{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:58Z","timestamp":1750309558930,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2047899"],"award-info":[{"award-number":["2047899"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR001121C0168"],"award-info":[{"award-number":["HR001121C0168"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,28]]},"DOI":"10.1145\/3696410.3714706","type":"proceedings-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T22:47:11Z","timestamp":1745362031000},"page":"3049-3060","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Leveraging Heterogeneous Spillover in Maximizing Contextual Bandit Rewards"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-5823-1623","authenticated-orcid":false,"given":"Ahmed Sayeed","family":"Faruk","sequence":"first","affiliation":[{"name":"University of Illinois Chicago, Chicago, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7662-2568","authenticated-orcid":false,"given":"Elena","family":"Zheleva","sequence":"additional","affiliation":[{"name":"University of Illinois Chicago, Chicago, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International conference on machine learning. PMLR, 127--135","author":"Agrawal Shipra","year":"2013","unstructured":"Shipra Agrawal and Navin Goyal. 2013. Thompson sampling for contextual bandits with linear payoffs. In International conference on machine learning. PMLR, 127--135."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12637-1_47"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1214\/16-AOAS1005"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935845"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450058"},{"key":"e_1_3_2_1_6_1","volume-title":"Neural collaborative filtering bandits via meta learning. arXiv preprint arXiv:2201.13395","author":"Ban Yikun","year":"2022","unstructured":"Yikun Ban, Yunzhe Qi, Tianxin Wei, and Jingrui He. 2022a. Neural collaborative filtering bandits via meta learning. arXiv preprint arXiv:2201.13395 (2022)."},{"key":"e_1_3_2_1_7_1","volume-title":"EE-Net: Exploitation-Exploration Neural Networks in Contextual Bandits. In International Conference on Learning Representations.","author":"Ban Yikun","year":"2022","unstructured":"Yikun Ban, Yuchen Yan, Arindam Banerjee, and Jingrui He. 2022b. EE-Net: Exploitation-Exploration Neural Networks in Contextual Bandits. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_8_1","volume-title":"Heterogeneous treatment and spillover effects under clustered network interference. arXiv preprint arXiv:2008.00707","author":"Bargagli-Stoffi Falco J","year":"2020","unstructured":"Falco J Bargagli-Stoffi, Costanza Tortu, and Laura Forastiere. 2020. Heterogeneous treatment and spillover effects under clustered network interference. arXiv preprint arXiv:2008.00707 (2020)."},{"key":"e_1_3_2_1_9_1","volume-title":"A survey on practical applications of multi-armed and contextual bandits. arXiv preprint arXiv:1904.10040","author":"Bouneffouf Djallel","year":"2019","unstructured":"Djallel Bouneffouf and Irina Rish. 2019. A survey on practical applications of multi-armed and contextual bandits. arXiv preprint arXiv:1904.10040 (2019)."},{"key":"e_1_3_2_1_10_1","volume-title":"A gang of bandits. Advances in neural information processing systems","author":"Cesa-Bianchi Nicolo","year":"2013","unstructured":"Nicolo Cesa-Bianchi, Claudio Gentile, and Giovanni Zappella. 2013. A gang of bandits. Advances in neural information processing systems, Vol. 26 (2013)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.2016.1001"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics. JMLR Workshop and Conference Proceedings, 208--214","author":"Chu Wei","year":"2011","unstructured":"Wei Chu, Lihong Li, Lev Reyzin, and Robert Schapire. 2011. Contextual bandits with linear payoff functions. In Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics. JMLR Workshop and Conference Proceedings, 208--214."},{"key":"e_1_3_2_1_13_1","volume-title":"International Conference on machine learning. PMLR, 1253--1262","author":"Gentile Claudio","year":"2017","unstructured":"Claudio Gentile, Shuai Li, Purushottam Kar, Alexandros Karatzoglou, Giovanni Zappella, and Evans Etrue. 2017. On context-dependent clustering of bandits. In International Conference on machine learning. PMLR, 1253--1262."},{"key":"e_1_3_2_1_14_1","volume-title":"International conference on machine learning. PMLR, 757--765","author":"Gentile Claudio","year":"2014","unstructured":"Claudio Gentile, Shuai Li, and Giovanni Zappella. 2014. Online clustering of bandits. In International conference on machine learning. PMLR, 757--765."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2014.2042"},{"key":"e_1_3_2_1_16_1","unstructured":"Nathan Halko Per-Gunnar Martinsson and Joel A Tropp. 2009. Finding structure with randomness: Stochastic algorithms for constructing approximate matrix decompositions. (2009)."