{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:52:20Z","timestamp":1767084740695,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,14]],"date-time":"2022-08-14T00:00:00Z","timestamp":1660435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1947203, IIS-2117902, IIS-2137468, IIS-2002540"],"award-info":[{"award-number":["IIS-1947203, IIS-2117902, IIS-2137468, IIS-2002540"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,14]]},"DOI":"10.1145\/3534678.3539312","type":"proceedings-article","created":{"date-parts":[[2022,8,12]],"date-time":"2022-08-12T19:06:12Z","timestamp":1660331172000},"page":"1379-1389","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Neural Bandit with Arm Group Graph"],"prefix":"10.1145","author":[{"given":"Yunzhe","family":"Qi","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Yikun","family":"Ban","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Jingrui","family":"He","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,8,14]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2312","article-title":"Improved algorithms for linear stochastic bandits","volume":"24","author":"Abbasi-Yadkori Yasin","year":"2011","unstructured":"Yasin Abbasi-Yadkori, D\u00e1vid P\u00e1l, and Csaba Szepesv\u00e1ri. 2011. Improved algorithms for linear stochastic bandits. NeurIPS 24 (2011), 2312--2320.","journal-title":"NeurIPS"},{"key":"e_1_3_2_1_2_1","unstructured":"Zeyuan Allen-Zhu Yuanzhi Li and Zhao Song. 2019. A convergence theory for deep learning via over-parameterization. In ICML. PMLR 242--252."},{"key":"e_1_3_2_1_3_1","volume-title":"Finite-time analysis of the multiarmed bandit problem. Machine learning 47, 2--3","author":"Auer Peter","year":"2002","unstructured":"Peter Auer, Nicolo Cesa-Bianchi, and Paul Fischer. 2002. Finite-time analysis of the multiarmed bandit problem. Machine learning 47, 2--3 (2002), 235--256."},{"key":"e_1_3_2_1_4_1","volume-title":"Convolutional neural bandit: Provable algorithm for visual-aware advertising. arXiv preprint arXiv:2107.07438","author":"Ban Yikun","year":"2021","unstructured":"Yikun Ban and Jingrui He. 2021. Convolutional neural bandit: Provable algorithm for visual-aware advertising. arXiv preprint arXiv:2107.07438 (2021)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450058"},{"key":"e_1_3_2_1_6_1","volume-title":"Multi-facet Contextual Bandits: A Neural Network Perspective. arXiv preprint arXiv:2106.03039","author":"Ban Yikun","year":"2021","unstructured":"Yikun Ban, Jingrui He, and Curtiss B Cook. 2021. Multi-facet Contextual Bandits: A Neural Network Perspective. arXiv preprint arXiv:2106.03039 (2021)."},{"key":"e_1_3_2_1_7_1","volume-title":"Neural Collaborative Filtering Bandits via Meta Learning. ArXiv abs\/2201.13395","author":"Ban Yikun","year":"2022","unstructured":"Yikun Ban, Yunzhe Qi, Tianxin Wei, and Jingrui He. 2022. Neural Collaborative Filtering Bandits via Meta Learning. ArXiv abs\/2201.13395 (2022)."},{"key":"e_1_3_2_1_8_1","unstructured":"Yikun Ban Yuchen Yan Arindam Banerjee and Jingrui He. 2022. EE-Net: Exploitation-Exploration Neural Networks in Contextual Bandits. In ICLR."},{"key":"e_1_3_2_1_9_1","unstructured":"Gilles Blanchard Gyemin Lee and Clayton Scott. 2011. Generalizing from several related classification tasks to a new unlabeled sample. In NeurIPS. 2178--2186."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aml.2008.07.007"},{"key":"e_1_3_2_1_11_1","unstructured":"Wei Chu Lihong Li Lev Reyzin and Robert Schapire. 