Approximate Bayesian inference with the weighted likelihood bootstrap
MA Newton, AE Raftery - Journal of the Royal Statistical Society …, 1994 - academic.oup.com
We introduce the weighted likelihood bootstrap (WLB) as a way to simulate approximately
from a posterior distribution. This method is often easy to implement, requiring only an …
from a posterior distribution. This method is often easy to implement, requiring only an …
Empowering the 6G cellular architecture with Open RAN
Innovation and standardization in 5G have brought advancements to every facet of the
cellular architecture. This ranges from the introduction of new frequency bands and …
cellular architecture. This ranges from the introduction of new frequency bands and …
Better algorithms for stochastic bandits with adversarial corruptions
We study the stochastic multi-armed bandits problem in the presence of adversarial
corruption. We present a new algorithm for this problem whose regret is nearly optimal …
corruption. We present a new algorithm for this problem whose regret is nearly optimal …
Adaptive reward-poisoning attacks against reinforcement learning
In reward-poisoning attacks against reinforcement learning (RL), an attacker can perturb the
environment reward $ r_t $ into $ r_t+\delta_t $ at each step, with the goal of forcing the RL …
environment reward $ r_t $ into $ r_t+\delta_t $ at each step, with the goal of forcing the RL …
Universal off-policy evaluation
When faced with sequential decision-making problems, it is often useful to be able to predict
what would happen if decisions were made using a new policy. Those predictions must …
what would happen if decisions were made using a new policy. Those predictions must …
Reward poisoning in reinforcement learning: Attacks against unknown learners in unknown environments
We study black-box reward poisoning attacks against reinforcement learning (RL), in which
an adversary aims to manipulate the rewards to mislead a sequence of RL agents with …
an adversary aims to manipulate the rewards to mislead a sequence of RL agents with …
One more step towards reality: Cooperative bandits with imperfect communication
The cooperative bandit problem is increasingly becoming relevant due to its applications in
large-scale decision-making. However, most research for this problem focuses exclusively …
large-scale decision-making. However, most research for this problem focuses exclusively …
Conformal off-policy prediction in contextual bandits
Most off-policy evaluation methods for contextual bandits have focused on the expected
outcome of a policy, which is estimated via methods that at best provide only asymptotic …
outcome of a policy, which is estimated via methods that at best provide only asymptotic …
Online and distribution-free robustness: Regression and contextual bandits with huber contamination
In this work we revisit two classic high-dimensional online learning problems, namely linear
regression and contextual bandits, from the perspective of adversarial robustness. Existing …
regression and contextual bandits, from the perspective of adversarial robustness. Existing …
Best of both worlds: Stochastic & adversarial best-arm identification
Y Abbasi-Yadkori, P Bartlett… - … on learning theory, 2018 - proceedings.mlr.press
We study bandit best-arm identification with arbitrary and potentially adversarial rewards. A
simple random uniform learner obtains the optimal rate of error in the adversarial scenario …
simple random uniform learner obtains the optimal rate of error in the adversarial scenario …