Skip to main content

Showing 1–50 of 84 results for author: Lui, J C S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.01386  [pdf, ps, other

    cs.LG

    Combinatorial Multivariant Multi-Armed Bandits with Applications to Episodic Reinforcement Learning and Beyond

    Authors: Xutong Liu, Siwei Wang, **hang Zuo, Han Zhong, Xuchuang Wang, Zhiyong Wang, Shuai Li, Mohammad Hajiesmaili, John C. S. Lui, Wei Chen

    Abstract: We introduce a novel framework of combinatorial multi-armed bandits (CMAB) with multivariant and probabilistically triggering arms (CMAB-MT), where the outcome of each arm is a $d$-dimensional multivariant random variable and the feedback follows a general arm triggering process. Compared with existing CMAB works, CMAB-MT not only enhances the modeling power but also allows improved results by lev… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

  2. arXiv:2405.16587  [pdf, other

    cs.LG cs.AI cs.HC

    Cost-Effective Online Multi-LLM Selection with Versatile Reward Models

    Authors: Xiangxiang Dai, ** Li, Xutong Liu, Anqi Yu, John C. S. Lui

    Abstract: With the rapid advancement of large language models (LLMs), the diversity of multi-LLM tasks and the variability in their pricing structures have become increasingly important, as costs can vary greatly between different LLMs. To tackle these challenges, we introduce the \textit{C2MAB-V}, a \underline{C}ost-effective \underline{C}ombinatorial \underline{M}ulti-armed \underline{B}andit with \underl… ▽ More

    Submitted 26 May, 2024; originally announced May 2024.

    Comments: 29 pages, 12 figures, conference

  3. arXiv:2405.02881  [pdf, other

    cs.LG cs.AI stat.ML

    FedConPE: Efficient Federated Conversational Bandits with Heterogeneous Clients

    Authors: Zhuohua Li, Maoli Liu, John C. S. Lui

    Abstract: Conversational recommender systems have emerged as a potent solution for efficiently eliciting user preferences. These systems interactively present queries associated with "key terms" to users and leverage user feedback to estimate user preferences more efficiently. Nonetheless, most existing algorithms adopt a centralized approach. In this paper, we introduce FedConPE, a phase elimination-based… ▽ More

    Submitted 20 June, 2024; v1 submitted 5 May, 2024; originally announced May 2024.

    Comments: Accepted to the 33rd International Joint Conference on Artificial Intelligence (IJCAI), 2024

  4. arXiv:2403.10732  [pdf, other

    cs.LG cs.AI

    Variance-Dependent Regret Bounds for Non-stationary Linear Bandits

    Authors: Zhiyong Wang, Jize Xie, Yi Chen, John C. S. Lui, Dongruo Zhou

    Abstract: We investigate the non-stationary stochastic linear bandit problem where the reward distribution evolves each round. Existing algorithms characterize the non-stationarity by the total variation budget $B_K$, which is the summation of the change of the consecutive feature vectors of the linear bandits over $K$ rounds. However, such a quantity only measures the non-stationarity with respect to the e… ▽ More

    Submitted 15 March, 2024; originally announced March 2024.

    Comments: 30 pages

  5. arXiv:2402.16312  [pdf, other

    cs.LG cs.AI

    Federated Contextual Cascading Bandits with Asynchronous Communication and Heterogeneous Users

    Authors: Hantao Yang, Xutong Liu, Zhiyong Wang, Hong Xie, John C. S. Lui, Defu Lian, Enhong Chen

    Abstract: We study the problem of federated contextual combinatorial cascading bandits, where $|\mathcal{U}|$ agents collaborate under the coordination of a central server to provide tailored recommendations to the $|\mathcal{U}|$ corresponding users. Existing works consider either a synchronous framework, necessitating full agent participation and global synchronization, or assume user homogeneity with ide… ▽ More

    Submitted 26 February, 2024; originally announced February 2024.

