Federated neural bandits

Z Dai, Y Shu, A Verma, FX Fan, BKH Low… - arXiv preprint arXiv …, 2022 - arxiv.org
Recent works on neural contextual bandits have achieved compelling performances due to
their ability to leverage the strong representation power of neural networks (NNs) for reward …

Multi-agent best arm identification with private communications

A Rio, M Barlier, I Colin… - … Conference on Machine …, 2023 - proceedings.mlr.press
We address multi-agent best arm identification with privacy guarantees. In this setting,
agents collaborate by communicating to find the optimal arm. To avoid leaking sensitive data …

Federated sequential decision making: Bayesian optimization, reinforcement learning, and beyond

Z Dai, FX Fan, C Tan, TN Hoang, BKH Low, P Jaillet - Federated Learning, 2024 - Elsevier
Federated learning (FL) in its classic form involves the collaborative training of supervised
learning models (eg, neural networks) among multiple agents/clients. However, in addition …

Latent go-explore with area as unit

G Jia, J Huo, F Yang, B Yang - Information Processing & Management, 2024 - Elsevier
The trade-off between exploration and exploitation has been one of the main challenges for
ensuring sampling efficiency, optimal solution, and transferability of reinforcement learning …

Federated learning in healthcare applications

P Kanhegaonkar, S Prakash - Data Fusion Techniques and Applications for …, 2024 - Elsevier
Federated learning (FL), also referred to as collaborative learning, uses a number of
dispersed edge devices or servers to run the training algorithms, without exchanging local …

SAMBA: A System for Secure Federated Multi-Armed Bandits

G Marcadet, R Ciucanu, P Lafourcade… - 2022 IEEE 38th …, 2022 - ieeexplore.ieee.org
The federated learning paradigm allows several data owners to contribute to a machine
learning task without exposing their potentially sensitive data. We focus on cumulative …

Design of Secure Multi-User Protocols: Application to Bandits, Ticketing and File Transfer

G Marcadet - 2024 - theses.hal.science
A cryptographic protocol establishes a series of interactions among users to deliver a given
functionality while ensuring various properties, a protocol being considered secure when it …

DRIFT: A Federated Recommender System with Implicit Feedback on the Items

T Nommay - arXiv preprint arXiv:2304.09084, 2023 - arxiv.org
Nowadays there are more and more items available online, this makes it hard for users to
find items that they like. Recommender systems aim to find the item who best suits the user …

[PDF][PDF] LIMOS/SIC: Systèmes d'Information et de Communication

V ANTOINE - Bulletin N o 119 - hal.science
L'axe Système d'Information et de Communication (SIC) du Laboratoire d'Informatique, de
Modélisation et d'Optimisation des Systèmes (LIMOS) regroupe les travaux en interaction …