{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:02:16Z","timestamp":1750309336771,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T00:00:00Z","timestamp":1724457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,25]]},"DOI":"10.1145\/3637528.3671584","type":"proceedings-article","created":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T04:54:55Z","timestamp":1724561695000},"page":"5150-5160","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Learning to Bid the Interest Rate in Online Unsecured Personal Loans"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5187-2322","authenticated-orcid":false,"given":"Dong Jun","family":"Jee","sequence":"first","affiliation":[{"name":"PFC Technologies, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4661-3344","authenticated-orcid":false,"given":"Seung Jung","family":"Jin","sequence":"additional","affiliation":[{"name":"PFC Technologies, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-0336-8307","authenticated-orcid":false,"given":"Ji Hoon","family":"Yoo","sequence":"additional","affiliation":[{"name":"PFC Technologies, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-8938-583X","authenticated-orcid":false,"given":"Byunggyu","family":"Ahn","sequence":"additional","affiliation":[{"name":"PFC Technologies, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2024,8,24]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Incentive Compatibility in the Auto-bidding World. arXiv preprint arXiv:2301.13414","author":"Alimohammadi Yeganeh","year":"2023","unstructured":"Yeganeh Alimohammadi, Aranyak Mehta, and Andres Perlroth. 2023. Incentive Compatibility in the Auto-bidding World. arXiv preprint arXiv:2301.13414 (2023)."},{"key":"e_1_3_2_2_2_1","volume-title":"Advances in Neural Information Processing Systems","volume":"26","author":"Amin Kareem","year":"2013","unstructured":"Kareem Amin, Afshin Rostamizadeh, and Umar Syed. 2013. Learning prices for repeated auctions with strategic buyers. Advances in Neural Information Processing Systems, Vol. 26 (2013)."},{"key":"e_1_3_2_2_3_1","first-page":"217","article-title":"Minimax Policies for Adversarial and Stochastic Bandits","volume":"7","author":"Audibert Jean-Yves","year":"2009","unstructured":"Jean-Yves Audibert, S\u00e9bastien Bubeck, et al. 2009. Minimax Policies for Adversarial and Stochastic Bandits.. In COLT, Vol. 7. 217--226.","journal-title":"COLT"},{"key":"e_1_3_2_2_4_1","article-title":"Using confidence bounds for exploitation-exploration trade-offs","volume":"3","author":"Auer Peter","year":"2003","unstructured":"Peter Auer. 2003. Using confidence bounds for exploitation-exploration trade-offs. J. Mach. Learn. Res., Vol. 3, Nov (mar 2003), 397??22.","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3164539"},{"key":"e_1_3_2_2_6_1","first-page":"17777","article-title":"Robust auction design in the auto-bidding world","volume":"34","author":"Balseiro Santiago","year":"2021","unstructured":"Santiago Balseiro, Yuan Deng, Jieming Mao, Vahab Mirrokni, and Song Zuo. 2021. Robust auction design in the auto-bidding world. Advances in Neural Information Processing Systems, Vol. 34 (2021), 17777--17788.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_7_1","volume-title":"Contextual Bandits with Cross-Learning. Mathematics of Operations Research","author":"Balseiro Santiago","year":"2022","unstructured":"Santiago Balseiro, Negin Golrezaei, Mohammad Mahdian, Vahab Mirrokni, and Jon Schneider. 2022. Contextual Bandits with Cross-Learning. Mathematics of Operations Research (2022)."},{"key":"e_1_3_2_2_8_1","volume-title":"International Conference on Machine Learning. PMLR, 613--628","author":"Balseiro Santiago","year":"2020","unstructured":"Santiago Balseiro, Haihao Lu, and Vahab Mirrokni. 2020. Dual mirror descent for online allocation problems. In International Conference on Machine Learning. PMLR, 613--628."