    Comments: Accepted by AAAI 2024

  6. arXiv:2402.03770  [pdf, other

    cs.LG

    Fed-CVLC: Compressing Federated Learning Communications with Variable-Length Codes

    Authors: Xiaoxin Su, Yipeng Zhou, Laizhong Cui, John C. S. Lui, Jiangchuan Liu

    Abstract: In Federated Learning (FL) paradigm, a parameter server (PS) concurrently communicates with distributed participating clients for model collection, update aggregation, and model distribution over multiple rounds, without touching private data owned by individual clients. FL is appealing in preserving data privacy; yet the communication between the PS and scattered clients can be a severe bottlenec… ▽ More

    Submitted 6 February, 2024; originally announced February 2024.

    Comments: To appear in 2024 IEEE International Conference on Computer Communications(INFOCOM 2024)

  7. arXiv:2311.01698  [pdf, other

    cs.LG cs.CR cs.MA

    Adversarial Attacks on Cooperative Multi-agent Bandits

    Authors: **hang Zuo, Zhiyao Zhang, Xuchuang Wang, Cheng Chen, Shuai Li, John C. S. Lui, Mohammad Hajiesmaili, Adam Wierman

    Abstract: Cooperative multi-agent multi-armed bandits (CMA2B) consider the collaborative efforts of multiple agents in a shared multi-armed bandit game. We study latent vulnerabilities exposed by this collaboration and consider adversarial attacks on a few agents with the goal of influencing the decisions of the rest. More specifically, we study adversarial attacks on CMA2B in both homogeneous settings, whe… ▽ More

    Submitted 3 November, 2023; originally announced November 2023.

  8. arXiv:2310.04768  [pdf, other

    cs.LG

    Online Corrupted User Detection and Regret Minimization

    Authors: Zhiyong Wang, Jize Xie, Tong Yu, Shuai Li, John C. S. Lui

    Abstract: In real-world online web systems, multiple users usually arrive sequentially into the system. For applications like click fraud and fake reviews, some users can maliciously perform corrupted (disrupted) behaviors to trick the system. Therefore, it is crucial to design efficient online learning algorithms to robustly learn from potentially corrupted user behaviors and accurately identify the corrup… ▽ More

    Submitted 9 October, 2023; v1 submitted 7 October, 2023; originally announced October 2023.

  9. arXiv:2310.02717  [pdf, other

    cs.LG cs.AI

    Online Clustering of Bandits with Misspecified User Models

    Authors: Zhiyong Wang, Jize Xie, Xutong Liu, Shuai Li, John C. S. Lui

    Abstract: The contextual linear bandit is an important online learning problem where given arm features, a learning agent selects an arm at each round to maximize the cumulative rewards in the long run. A line of works, called the clustering of bandits (CB), utilize the collaborative effect over user preferences and have shown significant improvements over classic linear bandit algorithms. However, existing… ▽ More

    Submitted 10 October, 2023; v1 submitted 4 October, 2023; originally announced October 2023.

  10. arXiv:2308.04314  [pdf, other

    cs.LG cs.AI stat.ML

    Cooperative Multi-agent Bandits: Distributed Algorithms with Optimal Individual Regret and Constant Communication Costs

    Authors: Lin Yang, Xuchuang Wang, Mohammad Hajiesmaili, Lijun Zhang, John C. S. Lui, Don Towsley

    Abstract: Recently, there has been extensive study of cooperative multi-agent multi-armed bandits where a set of distributed agents cooperatively play the same multi-armed bandit game. The goal is to develop bandit algorithms with the optimal group and individual regrets and low communication between agents. The prior work tackled this problem using two paradigms: leader-follower and fully distributed algor… ▽ More

    Submitted 8 August, 2023; originally announced August 2023.

  11. arXiv:2306.07761  [pdf, other

    cs.LG stat.ML

    Multi-Fidelity Multi-Armed Bandits Revisited

    Authors: Xuchuang Wang, Qingyun Wu, Wei Chen, John C. S. Lui

    Abstract: We study the multi-fidelity multi-armed bandit (MF-MAB), an extension of the canonical multi-armed bandit (MAB) problem. MF-MAB allows each arm to be pulled with different costs (fidelities) and observation accuracy. We study both the best arm identification with fixed confidence (BAI) and the regret minimization objectives. For BAI, we present (a) a cost complexity lower bound, (b) an algorithmic… ▽ More

    Submitted 13 June, 2023; originally announced June 2023.

