{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:09:31Z","timestamp":1775912971365,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,21]]},"DOI":"10.1145\/3627673.3679763","type":"proceedings-article","created":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T19:34:21Z","timestamp":1729452861000},"page":"1638-1648","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Mitigating Exposure Bias in Online Learning to Rank Recommendation: A Novel Reward Model for Cascading Bandits"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9938-0212","authenticated-orcid":false,"given":"Masoud","family":"Mansoury","sequence":"first","affiliation":[{"name":"Delft University of Technology, Delft, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9701-9178","authenticated-orcid":false,"given":"Bamshad","family":"Mobasher","sequence":"additional","affiliation":[{"name":"DePaul University, Chicago, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1583-3692","authenticated-orcid":false,"given":"Herke","family":"van Hoof","sequence":"additional","affiliation":[{"name":"University of Amsterdam, Amsterdam, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2024,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Improved algorithms for linear stochastic bandits. Advances in neural information processing systems","author":"Abbasi-Yadkori Yasin","year":"2011","unstructured":"Yasin Abbasi-Yadkori, D\u00e1vid P\u00e1l, and Csaba Szepesv\u00e1ri. 2011. Improved algorithms for linear stochastic bandits. Advances in neural information processing systems, Vol. 24 (2011)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Charu C Aggarwal et al. 2016. Recommender systems. Vol. 1. Springer.","DOI":"10.1007\/978-3-319-29659-3_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098173"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/795666.796552"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3539618.3591933"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3109859.3109866"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v32i3.2361"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2023.4722"},{"key":"e_1_3_2_1_9_1","volume-title":"An empirical evaluation of thompson sampling. Advances in neural information processing systems","author":"Chapelle Olivier","year":"2011","unstructured":"Olivier Chapelle and Lihong Li. 2011. An empirical evaluation of thompson sampling. Advances in neural information processing systems, Vol. 24 (2011)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3564284","article-title":"Bias and debias in recommender system: A survey and future directions","volume":"41","author":"Chen Jiawei","year":"2023","unstructured":"Jiawei Chen, Hande Dong, Xiang Wang, Fuli Feng, Meng Wang, and Xiangnan He. 2023. Bias and debias in recommender system: A survey and future directions. ACM Transactions on Information Systems, Vol. 41, 3 (2023), 1--39.","journal-title":"ACM Transactions on Information Systems"},{"key":"e_1_3_2_1_11_1","volume-title":"How algorithmic popularity bias hinders or promotes quality. Scientific reports","author":"Ciampaglia Giovanni Luca","year":"2018","unstructured":"Giovanni Luca Ciampaglia, Azadeh Nematzadeh, Filippo Menczer, and Alessandro Flammini. 2018. How algorithmic popularity bias hinders or promotes quality. Scientific reports, Vol. 8, 1 (2018), 1--7."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78105-1_37"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1341531.1341545"},{"key":"e_1_3_2_1_14_1","volume-title":"Eyetracking in online search. Passive eye monitoring","author":"Granka Laura","year":"2008","unstructured":"Laura Granka, Matthew Feusner, and Lori Lorigo. 2008. Eyetracking in online search. Passive eye monitoring (2008), 283--304."},{"key":"e_1_3_2_1_15_1","volume-title":"The movielens datasets: History and context. Acm transactions on interactive intelligent systems (tiis)","author":"Maxwell Harper F","year":"2015","unstructured":"F Maxwell Harper and Joseph A Konstan. 2015. The movielens datasets: History and context. Acm transactions on interactive intelligent systems (tiis), Vol. 5, 4 (2015), 1--19."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963772"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3583780.3615011"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3531977"},{"key":"e_1_3_2_1_19_1","volume-title":"Zheng Wen, and Branislav Kveton.","author":"Hiranandani Gaurush","year":"2020","unstructured":"Gaurush Hiranandani, Harvineet Singh, Prakhar Gupta, Iftikhar Ahamath Burhanuddin, Zheng Wen, and Branislav Kveton. 2020. Cascading linear submodular bandits: Accounting for position bias and diversity in online learning to rank. In Uncertainty in Artificial Intelligence. PMLR, 722--732."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06028-6_67"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626772.3657749"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460231.3474248"},{"key":"e_1_3_2_1_23_1","volume-title":"International conference on machine learning. PMLR, 767--776","author":"Kveton Branislav","year":"2015","unstructured":"Branislav Kveton, Csaba Szepesvari, Zheng Wen, and Azin Ashkan. 2015. Cascading bandits: Learning to rank in the cascade model. In International conference on machine learning. PMLR, 767--776."},{"key":"e_1_3_2_1_24_1","volume-title":"Advances in Neural Information Processing Systems","volume":"28","author":"Kveton Branislav","year":"2015","unstructured":"Branislav Kveton, Zheng Wen, Azin Ashkan, and Csaba Szepesvari. 2015. Combinatorial cascading bandits. Advances in Neural Information Processing Systems, Vol. 28 (2015)."},{"key":"e_1_3_2_1_25_1","volume-title":"Asymptotically efficient adaptive allocation rules. Advances in applied mathematics","author":"Lai Tze Leung","year":"1985","unstructured":"Tze Leung Lai and Herbert Robbins. 1985. Asymptotically efficient adaptive allocation rules. Advances in applied mathematics, Vol. 6, 1 (1985), 4--22."