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465456.3467607"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2018.3174"},{"volume-title":"Constrained optimization and Lagrange multiplier methods","author":"Bertsekas Dimitri P","key":"e_1_3_2_2_11_1","unstructured":"Dimitri P Bertsekas. 2014. Constrained optimization and Lagrange multiplier methods. Academic press."},{"key":"e_1_3_2_2_12_1","volume-title":"Hsiu-Yuan Jody Tsao, and Alexis Mavrommatis","author":"Campbell Colin","year":"2020","unstructured":"Colin Campbell, Sean Sands, Carla Ferraro, Hsiu-Yuan Jody Tsao, and Alexis Mavrommatis. 2020. From data to action: How marketers can leverage AI. Business horizons, Vol. 63, 2 (2020), 227--243."},{"key":"e_1_3_2_2_13_1","volume-title":"International Conference on Machine Learning. PMLR, 2767--2783","author":"Castiglioni Matteo","year":"2022","unstructured":"Matteo Castiglioni, Andrea Celli, and Christian Kroer. 2022. Online learning with knapsacks: the best of both worlds. In International Conference on Machine Learning. PMLR, 2767--2783."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2365772"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_2_16_1","first-page":"56","article-title":"Bank loans pricing and Basel II: a multi-period risk-adjusted methodology under the new regulatory constraints","volume":"4","author":"Curcio Domenico","year":"2009","unstructured":"Domenico Curcio and Igor Gianfrancesco. 2009. Bank loans pricing and Basel II: a multi-period risk-adjusted methodology under the new regulatory constraints. Banks and Bank Systems, Vol. 4, 4 (2009), 56--66.","journal-title":"Banks and Bank Systems"},{"key":"e_1_3_2_2_17_1","volume-title":"Proceedings of the 40th International Conference on Machine Learning (Proceedings of Machine Learning Research","volume":"7644","author":"Deng Yuan","year":"2023","unstructured":"Yuan Deng, Negin Golrezaei, Patrick Jaillet, Jason Cheuk Nam Liang, and Vahab Mirrokni. 2023. Multi-channel Autobidding with Budget and ROI Constraints. In Proceedings of the 40th International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 202), Andreas Krause, Emma Brunskill, Kyunghyun Cho, Barbara Engelhardt, Sivan Sabato, and Jonathan Scarlett (Eds.). PMLR, 7617--7644. https:\/\/proceedings.mlr.press\/v202\/deng23c.html"},{"key":"e_1_3_2_2_18_1","volume-title":"Efficiency of the first-price auction in the autobidding world. arXiv preprint arXiv:2208.10650","author":"Deng Yuan","year":"2022","unstructured":"Yuan Deng, Jieming Mao, Vahab Mirrokni, Hanrui Zhang, and Song Zuo. 2022. Efficiency of the first-price auction in the autobidding world. arXiv preprint arXiv:2208.10650 (2022)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1177\/00222437211030201"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1566374.1566388"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmoneco.2005.09.001"},{"key":"e_1_3_2_2_22_1","volume-title":"Internet advertising and the generalized second-price auction: Selling billions of dollars worth of keywords. American economic review","author":"Edelman Benjamin","year":"2007","unstructured":"Benjamin Edelman, Michael Ostrovsky, and Michael Schwarz. 2007. Internet advertising and the generalized second-price auction: Selling billions of dollars worth of keywords. American economic review, Vol. 97, 1 (2007), 242--259."},{"key":"e_1_3_2_2_23_1","volume-title":"Reserve price optimization for first price auctions. arXiv preprint arXiv:2006.06519","author":"Feng Zhe","year":"2020","unstructured":"Zhe Feng, S\u00e9bastien Lahaie, Jon Schneider, and Jinchao Ye. 2020. Reserve price optimization for first price auctions. arXiv preprint arXiv:2006.06519 (2020)."},{"key":"e_1_3_2_2_24_1","volume-title":"International Conference on Machine Learning. PMLR, 9921--9937","author":"Feng Zhe","year":"2023","unstructured":"Zhe Feng, Christopher Liaw, and Zixin Zhou. 2023. Improved online learning algorithms for CTR prediction in ad auctions. In International Conference on Machine Learning. PMLR, 9921--9937."