  12. arXiv:2305.08070  [pdf, other

    cs.LG cs.DC

    A Survey of Federated Evaluation in Federated Learning

    Authors: Behnaz Soltani, Yipeng Zhou, Venus Haghighi, John C. S. Lui

    Abstract: In traditional machine learning, it is trivial to conduct model evaluation since all data samples are managed centrally by a server. However, model evaluation becomes a challenging problem in federated learning (FL), which is called federated evaluation in this work. This is because clients do not expose their original data to preserve data privacy. Federated evaluation plays a vital role in clien… ▽ More

    Submitted 19 May, 2023; v1 submitted 14 May, 2023; originally announced May 2023.

    Comments: Accepted by IJCAI 2023

  13. arXiv:2303.17110  [pdf, other

    cs.LG cs.AI stat.ML

    Contextual Combinatorial Bandits with Probabilistically Triggered Arms

    Authors: Xutong Liu, **hang Zuo, Siwei Wang, John C. S. Lui, Mohammad Hajiesmaili, Adam Wierman, Wei Chen

    Abstract: We study contextual combinatorial bandits with probabilistically triggered arms (C$^2$MAB-T) under a variety of smoothness conditions that capture a wide range of applications, such as contextual cascading bandits and contextual influence maximization bandits. Under the triggering probability modulated (TPM) condition, we devise the C$^2$-UCB-T algorithm and propose a novel analysis that achieves… ▽ More

    Submitted 14 June, 2023; v1 submitted 29 March, 2023; originally announced March 2023.

    Comments: Accepted in the 40th International Conference on Machine Learning (ICML), 2023

  14. arXiv:2303.06389  [pdf, other

    cs.LG cs.AI

    Uncertainty-Aware Instance Reweighting for Off-Policy Learning

    Authors: Xiaoying Zhang, Junpu Chen, Hongning Wang, Hong Xie, Yang Liu, John C. S. Lui, Hang Li

    Abstract: Off-policy learning, referring to the procedure of policy optimization with access only to logged feedback data, has shown importance in various real-world applications, such as search engines, recommender systems, and etc. While the ground-truth logging policy, which generates the logged data, is usually unknown, previous work simply takes its estimated value in off-policy learning, ignoring both… ▽ More

    Submitted 27 September, 2023; v1 submitted 11 March, 2023; originally announced March 2023.

  15. arXiv:2303.00315  [pdf, other

    cs.LG stat.ML

    Efficient Explorative Key-term Selection Strategies for Conversational Contextual Bandits

    Authors: Zhiyong Wang, Xutong Liu, Shuai Li, John C. S. Lui

    Abstract: Conversational contextual bandits elicit user preferences by occasionally querying for explicit feedback on key-terms to accelerate learning. However, there are aspects of existing approaches which limit their performance. First, information gained from key-term-level conversations and arm-level recommendations is not appropriately incorporated to speed up learning. Second, it is important to ask… ▽ More

    Submitted 1 October, 2023; v1 submitted 1 March, 2023; originally announced March 2023.

  16. arXiv:2302.07446  [pdf, other

    cs.LG cs.DC cs.MA stat.ML

    On-Demand Communication for Asynchronous Multi-Agent Bandits

    Authors: Yu-Zhen Janice Chen, Lin Yang, Xuchuang Wang, Xutong Liu, Mohammad Hajiesmaili, John C. S. Lui, Don Towsley

    Abstract: This paper studies a cooperative multi-agent multi-armed stochastic bandit problem where agents operate asynchronously -- agent pull times and rates are unknown, irregular, and heterogeneous -- and face the same instance of a K-armed bandit problem. Agents can share reward information to speed up the learning process at additional communication costs. We propose ODC, an on-demand communication pro… ▽ More

    Submitted 30 August, 2023; v1 submitted 14 February, 2023; originally announced February 2023.

