{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T18:24:48Z","timestamp":1759775088928,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T00:00:00Z","timestamp":1724457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"CHINA NSF","award":["62322206, 62132018, U2268204, 62025204, 62272307, 62372296"],"award-info":[{"award-number":["62322206, 62132018, U2268204, 62025204, 62272307, 62372296"]}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["No. 2022ZD0119100"],"award-info":[{"award-number":["No. 2022ZD0119100"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,25]]},"DOI":"10.1145\/3637528.3671813","type":"proceedings-article","created":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T04:54:55Z","timestamp":1724561695000},"page":"1565-1575","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Truthful Bandit Mechanisms for Repeated Two-stage Ad Auctions"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-8221-0717","authenticated-orcid":false,"given":"Haoming","family":"Li","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0068-8624","authenticated-orcid":false,"given":"Yumou","family":"Liu","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Shenzhen, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5094-5331","authenticated-orcid":false,"given":"Zhenzhe","family":"Zheng","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4251-8575","authenticated-orcid":false,"given":"Zhilin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Alibaba Group, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3111-1005","authenticated-orcid":false,"given":"Jian","family":"Xu","sequence":"additional","affiliation":[{"name":"Alibaba Group, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0965-9058","authenticated-orcid":false,"given":"Fan","family":"Wu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2024,8,24]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/3398761.3398964"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1995.492488"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2724705"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1137\/120878768"},{"key":"e_1_3_2_2_5_1","volume-title":"Advances in Neural Information Processing Systems","volume":"29","author":"Chen Wei","year":"2016","unstructured":"Wei Chen, Wei Hu, Fu Li, Jian Li, Yu Liu, and Pinyan Lu. 2016. Combinatorial multi-armed bandit with general reward functions. Advances in Neural Information Processing Systems, Vol. 29 (2016)."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2988450.2988454"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2959100.2959190"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1566374.1566388"},{"key":"e_1_3_2_2_9_1","volume-title":"Asymptotic minimax character of the sample distribution function and of the classical multinomial estimator. The Annals of Mathematical Statistics","author":"Dvoretzky Aryeh","year":"1956","unstructured":"Aryeh Dvoretzky, Jack Kiefer, and Jacob Wolfowitz. 1956. Asymptotic minimax character of the sample distribution function and of the classical multinomial estimator. The Annals of Mathematical Statistics (1956), 642--669."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186183"},{"key":"e_1_3_2_2_11_1","volume-title":"International Conference on Machine Learning. PMLR, 9921--9937","author":"Feng Zhe","year":"2023","unstructured":"Zhe Feng, Christopher Liaw, and Zixin Zhou. 2023. Improved online learning algorithms for CTR prediction in ad auctions. In International Conference on Machine Learning. PMLR, 9921--9937."},{"volume-title":"Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining (WSDM '19)","author":"Gallagher Luke","key":"e_1_3_2_2_12_1","unstructured":"Luke Gallagher, Ruey-Cheng Chen, Roi Blanco, and J. Shane Culpepper. 2019. Joint Optimization of Cascade Ranking Models. In Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining (WSDM '19). 15--23."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583478"},{"key":"e_1_3_2_2_14_1","volume-title":"The movielens datasets: History and context. Acm transactions on interactive intelligent systems (tiis)","author":"Maxwell Harper F","year":"2015","unstructured":"F Maxwell Harper and Joseph A Konstan. 2015. The movielens datasets: History and context. Acm transactions on interactive intelligent systems (tiis), Vol. 5, 4 (2015), 1--19."},{"key":"e_1_3_2_2_15_1","first-page":"2744","article-title":"On Component Interactions in Two-Stage Recommender Systems","volume":"34","author":"Hron Jiri","year":"2021","unstructured":"Jiri Hron, Karl Krauth, Michael Jordan, and Niki Kilbertus. 2021. On Component Interactions in Two-Stage Recommender Systems. In Advances in Neural Information Processing Systems, Vol. 34. 2744--2757.