{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:02Z","timestamp":1750220282753,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,11]],"date-time":"2022-02-11T00:00:00Z","timestamp":1644537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["21J22490"],"award-info":[{"award-number":["21J22490"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,11]]},"DOI":"10.1145\/3488560.3498462","type":"proceedings-article","created":{"date-parts":[[2022,2,15]],"date-time":"2022-02-15T21:42:57Z","timestamp":1644961377000},"page":"879-887","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Retrieving Black-box Optimal Images from External Databases"],"prefix":"10.1145","author":[{"given":"Ryoma","family":"Sato","sequence":"first","affiliation":[{"name":"Kyoto University, Kyoto, Japan"}]}],"member":"320","published-online":{"date-parts":[[2022,2,15]]},"reference":[{"key":"e_1_3_2_2_1_1","first-page":"1610","volume-title":"NeurIPS","author":"Alon Noga","year":"2013","unstructured":"anchi, Gentile, and Mansour]alon2013fromNoga Alon, Nicol\u00f2 Cesa-Bianchi, Claudio Gentile, and Yishay Mansour. From bandits to experts: A tale of domination and independence. In NeurIPS, pages 1610--1618, 2013."},{"key":"e_1_3_2_2_2_1","volume-title":"ICLR","author":"Arora Sanjeev","year":"2017","unstructured":"Sanjeev Arora, Yingyu Liang, and Tengyu Ma. A simple but tough-to-beat baseline for sentence embeddings. In ICLR, 2017."},{"key":"e_1_3_2_2_3_1","volume-title":"Finite-time analysis of the multiarmed bandit problem. Mach. Learn., 47 (2--3): 235--256","author":"Auer Peter","year":"2002","unstructured":"anchi, and Fischer]auer2002finitePeter Auer, Nicol\u00f2 Cesa-Bianchi, and Paul Fischer. Finite-time analysis of the multiarmed bandit problem. Mach. Learn., 47 (2--3): 235--256, 2002."},{"key":"e_1_3_2_2_4_1","first-page":"1269","volume-title":"ICCV","author":"Babenko Artem","year":"2015","unstructured":"Artem Babenko and Victor S. Lempitsky. Aggregating local deep features for image retrieval. In ICCV, pages 1269--1277, 2015."},{"key":"e_1_3_2_2_5_1","first-page":"864","volume-title":"WWW","author":"Mar'i","year":"2005","unstructured":"tes et al.(2005)Baeza-Yates, Castillo, Mar'i n, and Rodr'i guez]baezayates2005crawlingRicardo A. Baeza-Yates, Carlos Castillo, Mauricio Mar'i n, and M. Andrea Rodr'i guez. Crawling a country: better strategies than breadth-first for web page ordering. In WWW, pages 864--872, 2005."},{"key":"e_1_3_2_2_6_1","first-page":"471","volume-title":"ICML","author":"Baptista Ricardo","year":"2018","unstructured":"Ricardo Baptista and Matthias Poloczek. Bayesian optimization of combinatorial structures. In ICML, pages 471--480, 2018."},{"key":"e_1_3_2_2_7_1","first-page":"441","volume-title":"WWW","author":"Barbosa Luciano","year":"2007","unstructured":"Luciano Barbosa and Juliana Freire. An adaptive crawler for locating hidden-web entry points. In WWW, pages 441--450, 2007."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766959"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939812"},{"key":"e_1_3_2_2_10_1","first-page":"1089","volume-title":"NeurIPS","author":"Carpentier Alexandra","year":"2014","unstructured":"Alexandra Carpentier and Michal Valko. Extreme bandits. In NeurIPS, pages 1089--1097, 2014."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067268.1067287"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00052-3"},{"key":"e_1_3_2_2_13_1","first-page":"1597","volume-title":"ICML","author":"Chen Ting","year":"2020","unstructured":"Ting Chen, Simon Kornblith, Mohammad Norouzi, and Geoffrey E. Hinton. A simple framework for contrastive learning of visual representations. In ICML, pages 1597--1607, 2020."},{"key":"e_1_3_2_2_14_1","volume-title":"Effective page refresh policies for web crawlers. ACM Trans. Database Syst., 28 (4): 390--426","author":"Cho Junghoo","year":"2003","unstructured":"lina(2003)]cho2003effectiveJunghoo Cho and Hector Garcia-Molina. Effective page refresh policies for web crawlers. ACM Trans. Database Syst., 28 (4): 390--426, 2003."},{"key":"e_1_3_2_2_15_1","volume-title":"Efficient crawling through URL ordering. Comput. Networks, 30 (1--7): 161--172","author":"Cho Junghoo","year":"1998","unstructured":"lina, and Page]cho1998efficientJunghoo Cho, Hector Garcia-Molina, and Lawrence Page. Efficient crawling through URL ordering. Comput. Networks, 30 (1--7): 161--172, 1998."