Follow
Zhiyong Wang
Title
Cited by
Cited by
Year
Efficient explorative key-term selection strategies for conversational contextual bandits
Z Wang, X Liu, S Li, JCS Lui
Proceedings of the AAAI Conference on Artificial Intelligence 37 (8), 10288 …, 2023
42023
Online clustering of bandits with misspecified user models
Z Wang, J Xie, X Liu, S Li, J Lui
Advances in Neural Information Processing Systems 36, 2024
22024
Adversarial attacks on online learning to rank with click feedback
J Zuo, Z Zhang, Z Wang, S Li, M Hajiesmaili, A Wierman
Advances in Neural Information Processing Systems 36, 2024
22024
Online corrupted user detection and regret minimization
Z Wang, J Xie, T Yu, S Li, J Lui
Advances in Neural Information Processing Systems 36, 2024
12024
Online optimal service caching for multi-access edge computing: A constrained Multi-Armed Bandit optimization approach
W Chu, X Zhang, X Jia, JCS Lui, Z Wang
Computer Networks, 110395, 2024
2024
Federated Contextual Cascading Bandits with Asynchronous Communication and Heterogeneous Users
H Yang, X Liu, Z Wang, H Xie, JCS Lui, D Lian, E Chen
Proceedings of the AAAI Conference on Artificial Intelligence 38 (18), 20596 …, 2024
2024
Variance-Dependent Regret Bounds for Non-stationary Linear Bandits
Z Wang, J Xie, Y Chen, J Lui, D Zhou
arXiv preprint arXiv:2403.10732, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–7