{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:04Z","timestamp":1750220524062,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,19]],"date-time":"2021-04-19T00:00:00Z","timestamp":1618790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,19]]},"DOI":"10.1145\/3442381.3449987","type":"proceedings-article","created":{"date-parts":[[2021,6,3]],"date-time":"2021-06-03T19:00:27Z","timestamp":1622746827000},"page":"2314-2323","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["GuideBoot: Guided Bootstrap for Deep Contextual Banditsin Online Advertising"],"prefix":"10.1145","author":[{"given":"Feiyang","family":"Pan","sequence":"first","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, China"}]},{"given":"Haoming","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, China"}]},{"given":"Xiang","family":"Ao","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, China"}]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"Tencent Advertising and Marketing Service, China"}]},{"given":"Yanrong","family":"Kang","sequence":"additional","affiliation":[{"name":"Tencent Advertising and Marketing Service, China"}]},{"given":"Ao","family":"Tan","sequence":"additional","affiliation":[{"name":"Tencent Advertising and Marketing Service, China"}]},{"given":"Qing","family":"He","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2021,6,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Shipra Agrawal and Navin Goyal. 2013. Thompson sampling for contextual bandits with linear payoffs. In ICML. 127\u2013135.  Shipra Agrawal and Navin Goyal. 2013. Thompson sampling for contextual bandits with linear payoffs. In ICML. 127\u2013135."},{"key":"e_1_3_2_1_2_1","volume-title":"Finite-time analysis of the multiarmed bandit problem. Machine learning 47, 2-3","author":"Auer Peter","year":"2002","unstructured":"Peter Auer , Nicolo Cesa-Bianchi , and Paul Fischer . 2002. Finite-time analysis of the multiarmed bandit problem. Machine learning 47, 2-3 ( 2002 ), 235\u2013256. Peter Auer, Nicolo Cesa-Bianchi, and Paul Fischer. 2002. Finite-time analysis of the multiarmed bandit problem. Machine learning 47, 2-3 (2002), 235\u2013256."},{"key":"e_1_3_2_1_3_1","volume-title":"Weight Uncertainty in Neural Network. In International Conference on Machine Learning. 1613\u20131622","author":"Blundell Charles","year":"2015","unstructured":"Charles Blundell , Julien Cornebise , Koray Kavukcuoglu , and Daan Wierstra . 2015 . Weight Uncertainty in Neural Network. In International Conference on Machine Learning. 1613\u20131622 . Charles Blundell, Julien Cornebise, Koray Kavukcuoglu, and Daan Wierstra. 2015. Weight Uncertainty in Neural Network. In International Conference on Machine Learning. 1613\u20131622."},{"key":"e_1_3_2_1_4_1","unstructured":"Olivier Chapelle and Lihong Li. 2011. An empirical evaluation of thompson sampling. In Advances in neural information processing systems. 2249\u20132257.  Olivier Chapelle and Lihong Li. 2011. An empirical evaluation of thompson sampling. In Advances in neural information processing systems. 2249\u20132257."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2988450.2988454"},{"key":"e_1_3_2_1_6_1","unstructured":"Dean Eckles and Maurits Kaptein. 2014. Thompson sampling with the online bootstrap. arXiv preprint arXiv:1410.4009(2014).  Dean Eckles and Maurits Kaptein. 2014. Thompson sampling with the online bootstrap. arXiv preprint arXiv:1410.4009(2014)."},{"key":"e_1_3_2_1_7_1","unstructured":"Adam\u00a0N Elmachtoub Ryan McNellis Sechan Oh and Marek Petrik. 2017. A Practical Method for Solving Contextual Bandit Problems Using Decision Trees. In UAI.  Adam\u00a0N Elmachtoub Ryan McNellis Sechan Oh and Marek Petrik. 2017. A Practical Method for Solving Contextual Bandit Problems Using Decision Trees. In UAI."},{"key":"e_1_3_2_1_8_1","unstructured":"Sarah Filippi Olivier Cappe Aur\u00e9lien Garivier and Csaba Szepesv\u00e1ri. 2010. Parametric bandits: The generalized linear case. In NIPS. 586\u2013594.  Sarah Filippi Olivier Cappe Aur\u00e9lien Garivier and Csaba Szepesv\u00e1ri. 2010. Parametric bandits: The generalized linear case. In NIPS. 586\u2013594."},{"key":"e_1_3_2_1_9_1","volume-title":"international conference on machine learning. 1050\u20131059","author":"Gal Yarin","year":"2016","unstructured":"Yarin Gal and Zoubin Ghahramani . 2016 . Dropout as a Bayesian approximation: Representing model uncertainty in deep learning . In international conference on machine learning. 