Author of the publication

Learning With Guarantee Via Constrained Multi-Armed Bandit: Theory and Network Applications.

, , , and . IEEE Trans. Mob. Comput., 22 (9): 5346-5358 (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beyond the Click-Through Rate: Web Link Selection with Multi-level Feedback., , , and . IJCAI, page 3308-3314. ijcai.org, (2018)Learning With Guarantee Via Constrained Multi-Armed Bandit: Theory and Network Applications., , , and . IEEE Trans. Mob. Comput., 22 (9): 5346-5358 (September 2023)Quantum Networks with Multiple Service Providers: Transport Layer Protocols and Research Opportunities., , , , and . IEEE Netw., 36 (5): 56-62 (2022)Exploiting the Overheard Information of Coded Caching for Heterogeneous Lossy Channels., , , , and . VTC Fall, page 1-6. IEEE, (2023)An Online Learning Approach to Network Application Optimization with Guarantee., , , and . INFOCOM, page 2006-2014. IEEE, (2018)BAGEL: Backdoor Attacks against Federated Contrastive Learning., , , , , , , and . CoRR, (2023)PCC Priority: A Priority-Aware Bandwidth Allocation Framework for QUIC., , , and . IEEE Netw. Lett., 5 (4): 279-283 (December 2023)Skeleton Extraction from Incomplete Boundaries in Sensor Networks Based on Distance Transform., , , , , , and . ICDCS, page 42-51. IEEE Computer Society, (2012)Data-Driven Rate Control for RDMA Networks: A Lightweight Online Learning Approach., , , , , and . ICDCS, page 1-11. IEEE, (2023)Fair Distributed Cooperative Bandit Learning on Networks for Intelligent Internet of Things Systems (Technical Report)., , , and . CoRR, (2024)