no code implementations • 18 Apr 2024 • Yikun Ban, Ishika Agarwal, Ziwei Wu, Yada Zhu, Kommy Weldemariam, Hanghang Tong, Jingrui He
We study both stream-based and pool-based active learning with neural network approximations.
no code implementations • 17 Mar 2024 • Lihui Liu, ZiHao Wang, Ruizhong Qiu, Yikun Ban, Eunice Chan, Yangqiu Song, Jingrui He, Hanghang Tong
Through the utilization of both knowledge graph reasoning and LLMs, it successfully derives answers for each subquestion.
no code implementations • 21 Dec 2023 • Yikun Ban, Yunzhe Qi, Jingrui He
Different from existing related tutorials, (1) we focus on the exploration perspective of contextual bandits to alleviate the ``Matthew Effect'' in the recommender systems, i. e., the rich get richer and the poor get poorer, concerning the popularity of items; (2) in addition to the conventional linear contextual bandits, we will also dedicated to neural contextual bandits which have emerged as an important branch in recent years, to investigate how neural networks benefit contextual bandits for personalized recommendation both empirically and theoretically; (3) we will cover the latest topic, collaborative neural contextual bandits, to incorporate both user heterogeneity and user correlations customized for recommender system; (4) we will provide and discuss the new emerging challenges and open questions for neural contextual bandits with applications in the personalized recommendation, especially for large neural models.
no code implementations • 12 Dec 2023 • Rohan Deb, Yikun Ban, Shiliang Zuo, Jingrui He, Arindam Banerjee
Based on such a perturbed prediction, we show a ${\mathcal{O}}(\log T)$ regret for online regression with both squared loss and KL loss, and subsequently convert these respectively to $\tilde{\mathcal{O}}(\sqrt{KT})$ and $\tilde{\mathcal{O}}(\sqrt{KL^*} + K)$ regret for NeuCB, where $L^*$ is the loss of the best policy.
no code implementations • 21 Aug 2023 • Yunzhe Qi, Yikun Ban, Jingrui He
Contextual bandits algorithms aim to choose the optimal arm with the highest reward out of a set of candidates based on the contextual information.
1 code implementation • 5 May 2023 • Yikun Ban, Yuchen Yan, Arindam Banerjee, Jingrui He
In recent literature, a series of neural bandit algorithms have been proposed to adapt to the non-linear reward function, combined with TS or UCB strategies for exploration.
1 code implementation • 2 Oct 2022 • Yikun Ban, Yuheng Zhang, Hanghang Tong, Arindam Banerjee, Jingrui He
We improve the theoretical and empirical performance of neural-network(NN)-based active learning algorithms for the non-parametric streaming setting.
no code implementations • 8 Jun 2022 • Yunzhe Qi, Yikun Ban, Jingrui He
Contextual bandits aim to identify among a set of arms the optimal one with the highest reward based on their contextual information.
1 code implementation • 9 Mar 2022 • Dongqi Fu, Yikun Ban, Hanghang Tong, Ross Maciejewski, Jingrui He
Disinformation refers to false information deliberately spread to influence the general public, and the negative impact of disinformation on society can be observed in numerous issues, such as political agendas and manipulating financial markets.
no code implementations • 31 Jan 2022 • Yikun Ban, Yunzhe Qi, Tianxin Wei, Jingrui He
Contextual multi-armed bandits provide powerful tools to solve the exploitation-exploration dilemma in decision making, with direct applications in the personalized recommendation.
1 code implementation • ICLR 2022 • Yikun Ban, Yuchen Yan, Arindam Banerjee, Jingrui He
To overcome this challenge, a series of neural bandit algorithms have been proposed, where a neural network is used to learn the underlying reward function and TS or UCB are adapted for exploration.
no code implementations • 2 Jul 2021 • Yikun Ban, Jingrui He
Online recommendation/advertising is ubiquitous in web business.
1 code implementation • 6 Jun 2021 • Yikun Ban, Jingrui He, Curtiss B. Cook
In this paper, we study a novel problem of multi-facet bandits involving a group of bandits, each characterizing the users' needs from one unique aspect.
no code implementations • 26 Feb 2021 • Yikun Ban, Jingrui He
We study identifying user clusters in contextual multi-armed bandits (MAB).
no code implementations • 14 Jul 2020 • Yikun Ban, Jingrui He
In this paper, we study the problem of outlier arm detection in multi-armed bandit settings, which finds plenty of applications in many high-impact domains such as finance, healthcare, and online advertising.
no code implementations • 21 Oct 2018 • Yikun Ban, Jiao Sun, Xin Liu
Fraud has severely detrimental impacts on the business of social networks and other online applications.
Social and Information Networks Cryptography and Security