Observation-Free Attacks on Stochastic Bandits

Neural Information Processing Systems 

We study data corruption attacks on stochastic multi arm bandit algorithms. Existing attack methodologies assume that the attacker can observe the multi arm bandit algorithm's realized behavior which is in contrast to the adversaries modeled in the

Similar Docs  Excel Report  more

TitleSimilaritySource
None found