Author of the publication

Online Competitive Influence Maximization.

, , , , and . AISTATS, volume 151 of Proceedings of Machine Learning Research, page 11472-11502. PMLR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RF-Rhythm: Secure and Usable Two-Factor RFID Authentication., , , , , , , , and . INFOCOM, page 2194-2203. IEEE, (2020)Hierarchical Conversational Preference Elicitation with Bandit Feedback., , , , , and . CIKM, page 2827-2836. ACM, (2022)Datanet: Enabling Seamless, Metered and Trusted Internet Connectivity without Subscriptions., , , , and . ICC Workshops, page 1-6. IEEE, (2021)Contextual Combinatorial Bandits with Probabilistically Triggered Arms., , , , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 22559-22593. PMLR, (2023)CoRAST: Towards Foundation Model-Powered Correlated Data Analysis in Resource-Constrained CPS and IoT., , , , and . CoRR, (2024)Combinatorial Multivariant Multi-Armed Bandits with Applications to Episodic Reinforcement Learning and Beyond., , , , , , , , , and . ICML, OpenReview.net, (2024)Batch-Size Independent Regret Bounds for Combinatorial Semi-Bandits with Probabilistically Triggered Arms or Independent Arms., , , , , and . NeurIPS, (2022)HYChat: A Hybrid Interactive Chat System for Mobile Social Networking in Proximity., , , and . SmartCity, page 471-477. IEEE Computer Society, (2015)Observe Before Play: Multi-Armed Bandit with Pre-Observations., , and . AAAI, page 7023-7030. AAAI Press, (2020)Correlated combinatorial bandits for online resource allocation., , , , and . MobiHoc, page 91-100. ACM, (2022)