},{"key":"e_1_3_2_1_17_1","volume-title":"Reducing interference bias in online marketplace pricing experiments. arXiv preprint arXiv:2004.12489","author":"Holtz David","year":"2020","unstructured":"David Holtz, Ruben Lobel, Inessa Liskovich, and Sinan Aral. 2020. Reducing interference bias in online marketplace pricing experiments. arXiv preprint arXiv:2004.12489 (2020)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611977172.58"},{"key":"e_1_3_2_1_19_1","volume-title":"International conference on machine learning. PMLR, 1301--1309","author":"Korda Nathan","year":"2016","unstructured":"Nathan Korda, Balazs Szorenyi, and Shuai Li. 2016. Distributed clustering of linear bandits in peer to peer networks. In International conference on machine learning. PMLR, 1301--1309."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512063"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/405"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2911548"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392717.3392748"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27926-8_29"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661829.2662063"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599371"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v12i1.15057"},{"volume-title":"Diffusion in Social Networks","author":"Shakarian Paulo","key":"e_1_3_2_1_29_1","unstructured":"Paulo Shakarian, Abhinav Bhatnagar, Ashkan Aleali, Elham Shaabani, and Ruocheng Guo. 2015. The independent cascade and linear threshold models. In Diffusion in Social Networks. Springer, 35--48."},{"key":"e_1_3_2_1_30_1","volume-title":"A mathematical theory of communication. The Bell system technical journal","author":"Shannon Claude Elwood","year":"1948","unstructured":"Claude Elwood Shannon. 1948. A mathematical theory of communication. The Bell system technical journal, Vol. 27, 3 (1948), 379--423."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3498459"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1128\/jcm.01610-22"},{"key":"e_1_3_2_1_33_1","volume-title":"Advances in Neural Information Processing Systems","volume":"35","author":"Tran-The Hung","year":"2022","unstructured":"Hung Tran-The, Sunil Gupta, Santu Rana, Tuan Truong, Long Tran-Thanh, and Svetha Venkatesh. 2022. Expected Improvement for Contextual Bandits. In Advances in Neural Information Processing Systems, Vol. 35. Curran Associates, Inc., 22725--22738."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.najef.2019.01.017"},{"key":"e_1_3_2_1_35_1","volume-title":"International Conference on Machine Learning. PMLR, 3530--3539","author":"Vaswani Sharan","year":"2017","unstructured":"Sharan Vaswani, Branislav Kveton, Zheng Wen, Mohammad Ghavamzadeh, Laks VS Lakshmanan, and Mark Schmidt. 2017. Model-independent online learning for influence maximization. In International Conference on Machine Learning. PMLR, 3530--3539."},{"key":"e_1_3_2_1_36_1","volume-title":"Online influence maximization under independent cascade model with semi-bandit feedback. Advances in neural information processing systems","author":"Wen Zheng","year":"2017","unstructured":"Zheng Wen, Branislav Kveton, Michal Valko, and Sharan Vaswani. 2017. Online influence maximization under independent cascade model with semi-bandit feedback. Advances in neural information processing systems, Vol. 30 (2017)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11585"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2911528"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380178"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2017.11.011"},{"key":"e_1_3_2_1_41_1","volume-title":"A Two-Part Machine Learning Approach to Characterizing Network Interference in A\/B Testing. arXiv preprint arXiv:2308.09790","author":"Yuan Yuan","year":"2023","unstructured":"Yuan Yuan and Kristen M Altenburger. 2023. A Two-Part Machine Learning Approach to Characterizing Network Interference in A\/B Testing. arXiv preprint arXiv:2308.09790 (2023)."},{"key":"e_1_3_2_1_42_1","volume-title":"International Conference on Learning Representations.","author":"Zhang Weitong","year":"2021","unstructured":"Weitong Zhang, Dongruo Zhou, Lihong Li, and Quanquan Gu. 2021. Neural thompson sampling. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380148"},{"key":"e_1_3_2_1_44_1","volume-title":"International Conference on Machine Learning. PMLR, 11492--11502","author":"Zhou Dongruo","year":"2020","unstructured":"Dongruo Zhou, Lihong Li, and Quanquan Gu. 2020. Neural contextual bandits with ucb-based exploration. In International Conference on Machine Learning. PMLR, 11492--11502."}],"event":{"name":"WWW '25: The ACM Web Conference 2025","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Sydney NSW Australia","acronym":"WWW '25"},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714706","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714706","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:57Z","timestamp":1750295937000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714706"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":44,"alternative-id":["10.1145\/3696410.3714706","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714706","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}