"Cassel"},{"key":"ref3","first-page":"13867","article-title":"Learning bounds for risk-sensitive learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Lee"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i6.20564"},{"key":"ref5","first-page":"1","article-title":"PAC bandits with risk constraints","volume-title":"Proc. Int. Symp. Artif. Intell. Math. (ISAIM)","author":"David"},{"key":"ref6","first-page":"1079","article-title":"Action elimination and stopping conditions for the multi-armed bandit and reinforcement learning problems","volume":"7","author":"Even-Dar","year":"2006","journal-title":"J. Mach. Learn. Res."},{"key":"ref7","first-page":"41","article-title":"Best arm identification in multi-armed bandits","volume-title":"Proc. 23th Conf. Learn. Theory","author":"Audibert"},{"key":"ref8","first-page":"423","article-title":"Lil\u2019UCB: An optimal exploration algorithm for multi-armed bandits","volume-title":"Proc. 27th Conf. Learn. Theory","volume":"35","author":"Jamieson"},{"key":"ref9","first-page":"227","article-title":"PAC subset selection in stochastic multi-armed bandits","volume-title":"Proc. 29th Int. Conf. Mach. Learn.","author":"Kalyanakrishnan"},{"issue":"1","key":"ref10","first-page":"1","article-title":"On the complexity of best-arm identification in multi-armed bandit models","volume":"17","author":"Kaufmann","year":"2016","journal-title":"J. Mach. Learn. Res."},{"key":"ref11","first-page":"1417","article-title":"Simple Bayesian algorithms for best arm identification","volume-title":"Proc. 29th Annu. Conf. Learn. Theory","volume":"49","author":"Russo"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2014.6814096"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1214\/20-AOS1991"},{"key":"ref14","first-page":"3275","article-title":"Risk-aversion in multi-armed bandits","volume-title":"Proc. 25th Int. Conf. Neural Inf. Process. Syst.","author":"Sani"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2016.2592622"},{"key":"ref16","first-page":"11599","article-title":"Thompson sampling algorithms for mean-variance bandits","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","author":"Zhu"},{"key":"ref17","article-title":"Risk-constrained Thompson sampling for CVaR bandits","author":"Chang","year":"2020","journal-title":"arXiv:2011.08046"},{"key":"ref18","article-title":"Generalized risk-aversion in stochastic multi-armed bandits","author":"Zimin","year":"2014","journal-title":"arXiv:1405.0833"},{"key":"ref19","first-page":"5577","article-title":"Concentration bounds for CVaR estimation: The cases of light-tailed and heavy-tailed distributions","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","volume":"119","author":"Prashanth"},{"key":"ref20","first-page":"11272","article-title":"Distribution oblivious, risk-aware algorithms for multi-armed bandits with unbounded rewards","volume-title":"Proc. 33rd Int. Conf. Neural Inf. Process. Syst.","volume":"32","author":"Kagrecha"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2022.3163524"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46128-1_35"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-022-06291-9"},{"key":"ref24","first-page":"716","article-title":"Optimal Thompson sampling strategies for support-aware CVaR bandits","volume-title":"Proc. 38th Int. Conf. Mach. Learn.","volume":"139","author":"Baudry"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/11894841_18"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40935-6_16"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s00186-019-00697-3"},{"key":"ref28","first-page":"1254","article-title":"Conservative bandits","volume-title":"Proc. 33rd Int. Conf. Mach. Learn.","volume":"48","author":"Wu"},{"key":"ref29","first-page":"9256","article-title":"Linear stochastic bandits under safety constraints","volume-title":"Proc. 33rd Int. Conf. Neural Inf. Process. Syst.","volume":"32","author":"Amani"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/784"},{"key":"ref31","first-page":"939","article-title":"Pareto front identification from stochastic bandit feedback","volume-title":"Proc. 19th Int. Conf. Artif. Intell. Statistics","volume":"51","author":"Auer"},{"key":"ref32","first-page":"1673","article-title":"Multi-objective contextual bandit problem with similarity information","volume-title":"Proc. 21st Int. Conf. Artif. Intell. Statist.","volume":"84","author":"Turgay"},{"issue":"104","key":"ref33","first-page":"1","article-title":"\u03f5-PAL: An active learning approach to the multi-objective optimization problem","volume":"17","author":"Zuluaga","year":"2016","journal-title":"J. Mach. Learn. Res."},{"key":"ref34","first-page":"1593","article-title":"Top feasible arm identification","volume-title":"Proc. 22nd Int. Conf. Artif. Intell. Statist.","volume":"89","author":"Katz-Samuels"},{"key":"ref35","first-page":"1120","article-title":"Variance-dependent best arm identification","volume-title":"Proc. 37th Conf. Uncertainty Artif. Intell.","volume":"161","author":"Lu"},{"key":"ref36","first-page":"2585","article-title":"Rapidly finding the best arm using variance","volume-title":"Proc. 24th Eur. Conf. Artif. Intell.","author":"Faella"},{"key":"ref37","first-page":"11762","article-title":"Concentration of risk measures: A Wasserstein distance approach","volume-title":"Proc. 33rd Int. Conf. Neural Inf. Process. Syst.","volume":"32","author":"Bhat"},{"key":"ref38","first-page":"1794","article-title":"The simulator: Understanding adaptive sampling in the moderate-confidence regime","volume-title":"Proc. Conf. Learn. Theory","volume":"65","author":"Simchowitz"},{"key":"ref39","first-page":"1","article-title":"A KL-LUCB algorithm for large-scale crowdsourcing","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"T\u00e1nczos"},{"key":"ref40","first-page":"998","article-title":"Optimal best arm identification with fixed confidence","volume-title":"Proc. 29th Conf. Learn. Theory","volume":"49","author":"Garivier"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107359949.008"},{"key":"ref42","volume-title":"Lecture Notes for Statistics 311\/Electrical Engineering 377","author":"Duchi","year":"2016"},{"key":"ref43","first-page":"384","article-title":"Tight bounds for the expected risk of linear classifiers and PAC-Bayes finite-sample guarantees","volume-title":"Proc. 17th Int. Conf. Artif. Intell. Statist. (AISTATS)","author":"Honorio"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1214\/19-EJP338"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/10073961\/09950536.pdf?arnumber=9950536","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T03:15:10Z","timestamp":1706757310000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9950536\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4]]},"references-count":44,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tit.2022.3222231","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4]]}}}