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939746"},{"key":"e_1_3_2_2_17_1","first-page":"1355","volume-title":"AAAI","author":"Vincent","year":"2005","unstructured":"Vincent A. Cicirello and Stephen F. Smith. The max K-armed bandit: A new model of exploration applied to search heuristic selection. In AAAI, pages 1355--1361, 2005."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299007"},{"key":"e_1_3_2_2_19_1","volume-title":"ICML","author":"Desautels Thomas","year":"2012","unstructured":"Thomas Desautels, Andreas Krause, and Joel W. Burdick. Parallelizing exploration-exploitation tradeoffs with gaussian process bandit optimization. In ICML, 2012."},{"key":"e_1_3_2_2_20_1","first-page":"527","volume-title":"VLDB","author":"Diligenti Michelangelo","year":"2000","unstructured":"Michelangelo Diligenti, Frans Coetzee, Steve Lawrence, C. Lee Giles, and Marco Gori. Focused crawling using context graphs. In VLDB, pages 527--534, 2000."},{"issue":"3","key":"e_1_3_2_2_21_1","first-page":"1","article-title":"Visualizing higher-layer features of a deep network","volume":"1341","author":"Erhan Dumitru","year":"2009","unstructured":"Dumitru Erhan, Yoshua Bengio, Aaron Courville, and Pascal Vincent. Visualizing higher-layer features of a deep network. University of Montreal, 1341 (3): 1, 2009.","journal-title":"University of Montreal"},{"key":"e_1_3_2_2_22_1","first-page":"1126","volume-title":"ICML","author":"Finn Chelsea","year":"2017","unstructured":"Chelsea Finn, Pieter Abbeel, and Sergey Levine. Model-agnostic meta-learning for fast adaptation of deep networks. In ICML, pages 1126--1135, 2017."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.265"},{"key":"e_1_3_2_2_24_1","volume-title":"ICLR","author":"Goodfellow Ian J.","year":"2015","unstructured":"Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. Explaining and harnessing adversarial examples. In ICLR, 2015."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46466-4_15"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390334.1390488"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00975"},{"key":"e_1_3_2_2_29_1","first-page":"298","volume-title":"ICML","author":"Johnson Judy","year":"2003","unstructured":"Judy Johnson, Kostas Tsioutsiouliklis, and C. Lee Giles. Evolving strategies for focused web crawling. In ICML, pages 298--305, 2003."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85481-4_19"},{"key":"e_1_3_2_2_31_1","first-page":"613","volume-title":"NeurIPS","author":"Koc\u00e1","year":"2014","unstructured":"et al.(2014)Koc\u00e1 k, Neu, Valko, and Munos]kocak2014efficientTom\u00e1 vs Koc\u00e1 k, Gergely Neu, Michal Valko, and R\u00e9 mi Munos. Efficient learning by implicit exploration in bandit problems with side observations. In NeurIPS, pages 613--621, 2014."},{"key":"e_1_3_2_2_32_1","first-page":"28","volume-title":"WSDM","author":"Kordan Saeid Balaneshin","year":"2018","unstructured":"Saeid Balaneshin Kordan and Alexander Kotov. Deep neural architecture for multi-modal retrieval based on joint embedding space for text and images. In WSDM, pages 28--36, 2018."},{"key":"e_1_3_2_2_33_1","first-page":"2388","volume-title":"NeurIPS","author":"Krishnamurthy Akshay","year":"2016","unstructured":"]krishnamurthy2016contextualAkshay Krishnamurthy, Alekh Agarwal, and Miroslav Dud'i k. Contextual semibandits via supervised learning oracles. In NeurIPS, pages 2388--2396, 2016."},{"key":"e_1_3_2_2_34_1","first-page":"1106","volume-title":"NeurIPS","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. Imagenet classification with deep convolutional neural networks. In NeurIPS, pages 1106--1114, 2012."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-020-01316-z"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298947"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1017\/9781108571401"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070481.2070539"},{"key":"e_1_3_2_2_39_1","first-page":"661","volume-title":"WWW","author":"Li Lihong","year":"2010","unstructured":"Lihong Li, Wei Chu, John Langford, and Robert E. Schapire. A contextual-bandit approach to personalized news article recommendation. In WWW, pages 661--670, 2010."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.227"},{"key":"e_1_3_2_2_41_1","volume-title":"ICLR","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. Towards deep learning models resistant to adversarial attacks. In ICLR, 2018."