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_16_1","volume-title":"Exploration in two-stage recommender systems. arxiv","author":"Hron Jiri","year":"2009","unstructured":"Jiri Hron, Karl Krauth, Michael I. Jordan, and Niki Kilbertus. 2020. Exploration in two-stage recommender systems. arxiv: 2009.08956 [cs.IR]"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583422"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3357930"},{"volume-title":"Bandit algorithms","author":"Lattimore Tor","key":"e_1_3_2_2_19_1","unstructured":"Tor Lattimore and Csaba Szepesv\u00e1ri. 2020. Bandit algorithms. Cambridge University Press, Chapter 6, 97--98."},{"key":"e_1_3_2_2_20_1","volume-title":"Proceedings of The Web Conference","author":"Ma Jiaqi","year":"2020","unstructured":"Jiaqi Ma, Zhe Zhao, Xinyang Yi, Ji Yang, Minmin Chen, Jiaxi Tang, Lichan Hong, and Ed H. Chi. 2020. Off-policy Learning in Two-stage Recommender Systems. In Proceedings of The Web Conference 2020. 463--473."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"Xu Ma Pengjie Wang Hui Zhao Shaoguo Liu Chuhan Zhao Wei Lin Kuang-Chih Lee Jian Xu and Bo Zheng. 2021. Towards a Better Tradeoff between Effectiveness and Efficiency in Pre-Ranking: A Learnable Feature Selection based Approach. 2036--2040.","DOI":"10.1145\/3404835.3462979"},{"key":"e_1_3_2_2_22_1","volume-title":"The tight constant in the Dvoretzky-Kiefer-Wolfowitz inequality. The annals of Probability","author":"Massart Pascal","year":"1990","unstructured":"Pascal Massart. 1990. The tight constant in the Dvoretzky-Kiefer-Wolfowitz inequality. The annals of Probability (1990), 1269--1283."},{"key":"e_1_3_2_2_23_1","volume-title":"Optimal auction design. Mathematics of operations research","author":"Myerson Roger B","year":"1981","unstructured":"Roger B Myerson. 1981. Optimal auction design. Mathematics of operations research, Vol. 6, 1 (1981), 58--73."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3539597.3570469"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512054"},{"key":"e_1_3_2_2_26_1","volume-title":"COLD: Towards the Next Generation of Pre-Ranking System. arxiv","author":"Wang Zhe","year":"2020","unstructured":"Zhe Wang, Liqin Zhao, Biye Jiang, Guorui Zhou, Xiaoqiang Zhu, and Kun Gai. 2020. COLD: Towards the Next Generation of Pre-Ranking System. arxiv: 2007.16122 [cs.IR]"},{"key":"e_1_3_2_2_27_1","unstructured":"Haike Xu and Jian Li. 2021. Simple combinatorial algorithms for combinatorial bandits: Corruptions and approximations. In Uncertainty in Artificial Intelligence. PMLR 1444--1454."},{"key":"e_1_3_2_2_28_1","volume-title":"On the robustness of epoch-greedy in multi-agent contextual bandit mechanisms. arXiv preprint arXiv:2307.07675","author":"Xu Yinglun","year":"2023","unstructured":"Yinglun Xu, Bhuvesh Kumar, and Jacob Abernethy. 2023. On the robustness of epoch-greedy in multi-agent contextual bandit mechanisms. arXiv preprint arXiv:2307.07675 (2023)."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3298689.3346996"},{"key":"e_1_3_2_2_30_1","volume-title":"Online Learning in Contextual Second-Price Pay-Per-Click Auctions. arXiv preprint arXiv:2310.05047","author":"Zhang Mengxiao","year":"2023","unstructured":"Mengxiao Zhang and Haipeng Luo. 2023. Online Learning in Contextual Second-Price Pay-Per-Click Auctions. arXiv preprint arXiv:2310.05047 (2023)."},{"key":"e_1_3_2_2_31_1","unstructured":"Mengyan Zhang Thanh Nguyen-Tang Fangzhao Wu Zhenyu He Xing Xie and Cheng Soon Ong. 2022. Two-Stage Neural Contextual Bandits for Personalised News Recommendation. arxiv: 2206.14648 [cs.IR]"},{"key":"e_1_3_2_2_32_1","volume-title":"COPR: Consistency-Oriented Pre-Ranking for Online Advertising. arxiv: 2306.03516 [cs.IR]","author":"Zhao Zhishan","year":"2023","unstructured":"Zhishan Zhao, Jingyue Gao, Yu Zhang, Shuguang Han, Siyuan Lou, Xiang-Rong Sheng, Zhe Wang, Han Zhu, Yuning Jiang, Jian Xu, and Bo Zheng. 2023. COPR: Consistency-Oriented Pre-Ranking for Online Advertising. arxiv: 2306.03516 [cs.IR]"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33015941"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219823"}],"event":{"name":"KDD '24: The 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Barcelona Spain","acronym":"KDD '24"},"container-title":["Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637528.3671813","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3637528.3671813","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:04:14Z","timestamp":1750291454000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637528.3671813"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,24]]},"references-count":34,"alternative-id":["10.1145\/3637528.3671813","10.1145\/3637528"],"URL":"https:\/\/doi.org\/10.1145\/3637528.3671813","relation":{},"subject":[],"published":{"date-parts":[[2024,8,24]]},"assertion":[{"value":"2024-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}