all AI news
Sample Complexity of an Adversarial Attack on UCB-based Best-arm Identification Policy. (arXiv:2209.05692v1 [cs.LG])
Sept. 14, 2022, 1:11 a.m. | Varsha Pendyala
cs.LG updates on arXiv.org arxiv.org
In this work I study the problem of adversarial perturbations to rewards, in
a Multi-armed bandit (MAB) setting. Specifically, I focus on an adversarial
attack to a UCB type best-arm identification policy applied to a stochastic
MAB. The UCB attack presented in [1] results in pulling a target arm K very
often. I used the attack model of [1] to derive the sample complexity required
for selecting target arm K as the best arm. I have proved that the stopping …
More from arxiv.org / cs.LG updates on arXiv.org
Generalized Schr\"odinger Bridge Matching
1 day, 10 hours ago |
arxiv.org
Tight bounds on Pauli channel learning without entanglement
1 day, 10 hours ago |
arxiv.org
Automated mapping of virtual environments with visual predictive coding
1 day, 10 hours ago |
arxiv.org
Jobs in AI, ML, Big Data
Senior Machine Learning Engineer (MLOps)
@ Promaton | Remote, Europe
Data Integration Specialist
@ Accenture Federal Services | San Antonio, TX
Geospatial Data Engineer - Location Intelligence
@ Allegro | Warsaw, Poland
Site Autonomy Engineer (Onsite)
@ May Mobility | Tokyo, Japan
Summer Intern, AI (Artificial Intelligence)
@ Nextech Systems | Tampa, FL
Permitting Specialist/Wetland Scientist
@ AECOM | Chelmsford, MA, United States