Picture for Jinhang Zuo

Jinhang Zuo

Combinatorial Multivariant Multi-Armed Bandits with Applications to Episodic Reinforcement Learning and Beyond

Add code
Jun 03, 2024
Viaarxiv icon

Quickest Change Detection with Confusing Change

Add code
May 01, 2024
Viaarxiv icon

CoRAST: Towards Foundation Model-Powered Correlated Data Analysis in Resource-Constrained CPS and IoT

Add code
Mar 27, 2024
Figure 1 for CoRAST: Towards Foundation Model-Powered Correlated Data Analysis in Resource-Constrained CPS and IoT
Figure 2 for CoRAST: Towards Foundation Model-Powered Correlated Data Analysis in Resource-Constrained CPS and IoT
Figure 3 for CoRAST: Towards Foundation Model-Powered Correlated Data Analysis in Resource-Constrained CPS and IoT
Figure 4 for CoRAST: Towards Foundation Model-Powered Correlated Data Analysis in Resource-Constrained CPS and IoT
Viaarxiv icon

Adversarial Attacks on Cooperative Multi-agent Bandits

Add code
Nov 03, 2023
Figure 1 for Adversarial Attacks on Cooperative Multi-agent Bandits
Figure 2 for Adversarial Attacks on Cooperative Multi-agent Bandits
Figure 3 for Adversarial Attacks on Cooperative Multi-agent Bandits
Viaarxiv icon

Intelligent Communication Planning for Constrained Environmental IoT Sensing with Reinforcement Learning

Add code
Aug 19, 2023
Figure 1 for Intelligent Communication Planning for Constrained Environmental IoT Sensing with Reinforcement Learning
Figure 2 for Intelligent Communication Planning for Constrained Environmental IoT Sensing with Reinforcement Learning
Figure 3 for Intelligent Communication Planning for Constrained Environmental IoT Sensing with Reinforcement Learning
Figure 4 for Intelligent Communication Planning for Constrained Environmental IoT Sensing with Reinforcement Learning
Viaarxiv icon

Adversarial Attacks on Online Learning to Rank with Click Feedback

Add code
May 26, 2023
Figure 1 for Adversarial Attacks on Online Learning to Rank with Click Feedback
Figure 2 for Adversarial Attacks on Online Learning to Rank with Click Feedback
Figure 3 for Adversarial Attacks on Online Learning to Rank with Click Feedback
Figure 4 for Adversarial Attacks on Online Learning to Rank with Click Feedback
Viaarxiv icon

Contextual Combinatorial Bandits with Probabilistically Triggered Arms

Add code
Mar 30, 2023
Figure 1 for Contextual Combinatorial Bandits with Probabilistically Triggered Arms
Figure 2 for Contextual Combinatorial Bandits with Probabilistically Triggered Arms
Figure 3 for Contextual Combinatorial Bandits with Probabilistically Triggered Arms
Figure 4 for Contextual Combinatorial Bandits with Probabilistically Triggered Arms
Viaarxiv icon

Hierarchical Conversational Preference Elicitation with Bandit Feedback

Add code
Sep 06, 2022
Figure 1 for Hierarchical Conversational Preference Elicitation with Bandit Feedback
Figure 2 for Hierarchical Conversational Preference Elicitation with Bandit Feedback
Figure 3 for Hierarchical Conversational Preference Elicitation with Bandit Feedback
Figure 4 for Hierarchical Conversational Preference Elicitation with Bandit Feedback
Viaarxiv icon

Batch-Size Independent Regret Bounds for Combinatorial Semi-Bandits with Probabilistically Triggered Arms or Independent Arms

Add code
Aug 31, 2022
Figure 1 for Batch-Size Independent Regret Bounds for Combinatorial Semi-Bandits with Probabilistically Triggered Arms or Independent Arms
Figure 2 for Batch-Size Independent Regret Bounds for Combinatorial Semi-Bandits with Probabilistically Triggered Arms or Independent Arms
Figure 3 for Batch-Size Independent Regret Bounds for Combinatorial Semi-Bandits with Probabilistically Triggered Arms or Independent Arms
Figure 4 for Batch-Size Independent Regret Bounds for Combinatorial Semi-Bandits with Probabilistically Triggered Arms or Independent Arms
Viaarxiv icon

Multi-layered Network Exploration via Random Walks: From Offline Optimization to Online Learning

Add code
Jun 09, 2021
Figure 1 for Multi-layered Network Exploration via Random Walks: From Offline Optimization to Online Learning
Figure 2 for Multi-layered Network Exploration via Random Walks: From Offline Optimization to Online Learning
Figure 3 for Multi-layered Network Exploration via Random Walks: From Offline Optimization to Online Learning
Figure 4 for Multi-layered Network Exploration via Random Walks: From Offline Optimization to Online Learning
Viaarxiv icon