},{"key":"e_1_3_2_2_42_1","first-page":"684","volume-title":"NeurIPS","author":"Mannor Shie","year":"2011","unstructured":"Shie Mannor and Ohad Shamir. From bandits to experts: On the value of side-observations. In NeurIPS, pages 684--692, 2011."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009953814988"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661829.2661902"},{"key":"e_1_3_2_2_45_1","volume-title":"ICLR","author":"Mikolov Tom\u00e1","year":"2013","unstructured":"Tom\u00e1 s Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. Efficient estimation of word representations in vector space. In ICLR, 2013."},{"key":"e_1_3_2_2_46_1","first-page":"3387","volume-title":"NeurIPS","author":"Nguyen Anh Mai","year":"2016","unstructured":"Anh Mai Nguyen, Alexey Dosovitskiy, Jason Yosinski, Thomas Brox, and Jeff Clune. Synthesizing the preferred inputs for neurons in neural networks via deep generator networks. In NeurIPS, pages 3387--3395, 2016."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393347.2393363"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159728"},{"key":"e_1_3_2_2_49_1","first-page":"2910","volume-title":"NeurIPS","author":"Oh ChangYong","year":"2019","unstructured":"ChangYong Oh, Jakub M. Tomczak, Efstratios Gavves, and Max Welling. Combinatorial bayesian optimization using the graph cartesian product. In NeurIPS, pages 2910--2920, 2019."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"e_1_3_2_2_51_1","first-page":"1476","volume-title":"WWW","author":"Pham Kien","year":"2019","unstructured":"Kien Pham, A\u00e9 cio S. R. Santos, and Juliana Freire. Bootstrapping domain-specific content discovery on the web. In WWW, pages 1476--1486, 2019."},{"key":"e_1_3_2_2_52_1","first-page":"1","volume-title":"SIGGRAPH Asia Technical Briefs","author":"Saito Masaki","year":"2015","unstructured":"Masaki Saito and Yusuke Matsui. Illustration2vec: a semantic vector representation of illustrations. In SIGGRAPH Asia Technical Briefs, pages 5:1--5:4, 2015."},{"key":"e_1_3_2_2_53_1","volume-title":"Retrieving black-box optimal images from external databases. arXiv, abs\/2112.14921","author":"Sato Ryoma","year":"2021","unstructured":"Ryoma Sato. Retrieving black-box optimal images from external databases. arXiv, abs\/2112.14921, 2021."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611977172.62"},{"key":"e_1_3_2_2_55_1","first-page":"440","volume-title":"Qinliang Su, Yizhe Zhang, Chunyuan Li, Ricardo Henao, and Lawrence Carin.","author":"Shen Dinghan","year":"2018","unstructured":"Dinghan Shen, Guoyin Wang, Wenlin Wang, Martin Renqiang Min, Qinliang Su, Yizhe Zhang, Chunyuan Li, Ricardo Henao, and Lawrence Carin. Baseline needs more love: On simple word-embedding-based models and associated pooling mechanisms. In ACL, pages 440--450, 2018."},{"key":"e_1_3_2_2_56_1","volume-title":"ICLR workshop","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan, Andrea Vedaldi, and Andrew Zisserman. Deep inside convolutional networks: Visualising image classification models and saliency maps. In ICLR workshop, 2014."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220088"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000068"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3210002"},{"key":"e_1_3_2_2_60_1","first-page":"3319","volume-title":"ICML","author":"Sundararajan Mukund","year":"2017","unstructured":"Mukund Sundararajan, Ankur Taly, and Qiqi Yan. Axiomatic attribution for deep networks. In Doina Precup and Yee Whye Teh, editors, ICML, pages 3319--3328, 2017."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.2307\/2332286"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3358011"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403085"}],"event":{"name":"WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Virtual Event AZ USA","acronym":"WSDM '22"},"container-title":["Proceedings of the Fifteenth ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488560.3498462","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488560.3498462","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:19Z","timestamp":1750188679000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488560.3498462"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,11]]},"references-count":63,"alternative-id":["10.1145\/3488560.3498462","10.1145\/3488560"],"URL":"https:\/\/doi.org\/10.1145\/3488560.3498462","relation":{},"subject":[],"published":{"date-parts":[[2022,2,11]]},"assertion":[{"value":"2022-02-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}