An asymptotically optimal solution for contextual bandit problem in adversarial setting

Limited Access
This item is unavailable until:
2020-05-31

Date

2018-05

Editor(s)

Advisor

Kozat, Süleyman Serdar

Supervisor

Co-Advisor

Co-Supervisor

Instructor

Source Title

Print ISSN

Electronic ISSN

Publisher

Bilkent University

Volume

Issue

Pages

Language

English

Journal Title

Journal ISSN

Volume Title

Series

Abstract

We propose online algorithms for sequential learning in the contextual multiarmed bandit setting. Our approach is to partition the context space and then optimally combine all of the possible mappings between the partition regions and the set of bandit arms in a data driven manner. We show that in our approach, the best mapping is able to approximate the best arm selection policy to any desired degree under mild Lipschitz conditions. Therefore, we design our algorithms based on the optimal adaptive combination and asymptotically achieve the performance of the best mapping as well as the best arm selection policy. This optimality is also guaranteed to hold even in adversarial environments since we do not rely on any statistical assumptions regarding the contexts or the loss of the bandit arms. Moreover, we design e cient implementations for our algorithms in various hierarchical partitioning structures such as lexicographical or arbitrary position splitting and binary trees (and several other partitioning examples). For instance, in the case of binary tree partitioning, the computational complexity is only log-linear in the number of regions in the nest partition. In conclusion, we provide signi cant performance improvements by introducing upper bounds (w.r.t. the best arm selection policy) that are mathematically proven to vanish in the average loss per round sense at a faster rate compared to the state-of-theart. Our experimental work extensively covers various scenarios ranging from bandit settings to multi-class classi cation with real and synthetic data. In these experiments, we show that our algorithms are highly superior over the stateof- the-art techniques while maintaining the introduced mathematical guarantees and a computationally decent scalability.

Course

Other identifiers

Book Title

Citation

item.page.isversionof