Practical Adversarial Attacks on Stochastic Bandits via Fake Data Injection

Open in new window