    Comments: Accepted by AISTATS 2023

  17. arXiv:2301.12225  [pdf, ps, other

    cs.AI

    Interactive Log Parsing via Light-weight User Feedback

    Authors: Liming Wang, Hong Xie, Ye Li, Jian Tan, John C. S. Lui

    Abstract: Template mining is one of the foundational tasks to support log analysis, which supports the diagnosis and troubleshooting of large scale Web applications. This paper develops a human-in-the-loop template mining framework to support interactive log analysis, which is highly desirable in real-world diagnosis or troubleshooting of Web applications but yet previous template mining algorithms fails to… ▽ More

    Submitted 27 February, 2023; v1 submitted 28 January, 2023; originally announced January 2023.

  18. arXiv:2211.11692  [pdf, other

    cs.NI cs.LG cs.MA

    TinyQMIX: Distributed Access Control for mMTC via Multi-agent Reinforcement Learning

    Authors: Tien Thanh Le, Yusheng Ji, John C. S Lui

    Abstract: Distributed access control is a crucial component for massive machine type communication (mMTC). In this communication scenario, centralized resource allocation is not scalable because resource configurations have to be sent frequently from the base station to a massive number of devices. We investigate distributed reinforcement learning for resource selection without relying on centralized contro… ▽ More

    Submitted 21 November, 2022; originally announced November 2022.

    Comments: 6 pages, 4 figures, presented at VTC Fall 2022

  19. arXiv:2211.06567  [pdf, ps, other

    cs.LG cs.DS

    Online Search with Predictions: Pareto-optimal Algorithm and its Applications in Energy Markets

    Authors: Russell Lee, Bo Sun, Mohammad Hajiesmaili, John C. S. Lui

    Abstract: This paper develops learning-augmented algorithms for energy trading in volatile electricity markets. The basic problem is to sell (or buy) $k$ units of energy for the highest revenue (lowest cost) over uncertain time-varying prices, which can framed as a classic online search problem in the literature of competitive analysis. State-of-the-art algorithms assume no knowledge about future market pri… ▽ More

    Submitted 27 February, 2024; v1 submitted 11 November, 2022; originally announced November 2022.

  20. arXiv:2209.11934  [pdf, ps, other

    cs.DS

    The Online Knapsack Problem with Departures

    Authors: Bo Sun, Lin Yang, Mohammad Hajiesmaili, Adam Wierman, John C. S. Lui, Don Towsley, Danny H. K. Tsang

    Abstract: The online knapsack problem is a classic online resource allocation problem in networking and operations research. Its basic version studies how to pack online arriving items of different sizes and values into a capacity-limited knapsack. In this paper, we study a general version that includes item departures, while also considering multiple knapsacks and multi-dimensional item sizes. We design a… ▽ More

    Submitted 15 March, 2023; v1 submitted 24 September, 2022; originally announced September 2022.

  21. arXiv:2208.14865  [pdf, other

    cs.LG

    Federated Online Clustering of Bandits

    Authors: Xutong Liu, Haoru Zhao, Tong Yu, Shuai Li, John C. S. Lui

    Abstract: Contextual multi-armed bandit (MAB) is an important sequential decision-making problem in recommendation systems. A line of works, called the clustering of bandits (CLUB), utilize the collaborative effect over users and dramatically improve the recommendation quality. Owing to the increasing application scale and public concerns about privacy, there is a growing demand to keep user data decentrali… ▽ More

    Submitted 31 August, 2022; originally announced August 2022.

  22. arXiv:2208.14837  [pdf, other

    cs.LG cs.AI stat.ML

    Batch-Size Independent Regret Bounds for Combinatorial Semi-Bandits with Probabilistically Triggered Arms or Independent Arms

    Authors: Xutong Liu, **hang Zuo, Siwei Wang, Carlee Joe-Wong, John C. S. Lui, Wei Chen

    Abstract: In this paper, we study the combinatorial semi-bandits (CMAB) and focus on reducing the dependency of the batch-size $K$ in the regret bound, where $K$ is the total number of arms that can be pulled or triggered in each round. First, for the setting of CMAB with probabilistically triggered arms (CMAB-T), we discover a novel (directional) triggering probability and variance modulated (TPVM) conditi… ▽ More

    Submitted 13 October, 2022; v1 submitted 31 August, 2022; originally announced August 2022.