2011. Contextual bandits with linear payoff functions. In AISTATS. 208--214."},{"key":"e_1_3_2_1_12_1","unstructured":"Aniket Anand Deshmukh Urun Dogan and Clay Scott. 2017. Multi-task learning for contextual bandits. In NeurIPS. 4848--4856."},{"key":"e_1_3_2_1_13_1","unstructured":"Simon Du Jason Lee Haochuan Li Liwei Wang and Xiyu Zhai. 2019. Gradient descent finds global minima of deep neural networks. In ICML. PMLR 1675--1685."},{"key":"e_1_3_2_1_14_1","volume-title":"Graph neural tangent kernel: Fusing graph neural networks with graph kernels. arXiv preprint arXiv:1905.13192","author":"Du Simon S","year":"2019","unstructured":"Simon S Du, Kangcheng Hou, Barnab\u00e1s P\u00f3czos, Ruslan Salakhutdinov, Ruosong Wang, and Keyulu Xu. 2019. Graph neural tangent kernel: Fusing graph neural networks with graph kernels. arXiv preprint arXiv:1905.13192 (2019)."},{"key":"e_1_3_2_1_15_1","unstructured":"Audrey Durand Charis Achilleos Demetris Iacovides Katerina Strati Georgios D Mitsis and Joelle Pineau. 2018. Contextual bandits for adapting treatment in a mouse model of de novo carcinogenesis. In Machine learning for healthcare conference. PMLR 67--82."},{"key":"e_1_3_2_1_16_1","volume-title":"DPPIN: A biological repository of dynamic protein-protein interaction network data. arXiv preprint arXiv:2107.02168","author":"Fu Dongqi","year":"2021","unstructured":"Dongqi Fu and Jingrui He. 2021. DPPIN: A biological repository of dynamic protein-protein interaction network data. arXiv preprint arXiv:2107.02168 (2021)."},{"key":"e_1_3_2_1_17_1","volume-title":"SDG: A Simplified and Dynamic Graph Neural Network. In SIGIR '21","author":"Fu Dongqi","year":"2021","unstructured":"Dongqi Fu and Jingrui He. 2021. SDG: A Simplified and Dynamic Graph Neural Network. In SIGIR '21. 2273--2277."},{"key":"e_1_3_2_1_18_1","unstructured":"Claudio Gentile Shuai Li Purushottam Kar Alexandros Karatzoglou Giovanni Zappella and Evans Etrue. 2017. On context-dependent clustering of bandits. In ICML. 1253--1262."},{"key":"e_1_3_2_1_19_1","unstructured":"Claudio Gentile Shuai Li and Giovanni Zappella. 2014. Online clustering of bandits. In ICML. 757--765."},{"key":"e_1_3_2_1_20_1","volume-title":"Inductive representation learning on large graphs. arXiv preprint arXiv:1706.02216","author":"Hamilton William L","year":"2017","unstructured":"William L Hamilton, Rex Ying, and Jure Leskovec. 2017. Inductive representation learning on large graphs. arXiv preprint arXiv:1706.02216 (2017)."},{"key":"e_1_3_2_1_21_1","unstructured":"Kaiming He Xiangyu Zhang Shaoqing Ren and Jian Sun. 2016. Deep residual learning for image recognition. In CVPR. 770--778."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Xiangnan He Lizi Liao Hanwang Zhang Liqiang Nie Xia Hu and Tat-Seng Chua. 2017. Neural collaborative filtering. In WWW. 173--182.","DOI":"10.1145\/3038912.3052569"},{"key":"e_1_3_2_1_23_1","volume-title":"Revisiting Graph Neural Networks: Graph Filtering Perspective. In 2020 25th International Conference on Pattern Recognition (ICPR). IEEE, 8376--8383","author":"Hoang NT","year":"2021","unstructured":"NT Hoang, Takanori Maehara, and Tsuyoshi Murata. 2021. Revisiting Graph Neural Networks: Graph Filtering Perspective. In 2020 25th International Conference on Pattern Recognition (ICPR). IEEE, 8376--8383."