Most existing works on federated bandits take it for granted that all cl...
We consider a dynamic Bayesian persuasion setting where a single long-li...
This paper extends the Isotonic Mechanism from the single-owner to
multi...
The past decade has witnessed the flourishing of a new profession as med...
We study information design in click-through auctions, in which the
bidd...
This paper provides a systematic study of the robust Stackelberg equilib...
Content creators compete for exposure on recommendation platforms, and s...
Motivated by cognitive radios, stochastic Multi-Player Multi-Armed Bandi...
Data valuation, or the valuation of individual datum contributions, has ...
Optimizing strategic decisions (a.k.a. computing equilibrium) is key to ...
We study a variant of the principal-agent problem in which the principal...
In the principal-agent problem formulated in [Myerson 1982], agents have...
To understand the security threats to reinforcement learning (RL) algori...
Incrementality, which is used to measure the causal effect of showing an...
In today's economy, it becomes important for Internet platforms to consi...
We introduce and study the online Bayesian recommendation problem for a
...
In real-world recommendation problems, especially those with a formidabl...
The celebrated Bayesian persuasion model considers strategic communicati...
Dominated actions are natural (and perhaps the simplest possible) multi-...
Incentivized exploration in multi-armed bandits (MAB) has witnessed
incr...
Peer review systems such as conference paper review often suffer from th...
We study adversarial attacks on linear stochastic bandits, a sequential
...
We propose a new problem setting to study the sequential interactions be...
A ubiquitous learning problem in today's digital market is, during repea...
Most algorithmic studies on multi-agent information design so far have
f...
Classic mechanism design often assumes that a bidder's action is restric...
Diffusion source identification on networks is a problem of fundamental
...
We study a Bayesian persuasion setting with binary actions (adopt and re...
We study the problem of incentivizing exploration for myopic users in li...
A decision maker looks to take an active action (e.g., purchase some goo...
We study a repeated persuasion setting between a sender and a receiver, ...
This paper studies bandit algorithms under data poisoning attacks in a
b...
Machine learning (ML) algorithms may be susceptible to being gamed by
in...
A basic lesson from game theory is that strategic behavior often renders...
We study the computation of equilibria in prediction markets in perhaps ...
We propose and study Collpasing Bandits, a new restless multi-armed band...
We consider a monopoly information holder selling information to a
budge...
Persuasion studies how a principal can influence agents' decisions via
s...
We study the behavior of stochastic bandits algorithms under strategic
b...
Routine operational use of sensitive data is commonly governed by laws a...
Uncertainty is one of the major challenges facing applications of game
t...
Modern ad auctions allow advertisers to target more specific segments of...
This paper presents HEALER, a software agent that recommends sequential
...
Most models of Stackelberg security games assume that the attacker only ...