  23. arXiv:2206.08776  [pdf, other

    cs.LG stat.ML

    Multiple-Play Stochastic Bandits with Shareable Finite-Capacity Arms

    Authors: Xuchuang Wang, Hong Xie, John C. S. Lui

    Abstract: We generalize the multiple-play multi-armed bandits (MP-MAB) problem with a shareable arm setting, in which several plays can share the same arm. Furthermore, each shareable arm has a finite reward capacity and a ''per-load'' reward distribution, both of which are unknown to the learner. The reward from a shareable arm is load-dependent, which is the "per-load" reward multiplying either the number… ▽ More

    Submitted 17 June, 2022; originally announced June 2022.

    Comments: to appear in ICML 2022

  24. arXiv:2205.08362  [pdf, ps, other

    cs.LG cs.AI

    LPC-AD: Fast and Accurate Multivariate Time Series Anomaly Detection via Latent Predictive Coding

    Authors: Zhi Qi, Hong Xie, Ye Li, Jian Tan, FeiFei Li, John C. S. Lui

    Abstract: This paper proposes LPC-AD, a fast and accurate multivariate time series (MTS) anomaly detection method. LPC-AD is motivated by the ever-increasing needs for fast and accurate MTS anomaly detection methods to support fast troubleshooting in cloud computing, micro-service systems, etc. LPC-AD is fast in the sense that its reduces the training time by as high as 38.2% compared to the state-of-the-ar… ▽ More

    Submitted 5 May, 2022; originally announced May 2022.

  25. arXiv:2204.13502  [pdf, other

    cs.LG

    Multi-Player Multi-Armed Bandits with Finite Shareable Resources Arms: Learning Algorithms & Applications

    Authors: Xuchuang Wang, Hong Xie, John C. S. Lui

    Abstract: Multi-player multi-armed bandits (MMAB) study how decentralized players cooperatively play the same multi-armed bandit so as to maximize their total cumulative rewards. Existing MMAB models mostly assume when more than one player pulls the same arm, they either have a collision and obtain zero rewards, or have no collision and gain independent rewards, both of which are usually too restrictive in… ▽ More

    Submitted 28 April, 2022; originally announced April 2022.

    Comments: To appear at IJCAI 22

  26. arXiv:2202.09755  [pdf, ps, other

    cs.GT

    Multi-dimensional Network Security Game: How do attacker and defender battle on parallel targets?

    Authors: Yuedong Xu, John C. S. Lui

    Abstract: In this paper, we consider a new network security game wherein an attacker and a defender are battling over "multiple" targets. This type of game is appropriate to model many current network security conflicts such as Internet phishing, mobile malware or network intrusions. In such attacks, the attacker and the defender need to decide how to allocate resources on each target so as to maximize his… ▽ More

    Submitted 20 February, 2022; originally announced February 2022.

  27. arXiv:2112.11818  [pdf, other

    cs.DC cs.LG

    Decentralized Task Offloading in Edge Computing: A Multi-User Multi-Armed Bandit Approach

    Authors: Xiong Wang, Jiancheng Ye, John C. S. Lui

    Abstract: Mobile edge computing facilitates users to offload computation tasks to edge servers for meeting their stringent delay requirements. Previous works mainly explore task offloading when system-side information is given (e.g., server processing speed, cellular data rate), or centralized offloading under system uncertainty. But both generally fall short to handle task placement involving many coexisti… ▽ More

    Submitted 27 December, 2021; v1 submitted 22 December, 2021; originally announced December 2021.