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583491"},{"key":"e_1_3_2_2_26_1","volume-title":"Proceedings of the 24th annual conference on learning theory. JMLR Workshop and Conference Proceedings, 359--376","author":"Garivier Aur\u00e9lien","year":"2011","unstructured":"Aur\u00e9lien Garivier and Olivier Capp\u00e9. 2011. The KL-UCB algorithm for bounded stochastic bandits and beyond. In Proceedings of the 24th annual conference on learning theory. JMLR Workshop and Conference Proceedings, 359--376."},{"key":"e_1_3_2_2_27_1","volume-title":"Jason Cheuk Nam Liang, and Vahab Mirrokni","author":"Golrezaei Negin","year":"2021","unstructured":"Negin Golrezaei, Patrick Jaillet, Jason Cheuk Nam Liang, and Vahab Mirrokni. 2021. Bidding and pricing in budget and roi constrained markets. arXiv preprint arXiv:2107.07725, Vol. 8, 8.1 (2021), 3."},{"key":"e_1_3_2_2_28_1","volume-title":"Optimal no-regret learning in repeated first-price auctions. arXiv preprint arXiv:2003.09795","author":"Han Yanjun","year":"2020","unstructured":"Yanjun Han, Zhengyuan Zhou, and Tsachy Weissman. 2020. Optimal no-regret learning in repeated first-price auctions. arXiv preprint arXiv:2003.09795 (2020)."},{"key":"e_1_3_2_2_29_1","volume-title":"Proceedings of 3rd international conference on document analysis and recognition","volume":"1","author":"Ho Tin Kam","year":"1995","unstructured":"Tin Kam Ho. 1995. Random decision forests. In Proceedings of 3rd international conference on document analysis and recognition, Vol. 1. IEEE, 278--282."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2014.2018"},{"key":"e_1_3_2_2_31_1","volume-title":"Algorithms for multi-armed bandit problems. arXiv preprint arXiv:1402.6028","author":"Kuleshov Volodymyr","year":"2014","unstructured":"Volodymyr Kuleshov and Doina Precup. 2014. Algorithms for multi-armed bandit problems. arXiv preprint arXiv:1402.6028 (2014)."},{"key":"e_1_3_2_2_32_1","volume-title":"Optimally confident UCB: Improved regret for finite-armed bandits. arXiv preprint arXiv:1507.07880","author":"Lattimore Tor","year":"2015","unstructured":"Tor Lattimore. 2015. Optimally confident UCB: Improved regret for finite-armed bandits. arXiv preprint arXiv:1507.07880 (2015)."},{"key":"e_1_3_2_2_33_1","volume-title":"Efficiency of non-truthful auctions under auto-bidding. arXiv preprint arXiv:2207.03630","author":"Liaw Christopher","year":"2022","unstructured":"Christopher Liaw, Aranyak Mehta, and Andres Perlroth. 2022. Efficiency of non-truthful auctions under auto-bidding. arXiv preprint arXiv:2207.03630 (2022)."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sorms.2016.10.001"},{"key":"e_1_3_2_2_35_1","volume-title":"Credit scoring methods: Latest trends and points to consider. The Journal of Finance and Data Science","author":"Markov Anton","year":"2022","unstructured":"Anton Markov, Zinaida Seleznyova, and Victor Lapshin. 2022. Credit scoring methods: Latest trends and points to consider. The Journal of Finance and Data Science (2022)."},{"key":"e_1_3_2_2_36_1","volume-title":"Proceedings of the 40th International Conference on Machine Learning (Proceedings of Machine Learning Research","volume":"24360","author":"Mei Jincheng","year":"2023","unstructured":"Jincheng Mei, Zixin Zhong, Bo Dai, Alekh Agarwal, Csaba Szepesvari, and Dale Schuurmans. 2023. Stochastic Gradient Succeeds for Bandits. In Proceedings of the 40th International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 202), Andreas Krause, Emma Brunskill, Kyunghyun Cho, Barbara Engelhardt, Sivan Sabato, and Jonathan Scarlett (Eds.). PMLR, 24325--24360. https:\/\/proceedings.mlr.press\/v202\/mei23a.html"},{"key":"e_1_3_2_2_37_1","volume-title":"Inventory management optimization as part of operational risk management. Economic computation and economic cybernetics studies and research","author":"Michalski Grzegorz","year":"2009","unstructured":"Grzegorz Michalski. 