1050\u20131059 . Yarin Gal and Zoubin Ghahramani. 2016. Dropout as a Bayesian approximation: Representing model uncertainty in deep learning. In international conference on machine learning. 1050\u20131059."},{"key":"e_1_3_2_1_10_1","unstructured":"Yarin Gal Jiri Hron and Alex Kendall. 2017. Concrete dropout. In Advances in neural information processing systems. 3581\u20133590.  Yarin Gal Jiri Hron and Alex Kendall. 2017. Concrete dropout. In Advances in neural information processing systems. 3581\u20133590."},{"key":"e_1_3_2_1_11_1","unstructured":"Marta Garnelo Jonathan Schwarz Dan Rosenbaum Fabio Viola Danilo\u00a0J Rezende SM Eslami and Yee\u00a0Whye Teh. 2018. Neural processes. arXiv preprint arXiv:1807.01622(2018).  Marta Garnelo Jonathan Schwarz Dan Rosenbaum Fabio Viola Danilo\u00a0J Rezende SM Eslami and Yee\u00a0Whye Teh. 2018. Neural processes. arXiv preprint arXiv:1807.01622(2018)."},{"key":"e_1_3_2_1_12_1","volume-title":"Horizon: Facebook\u2019s open source applied reinforcement learning platform. arXiv preprint arXiv:1811.00260(2018).","author":"Gauci Jason","year":"2018","unstructured":"Jason Gauci , Edoardo Conti , Yitao Liang , Kittipat Virochsiri , Yuchen He , Zachary Kaden , Vivek Narayanan , Xiaohui Ye , Zhengxing Chen , and Scott Fujimoto . 2018 . Horizon: Facebook\u2019s open source applied reinforcement learning platform. arXiv preprint arXiv:1811.00260(2018). Jason Gauci, Edoardo Conti, Yitao Liang, Kittipat Virochsiri, Yuchen He, Zachary Kaden, Vivek Narayanan, Xiaohui Ye, Zhengxing Chen, and Scott Fujimoto. 2018. Horizon: Facebook\u2019s open source applied reinforcement learning platform. arXiv preprint arXiv:1811.00260(2018)."},{"key":"e_1_3_2_1_13_1","unstructured":"Botao Hao Yasin Abbasi-Yadkori Zheng Wen and Guang Cheng. 2019. Bootstrapping Upper Confidence Bound. In NeurIPS. 12123\u201312133.  Botao Hao Yasin Abbasi-Yadkori Zheng Wen and Guang Cheng. 2019. Bootstrapping Upper Confidence Bound. In NeurIPS. 12123\u201312133."},{"volume-title":"The elements of statistical learning: data mining, inference, and prediction","author":"Hastie Trevor","key":"e_1_3_2_1_14_1","unstructured":"Trevor Hastie , Robert Tibshirani , and Jerome Friedman . 2009. The elements of statistical learning: data mining, inference, and prediction . Springer Science & Business Media . Trevor Hastie, Robert Tibshirani, and Jerome Friedman. 2009. The elements of statistical learning: data mining, inference, and prediction. Springer Science & Business Media."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2648584.2648589"},{"key":"e_1_3_2_1_16_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980(2014).","author":"Kingma P","year":"2014","unstructured":"Diederik\u00a0 P Kingma and Jimmy Ba . 2014 . Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980(2014). Diederik\u00a0P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980(2014)."},{"key":"e_1_3_2_1_17_1","unstructured":"Durk\u00a0P Kingma Tim Salimans and Max Welling. 2015. Variational dropout and the local reparameterization trick. In Advances in neural information processing systems. 2575\u20132583.  Durk\u00a0P Kingma Tim Salimans and Max Welling. 2015. Variational dropout and the local reparameterization trick. In Advances in neural information processing systems. 2575\u20132583."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/rssb.12050"},{"key":"e_1_3_2_1_19_1","unstructured":"Andreas Krause and Cheng\u00a0S Ong. 2011. Contextual gaussian process bandit optimization. In Advances in Neural Information Processing Systems. 2447\u20132455.  Andreas Krause and Cheng\u00a0S Ong. 2011. Contextual gaussian process bandit optimization. In Advances in Neural Information Processing Systems. 2447\u20132455."},{"volume-title":"Garbage In","author":"Kveton Branislav","key":"e_1_3_2_1_20_1","unstructured":"Branislav Kveton , Csaba Szepesvari , Sharan Vaswani , Zheng Wen , Tor Lattimore , and Mohammad Ghavamzadeh . 2019. Garbage In , Reward Out : Bootstrapping Exploration in Multi-Armed Bandits. In ICML. 3601\u20133610. Branislav Kveton, Csaba Szepesvari, Sharan Vaswani, Zheng Wen, Tor Lattimore, and Mohammad Ghavamzadeh. 2019. Garbage In, Reward Out: Bootstrapping Exploration in Multi-Armed Bandits. In ICML. 3601\u20133610."},{"key":"e_1_3_2_1_21_1","unstructured":"John Langford and Tong Zhang. 2008. The epoch-greedy algorithm for multi-armed bandits with side information. In NIPS. 817\u2013824.  John Langford and Tong Zhang. 2008. The epoch-greedy algorithm for multi-armed bandits with side information. In NIPS. 817\u2013824."