Best Arm Identification (BAI) problems are progressively used for
data-s...
Bandits play a crucial role in interactive learning schemes and modern
r...
We address the problem of identifying the optimal policy with a fixed
co...
We study differentially private (DP) machine learning algorithms as inst...
The independence of noise and covariates is a standard assumption in onl...
We study black-box model stealing attacks where the attacker can query a...
We study the problem of episodic reinforcement learning in continuous
st...
We study the problem of multi-armed bandits with ϵ-global
Differential P...
Fairness in machine learning has attained significant focus due to the
w...
Although Reinforcement Learning (RL) is effective for sequential
decisio...
In this paper, we study the stochastic bandits problem with k unknown
he...
In black-box optimization problems, we aim to maximize an unknown object...
In recent years, machine learning (ML) algorithms have been deployed in
...
UDO is a versatile tool for offline tuning of database systems for speci...
Computation of persistent homology of simplicial representations such as...
As a technology ML is oblivious to societal good or bad, and thus, the f...
We propose algorithms for construction and random generation of hypergra...
The calibration of noise for a privacy-preserving mechanism depends on t...
Bayesian reinforcement learning (BRL) offers a decision-theoretic soluti...
We tackle the problem of acting in an unknown finite and discrete Markov...
We study model-based reinforcement learning in finite communicating Mark...
Topological data analysis computes and analyses topological features of ...
We introduce a number of privacy definitions for the multi-armed bandit
...
We study model-based reinforcement learning in an unknown finite
communi...
We propose a generic, Bayesian, information geometric approach to the
ex...