},{"key":"e_1_3_2_1_24_1","volume-title":"Neural tangent kernel: Convergence and generalization in neural networks. arXiv preprint arXiv:1806.07572","author":"Jacot Arthur","year":"2018","unstructured":"Arthur Jacot, Franck Gabriel, and Cl\u00e9ment Hongler. 2018. Neural tangent kernel: Convergence and generalization in neural networks. arXiv preprint arXiv:1806.07572 (2018)."},{"key":"e_1_3_2_1_25_1","volume-title":"Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907","author":"Kipf Thomas N","year":"2016","unstructured":"Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)."},{"key":"e_1_3_2_1_26_1","volume-title":"Predict then propagate: Graph neural networks meet personalized pagerank. arXiv preprint arXiv:1810.05997","author":"Klicpera Johannes","year":"2018","unstructured":"Johannes Klicpera, Aleksandar Bojchevski, and Stephan G\u00fcnnemann. 2018. Predict then propagate: Graph neural networks meet personalized pagerank. arXiv preprint arXiv:1810.05997 (2018)."},{"key":"e_1_3_2_1_27_1","unstructured":"Andreas Krause and Cheng Soon Ong. 2011. Contextual Gaussian Process Bandit Optimization.. In NeurIPS. 2447--2455."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Lihong Li Wei Chu John Langford and Robert E Schapire. 2010. A contextualbandit approach to personalized news article recommendation. In WWW. 661-- 670.","DOI":"10.1145\/1772690.1772758"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Shuai Li Wei Chen Shuai Li and Kwong-Sak Leung. 2019. Improved Algorithm on Online Clustering of Bandits. In IJCAI. 2923--2929.","DOI":"10.24963\/ijcai.2019\/405"},{"key":"e_1_3_2_1_30_1","unstructured":"Shuai Li Alexandros Karatzoglou and Claudio Gentile. 2016. Collaborative filtering bandits. In SIGIR. 539--548."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467165"},{"key":"e_1_3_2_1_32_1","volume-title":"Copy number variation is highly correlated with differential gene expression: a pan-cancer study. BMC medical genetics 20, 1","author":"Shao Xin","year":"2019","unstructured":"Xin Shao, Ning Lv, Jie Liao, Jinbo Long, Rui Xue, Ni Ai, Donghang Xu, and Xiaohui Fan. 2019. Copy number variation is highly correlated with differential gene expression: a pan-cancer study. BMC medical genetics 20, 1 (2019), 1--14."},{"key":"e_1_3_2_1_33_1","unstructured":"Sohini Upadhyay Mikhail Yurochkin Mayank Agarwal Yasaman Khazaeni et al. 2020. Online Semi-Supervised Learning with Bandit Feedback. arXiv preprint arXiv:2010.12574 (2020)."},{"key":"e_1_3_2_1_34_1","volume-title":"Finite-time analysis of kernelised contextual bandits. arXiv preprint arXiv:1309.6869","author":"Valko Michal","year":"2013","unstructured":"Michal Valko, Nathaniel Korda, R\u00e9mi Munos, Ilias Flaounas, and Nelo Cristianini. 2013. Finite-time analysis of kernelised contextual bandits. arXiv preprint arXiv:1309.6869 (2013)."},{"key":"e_1_3_2_1_35_1","volume-title":"Multi-armed bandit models for the optimal design of clinical trials: benefits and challenges. Statistical science: a review journal of the Institute of Mathematical Statistics 30, 2","author":"Villar Sof\u00eda S","year":"2015","unstructured":"Sof\u00eda S Villar, Jack Bowden, and James Wason. 2015. Multi-armed bandit models for the optimal design of clinical trials: benefits and challenges. Statistical science: a review journal of the Institute of Mathematical Statistics 30, 2 (2015), 199."},{"volume-title":"Unsupervised learning of acoustic features via deep canonical correlation analysis. In 2015 IEEE ICASSP","author":"Wang Weiran","key":"e_1_3_2_1_36_1","unstructured":"Weiran Wang, Raman Arora, Karen Livescu, and Jeff A Bilmes. 