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Lihong Li Wei Chu John Langford and Robert\u00a0E Schapire. 2010. A contextual-bandit approach to personalized news article recommendation. In WWW. 661\u2013670.  Lihong Li Wei Chu John Langford and Robert\u00a0E Schapire. 2010. A contextual-bandit approach to personalized news article recommendation. In WWW. 661\u2013670.","DOI":"10.1145\/1772690.1772758"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488200"},{"key":"e_1_3_2_1_24_1","unstructured":"Ian Osband Charles Blundell Alexander Pritzel and Benjamin Van\u00a0Roy. 2016. Deep exploration via bootstrapped DQN. In Advances in neural information processing systems. 4026\u20134034.  Ian Osband Charles Blundell Alexander Pritzel and Benjamin Van\u00a0Roy. 2016. Deep exploration via bootstrapped DQN. In Advances in neural information processing systems. 4026\u20134034."},{"key":"e_1_3_2_1_25_1","unstructured":"Ian Osband and Benjamin Van\u00a0Roy. 2015. Bootstrapped thompson sampling and deep exploration. arXiv preprint arXiv:1507.00300(2015).  Ian Osband and Benjamin Van\u00a0Roy. 2015. Bootstrapped thompson sampling and deep exploration. arXiv preprint arXiv:1507.00300(2015)."},{"key":"e_1_3_2_1_26_1","volume-title":"Policy Gradients for Contextual Recommendations. In The World Wide Web Conference","author":"Pan Feiyang","year":"2019","unstructured":"Feiyang Pan , Qingpeng Cai , Pingzhong Tang , Fuzhen Zhuang , and Qing He . 2019 . Policy Gradients for Contextual Recommendations. In The World Wide Web Conference ( San Francisco, CA, USA) (WWW \u201919). ACM, New York, NY, USA, 1421\u20131431. Feiyang Pan, Qingpeng Cai, Pingzhong Tang, Fuzhen Zhuang, and Qing He. 2019. Policy Gradients for Contextual Recommendations. In The World Wide Web Conference (San Francisco, CA, USA) (WWW \u201919). ACM, New York, NY, USA, 1421\u20131431."},{"key":"e_1_3_2_1_27_1","unstructured":"Feiyang Pan Jia He Dandan Tu and Qing He. 2020. Trust the Model When It Is Confident: Masked Model-based Actor-Critic. In Advances in neural information processing systems.  Feiyang Pan Jia He Dandan Tu and Qing He. 2020. Trust the Model When It Is Confident: Masked Model-based Actor-Critic. In Advances in neural information processing systems."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331268"},{"key":"e_1_3_2_1_29_1","unstructured":"Carlos Riquelme George Tucker and Jasper Snoek. 2018. Deep bayesian bandits showdown: An empirical comparison of bayesian deep networks for thompson sampling. arXiv preprint arXiv:1802.09127(2018).  Carlos Riquelme George Tucker and Jasper Snoek. 2018. Deep bayesian bandits showdown: An empirical comparison of bayesian deep networks for thompson sampling. arXiv preprint arXiv:1802.09127(2018)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098041"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767707"},{"key":"e_1_3_2_1_32_1","unstructured":"Sharan Vaswani Branislav Kveton Zheng Wen Anup Rao Mark Schmidt and Yasin Abbasi-Yadkori. 2018. New insights into bootstrapping for bandits. arXiv preprint arXiv:1805.09793(2018).  Sharan Vaswani Branislav Kveton Zheng Wen Anup Rao Mark Schmidt and Yasin Abbasi-Yadkori. 2018. New insights into bootstrapping for bandits. arXiv preprint arXiv:1805.09793(2018)."},{"key":"e_1_3_2_1_33_1","unstructured":"Chi-Hua Wang Yang Yu Botao Hao and Guang Cheng. 2020. Residual Bootstrap Exploration for Bandit Algorithms. arXiv preprint arXiv:2002.08436(2020).  Chi-Hua Wang Yang Yu Botao Hao and Guang Cheng. 2020. Residual Bootstrap Exploration for Bandit Algorithms. arXiv preprint arXiv:2002.08436(2020)."}],"event":{"name":"WWW '21: The Web Conference 2021","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Ljubljana Slovenia","acronym":"WWW '21"},"container-title":["Proceedings of the Web Conference 2021"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3442381.3449987","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3442381.3449987","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:45Z","timestamp":1750195485000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3442381.3449987"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,19]]},"references-count":33,"alternative-id":["10.1145\/3442381.3449987","10.1145\/3442381"],"URL":"https:\/\/doi.org\/10.1145\/3442381.3449987","relation":{},"subject":[],"published":{"date-parts":[[2021,4,19]]},"assertion":[{"value":"2021-06-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}