iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/ICDM58522.2023.00097
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:56:20Z","timestamp":1730238980124,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,1]]},"DOI":"10.1109\/icdm58522.2023.00097","type":"proceedings-article","created":{"date-parts":[[2024,2,5]],"date-time":"2024-02-05T18:32:52Z","timestamp":1707157972000},"page":"878-887","source":"Crossref","is-referenced-by-count":0,"title":["Neural Contextual Combinatorial Bandit under Non-stationary Environment"],"prefix":"10.1109","author":[{"given":"Jiaqi","family":"Zheng","sequence":"first","affiliation":[{"name":"Nanjing University,State Key Laboratory for Novel Software Technology,China"}]},{"given":"Hedi","family":"Gao","sequence":"additional","affiliation":[{"name":"Nanjing University,State Key Laboratory for Novel Software Technology,China"}]},{"given":"Haipeng","family":"Dai","sequence":"additional","affiliation":[{"name":"Nanjing University,State Key Laboratory for Novel Software Technology,China"}]},{"given":"Zhenzhe","family":"Zheng","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University,Shanghai,China"}]},{"given":"Fan","family":"Wu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University,Shanghai,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1561\/9781601986276"},{"issue":"Nov","key":"ref2","first-page":"397","article-title":"Using confidence bounds for exploitation-exploration tradeoffs","volume-title":"Journal of Machine Learning Research","volume":"3","author":"Auer"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"journal-title":"arXiv preprint arXiv:1403.5045","article-title":"Matroid bandits: Fast combinatorial optimization with learning","year":"2014","author":"Kveton","key":"ref4"},{"first-page":"535","article-title":"Tight regret bounds for stochastic combinatorial semi-bandits","volume-title":"Artificial Intelligence and Statistics","author":"Kveton","key":"ref5"},{"first-page":"151","article-title":"Combinatorial multi-armed bandit: General framework and applications","volume-title":"International Conference on Machine Learning","author":"Chen","key":"ref6"},{"journal-title":"arXiv preprint arXiv:1507.04208","article-title":"Combinatorial cascading bandits","year":"2015","author":"Kveton","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939878"},{"journal-title":"arXiv preprint arXiv:1901.08612","article-title":"Deep neural linear bandits: Overcoming catastrophic forgetting through likelihood matching","year":"2019","author":"Zahavy","key":"ref9"},{"first-page":"11492","article-title":"Neural contextual bandits with ucb-based exploration","volume-title":"International Conference on Machine Learning","author":"Zhou","key":"ref10"},{"journal-title":"arXiv preprint arXiv:1309.6869","article-title":"Finite-time analysis of kernelised contextual bandits","year":"2013","author":"Valko","key":"ref11"},{"issue":"5","key":"ref12","article-title":"X-armed bandits","volume":"12","author":"Bubeck","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref13","article-title":"Stochastic multi-armed-bandit problem with non-stationary rewards","volume":"27","author":"Besbes","year":"2014","journal-title":"Advances in neural information processing systems"},{"first-page":"1079","article-title":"Learning to optimize under non-stationarity","volume-title":"The 22nd International Conference on Artificial Intelligence and Statistics","author":"Cheung","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553524"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3210051"},{"first-page":"138","article-title":"Adaptively tracking the best bandit arm with an unknown number of distribution changes","volume-title":"Conference on Learning Theory","author":"Auer","key":"ref17"},{"first-page":"696","article-title":"A new algorithm for non-stationary contextual bandits: Efficient, optimal and parameter-free","volume-title":"Conference on Learning Theory","author":"Chen","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24412-4_16"},{"key":"ref20","article-title":"Weighted linear bandits for non-stationary environments","volume":"32","author":"Russac","year":"2019","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973440.53"},{"journal-title":"arXiv preprint arXiv:1509.08101","article-title":"Representation benefits of deep feedforward networks","year":"2015","author":"Telgarsky","key":"ref22"},{"first-page":"2071","article-title":"Provably optimal algorithms for generalized linear contextual bandits","volume-title":"International Conference on Machine Learning","author":"Li","key":"ref23"},{"journal-title":"arXiv preprint arXiv:1710.11278","article-title":"Approximating continuous functions by relu nets of minimal width","year":"2017","author":"Hanin","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-019-05839-6"},{"issue":"2","key":"ref26","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1023\/A:1013689704352","article-title":"Finite-time analysis of the multiarmed bandit problem","volume":"47","author":"Auer","year":"2002","journal-title":"Machine learning"},{"article-title":"Adapting to user preference changes in interactive recommendation","volume-title":"Twenty-Fourth International Joint Conference on Artificial Intelligence","author":"Hariri","key":"ref27"},{"article-title":"The million song dataset","volume-title":"Proceedings of the 12th International Conference on Music Information Retrieval (ISMIR 2011)","author":"Bertin-Mahieux","key":"ref28"}],"event":{"name":"2023 IEEE International Conference on Data Mining (ICDM)","start":{"date-parts":[[2023,12,1]]},"location":"Shanghai, China","end":{"date-parts":[[2023,12,4]]}},"container-title":["2023 IEEE International Conference on Data Mining (ICDM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10415628\/10415561\/10415771.pdf?arnumber=10415771","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,6]],"date-time":"2024-02-06T22:24:38Z","timestamp":1707258278000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10415771\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,1]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icdm58522.2023.00097","relation":{},"subject":[],"published":{"date-parts":[[2023,12,1]]}}}