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3412245"},{"key":"e_1_3_2_1_27_1","volume-title":"International conference on machine learning. PMLR, 1245--1253","author":"Li Shuai","year":"2016","unstructured":"Shuai Li, Baoxiang Wang, Shengyu Zhang, and Wei Chen. 2016. Contextual combinatorial cascading bandits. In International conference on machine learning. PMLR, 1245--1253."},{"key":"e_1_3_2_1_28_1","volume-title":"Measuring Item Fairness in Next Basket Recommendation: A Reproducibility Study. In European Conference on Information Retrieval. Springer, 210--225","author":"Liu Yuanna","year":"2024","unstructured":"Yuanna Liu, Ming Li, Mozhdeh Ariannezhad, Masoud Mansoury, Mohammad Aliannejadi, and Maarten de Rijke. 2024. Measuring Item Fairness in Next Basket Recommendation: A Reproducibility Study. In European Conference on Information Retrieval. Springer, 210--225."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20794"},{"key":"e_1_3_2_1_30_1","volume-title":"Yi-Cheng Zhang, Zi-Ke Zhang, and Tao Zhou.","author":"L\u00fc Linyuan","year":"2012","unstructured":"Linyuan L\u00fc, Mat\u00favs Medo, Chi Ho Yeung, Yi-Cheng Zhang, Zi-Ke Zhang, and Tao Zhou. 2012. Recommender systems. Physics reports, Vol. 519, 1 (2012), 1--49."},{"key":"e_1_3_2_1_32_1","volume-title":"Unbiased cascade bandits: Mitigating exposure bias in online learning to rank recommendation. arXiv preprint arXiv:2108.03440","author":"Mansoury Masoud","year":"2021","unstructured":"Masoud Mansoury, Himan Abdollahpouri, Bamshad Mobasher, Mykola Pechenizkiy, Robin Burke, and Milad Sabouri. 2021. Unbiased cascade bandits: Mitigating exposure bias in online learning to rank recommendation. arXiv preprint arXiv:2108.03440 (2021)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3412152"},{"key":"e_1_3_2_1_34_1","volume-title":"CONSEQUENCE'23 Workshop on Causality, Counterfactuals, and Sequential Decision-Making in conjunction with ACM RecSys 2023","author":"Mansoury Masoud","year":"2023","unstructured":"Masoud Mansoury and Bamshad Mobasher. 2023. Fairness of exposure in dynamic recommendation. CONSEQUENCE'23 Workshop on Causality, Counterfactuals, and Sequential Decision-Making in conjunction with ACM RecSys 2023 (2023)."},{"key":"e_1_3_2_1_35_1","volume-title":"5th FAccTRec Workshop on Responsible Recommendation in conjunction with ACM RecSys 2022","author":"Mansoury Masoud","year":"2022","unstructured":"Masoud Mansoury, Bamshad Mobasher, and Herke van Hoof. 2022. Exposure-Aware Recommendation using Contextual Bandits. 5th FAccTRec Workshop on Responsible Recommendation in conjunction with ACM RecSys 2022 (2022)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240323.3240354"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3272027"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1416950.1416952"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3532018"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/192844.192905"},{"key":"e_1_3_2_1_41_1","volume-title":"Evaluating recommendation systems. Recommender systems handbook","author":"Shani Guy","year":"2011","unstructured":"Guy Shani and Asela Gunawardana. 2011. Evaluating recommendation systems. Recommender systems handbook (2011), 257--297."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220088"},{"key":"e_1_3_2_1_43_1","volume-title":"Deconvolving feedback loops in recommender systems. Advances in neural information processing systems","author":"Sinha Ayan","year":"2016","unstructured":"Ayan Sinha, David F Gleich, and Karthik Ramani. 2016. Deconvolving feedback loops in recommender systems. Advances in neural information processing systems, Vol. 29 (2016)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835835"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330793"},{"key":"e_1_3_2_1_46_1","volume-title":"Reinforcement learning: An introduction","author":"Sutton Richard S","unstructured":"Richard S Sutton and Andrew G Barto. 2018. Reinforcement learning: An introduction. MIT press."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/25.3-4.285"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2645710.2645744"},{"key":"e_1_3_2_1_49_1","volume-title":"International Conference on Machine Learning. PMLR, 10686--10696","author":"Wang Lequn","year":"2021","unstructured":"Lequn Wang, Yiwei Bai, Wen Sun, and Thorsten Joachims. 2021. Fairness of exposure in stochastic bandits. In International Conference on Machine Learning. PMLR, 10686--10696."},{"key":"e_1_3_2_1_50_1","volume-title":"International Conference on Machine Learning. PMLR, 3589--3597","author":"Wang Yu-Xiang","year":"2017","unstructured":"Yu-Xiang Wang, Alekh Agarwal, and Miroslav Dudik. 2017. Optimal and adaptive off-policy evaluation in contextual bandits. In International Conference on Machine Learning. PMLR, 3589--3597."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366424.3380048"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467456"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/3020948.3021034"}],"event":{"name":"CIKM '24: The 33rd ACM International Conference on Information and Knowledge Management","location":"Boise ID USA","acronym":"CIKM '24","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 33rd ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627673.3679763","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627673.3679763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:58:28Z","timestamp":1750294708000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627673.3679763"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,21]]},"references-count":52,"alternative-id":["10.1145\/3627673.3679763","10.1145\/3627673"],"URL":"https:\/\/doi.org\/10.1145\/3627673.3679763","relation":{},"subject":[],"published":{"date-parts":[[2024,10,21]]},"assertion":[{"value":"2024-10-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}