2009. Inventory management optimization as part of operational risk management. Economic computation and economic cybernetics studies and research (2009), 213--222."},{"volume-title":"Putting auction theory to work","author":"Milgrom Paul Robert","key":"e_1_3_2_2_38_1","unstructured":"Paul Robert Milgrom. 2004. Putting auction theory to work. Cambridge University Press."},{"key":"e_1_3_2_2_39_1","volume-title":"Risk-based pricing in competitive lending markets. Available at SSRN 4120047","author":"M\u00fcller Carola","year":"2021","unstructured":"Carola M\u00fcller, Ragnar Juelsrud, and Henrik Andersen. 2021. Risk-based pricing in competitive lending markets. Available at SSRN 4120047 (2021)."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2022.103663"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000068"},{"volume-title":"Reinforcement learning: An introduction","author":"Sutton Richard S","key":"e_1_3_2_2_43_1","unstructured":"Richard S Sutton and Andrew G Barto. 2018. Reinforcement learning: An introduction. MIT press."},{"key":"e_1_3_2_2_44_1","volume-title":"Proceedings of the 40th International Conference on Machine Learning (Proceedings of Machine Learning Research","volume":"36513","author":"Wang Qian","year":"2023","unstructured":"Qian Wang, Zongjun Yang, Xiaotie Deng, and Yuqing Kong. 2023. Learning to Bid in Repeated First-Price Auctions with Budgets. In Proceedings of the 40th International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 202), Andreas Krause, Emma Brunskill, Kyunghyun Cho, Barbara Engelhardt, Sivan Sabato, and Jonathan Scarlett (Eds.). PMLR, 36494--36513. https:\/\/proceedings.mlr.press\/v202\/wang23ao.html"},{"key":"e_1_3_2_2_45_1","volume-title":"Conference on Learning Theory. PMLR, 1562--1583","author":"Weed Jonathan","year":"2016","unstructured":"Jonathan Weed, Vianney Perchet, and Philippe Rigollet. 2016. Online learning in repeated auctions. In Conference on Learning Theory. PMLR, 1562--1583."},{"key":"e_1_3_2_2_46_1","first-page":"1","article-title":"Online dynamic pricing: Efficiency, equity and the future of e-commerce. Va","volume":"6","author":"Weiss Robert M","year":"2001","unstructured":"Robert M Weiss and Ajay K Mehrotra. 2001. Online dynamic pricing: Efficiency, equity and the future of e-commerce. Va. JL & Tech., Vol. 6 (2001), 1.","journal-title":"JL & Tech."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.12.020"},{"key":"e_1_3_2_2_48_1","volume-title":"Pricing risky bank loans in the new Basel II environment. Bank of Finland Research Discussion Paper 3","author":"Zazzara Cristiano","year":"2006","unstructured":"Cristiano Zazzara and Iftekhar Hasan. 2006. Pricing risky bank loans in the new Basel II environment. Bank of Finland Research Discussion Paper 3 (2006)."},{"key":"e_1_3_2_2_49_1","volume-title":"A survey on contextual multi-armed bandits. arXiv preprint arXiv:1508.03326","author":"Zhou Li","year":"2015","unstructured":"Li Zhou. 2015. A survey on contextual multi-armed bandits. arXiv preprint arXiv:1508.03326 (2015)."}],"event":{"name":"KDD '24: The 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Barcelona Spain","acronym":"KDD '24"},"container-title":["Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637528.3671584","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3637528.3671584","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:04:19Z","timestamp":1750291459000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637528.3671584"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,24]]},"references-count":48,"alternative-id":["10.1145\/3637528.3671584","10.1145\/3637528"],"URL":"https:\/\/doi.org\/10.1145\/3637528.3671584","relation":{},"subject":[],"published":{"date-parts":[[2024,8,24]]},"assertion":[{"value":"2024-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}