2015. Unsupervised learning of acoustic features via deep canonical correlation analysis. In 2015 IEEE ICASSP. IEEE."},{"volume-title":"Fast adaptation for cold-start collaborative filtering with meta-learning","author":"Wei Tianxin","key":"e_1_3_2_1_37_1","unstructured":"Tianxin Wei, Ziwei Wu, Ruirui Li, Ziniu Hu, Fuli Feng, Xiangnan He, Yizhou Sun, and Wei Wang. 2020. Fast adaptation for cold-start collaborative filtering with meta-learning. In ICDM. IEEE, 661--670."},{"key":"e_1_3_2_1_38_1","unstructured":"Felix Wu Amauri Souza Tianyi Zhang Christopher Fifty Tao Yu and Kilian Weinberger. 2019. Simplifying graph convolutional networks. In ICML. PMLR 6861--6871."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Qingyun Wu Huazheng Wang Quanquan Gu and Hongning Wang. 2016. Contextual bandits in a collaborative environment. In SIGIR. 529--538.","DOI":"10.1145\/2911451.2911528"},{"key":"e_1_3_2_1_40_1","unstructured":"Qingyun Wu Huazheng Wang Yanen Li and Hongning Wang. 2019. Dynamic Ensemble of Contextual Bandits to Satisfy Users' Changing Interests. In WWW. 2080--2090."},{"key":"e_1_3_2_1_41_1","unstructured":"Keyulu Xu Chengtao Li Yonglong Tian Tomohiro Sonobe Ken-ichi Kawarabayashi and Stefanie Jegelka. 2018. Representation learning on graphs with jumping knowledge networks. In ICML. PMLR 5453--5462."},{"key":"e_1_3_2_1_42_1","unstructured":"Keyulu Xu Mozhi Zhang Stefanie Jegelka and Kenji Kawaguchi. 2021. Optimization of graph neural networks: Implicit acceleration by skip connections and more depth. In ICML. PMLR 11592--11602."},{"key":"e_1_3_2_1_43_1","unstructured":"Jiaxuan You Rex Ying and Jure Leskovec. 2019. Position-aware graph neural networks. In ICML. PMLR 7134--7143."},{"key":"e_1_3_2_1_44_1","volume-title":"Neural thompson sampling. arXiv preprint arXiv:2010.00827","author":"Zhang Weitong","year":"2020","unstructured":"Weitong Zhang, Dongruo Zhou, Lihong Li, and Quanquan Gu. 2020. Neural thompson sampling. arXiv preprint arXiv:2010.00827 (2020)."},{"key":"e_1_3_2_1_45_1","unstructured":"Dongruo Zhou Lihong Li and Quanquan Gu. 2020. Neural Contextual Bandits with UCB-based Exploration. arXiv:1911.04462 [cs.LG]"},{"key":"e_1_3_2_1_46_1","volume-title":"From Intrinsic to Counterfactual: On the Explainability of Contextualized Recommender Systems. ArXiv","author":"Zhou Yao","year":"2021","unstructured":"Yao Zhou, Haonan Wang, Jingrui He, and Haixun Wang. 2021. From Intrinsic to Counterfactual: On the Explainability of Contextualized Recommender Systems. ArXiv (2021). arXiv:2110.14844"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467234"}],"event":{"name":"KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Washington DC USA","acronym":"KDD '22"},"container-title":["Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3539312","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3534678.3539312","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3534678.3539312","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:47Z","timestamp":1750186967000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3539312"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,14]]},"references-count":47,"alternative-id":["10.1145\/3534678.3539312","10.1145\/3534678"],"URL":"https:\/\/doi.org\/10.1145\/3534678.3539312","relation":{},"subject":[],"published":{"date-parts":[[2022,8,14]]},"assertion":[{"value":"2022-08-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}