    Comments: INFOCOM 2022

  28. arXiv:2112.10389  [pdf, other

    cs.LG cs.NI math.OC

    Decentralized Stochastic Proximal Gradient Descent with Variance Reduction over Time-varying Networks

    Authors: Xuanjie Li, Yuedong Xu, Jessie Hui Wang, Xin Wang, John C. S. Lui

    Abstract: In decentralized learning, a network of nodes cooperate to minimize an overall objective function that is usually the finite-sum of their local objectives, and incorporates a non-smooth regularization term for the better generalization ability. Decentralized stochastic proximal gradient (DSPG) method is commonly used to train this type of learning models, while the convergence rate is retarded by… ▽ More

    Submitted 23 January, 2022; v1 submitted 20 December, 2021; originally announced December 2021.

    Comments: 16 pages, 14 figures

    MSC Class: 68T05 ACM Class: I.2.11

  29. arXiv:2106.10473  [pdf, other

    cs.SI

    Pricing Social Visibility Service in Online Social Networks: Modeling and Algorithms

    Authors: Shiyuan Zheng, Hong Xie, John C. S. Lui

    Abstract: Online social networks (OSNs) such as YoutTube, Instagram, Twitter, Facebook, etc., serve as important platforms for users to share their information or content to friends or followers. Oftentimes, users want to enhance their social visibility, as it can make their contents, i.e., opinions, videos, pictures, etc., attract attention from more users, which in turn may bring higher commercial benefit… ▽ More

    Submitted 19 June, 2021; originally announced June 2021.

  30. arXiv:2106.05065  [pdf, other

    cs.LG cs.AI

    Multi-layered Network Exploration via Random Walks: From Offline Optimization to Online Learning

    Authors: Xutong Liu, **hang Zuo, Xiaowei Chen, Wei Chen, John C. S. Lui

    Abstract: Multi-layered network exploration (MuLaNE) problem is an important problem abstracted from many applications. In MuLaNE, there are multiple network layers where each node has an importance weight and each layer is explored by a random walk. The MuLaNE task is to allocate total random walk budget $B$ into each network layer so that the total weights of the unique nodes visited by random walks are m… ▽ More

    Submitted 9 June, 2021; originally announced June 2021.

  31. arXiv:2105.00766  [pdf, other

    cs.DC

    Joint D2D Collaboration and Task Offloading for Edge Computing: A Mean Field Graph Approach

    Authors: Xiong Wang, Jiancheng Ye, John C. S. Lui

    Abstract: Mobile edge computing (MEC) facilitates computation offloading to edge server, as well as task processing via device-to-device (D2D) collaboration. Existing works mainly focus on centralized network-assisted offloading solutions, which are unscalable to scenarios involving collaboration among massive users. In this paper, we propose a joint framework of decentralized D2D collaboration and efficien… ▽ More

    Submitted 6 May, 2021; v1 submitted 3 May, 2021; originally announced May 2021.

    Comments: IWQoS 2021

  32. arXiv:2011.02664  [pdf, other

    cs.LG

    Restless-UCB, an Efficient and Low-complexity Algorithm for Online Restless Bandits

    Authors: Siwei Wang, Longbo Huang, John C. S. Lui

    Abstract: We study the online restless bandit problem, where the state of each arm evolves according to a Markov chain, and the reward of pulling an arm depends on both the pulled arm and the current state of the corresponding Markov chain. In this paper, we propose Restless-UCB, a learning policy that follows the explore-then-commit framework. In Restless-UCB, we present a novel method to construct offline… ▽ More

    Submitted 6 November, 2020; v1 submitted 5 November, 2020; originally announced November 2020.

  33. arXiv:2008.01647  [pdf, other

    cs.NI

    Online VNF Chaining and Predictive Scheduling: Optimality and Trade-offs

    Authors: Xi Huang, Simeng Bian, Xin Gao, Weijie Wu, Ziyu Shao, Yang Yang, John C. S. Lui

    Abstract: For NFV systems, the key design space includes the function chaining for network requests and resource scheduling for servers. The problem is challenging since NFV systems usually require multiple (often conflicting) design objectives and the computational efficiency of real-time decision making with limited information. Furthermore, the benefits of predictive scheduling to NFV systems still remai… ▽ More

    Submitted 31 July, 2020; originally announced August 2020.

  34. arXiv:2006.13411  [pdf, other

    cs.LG cs.SI stat.ML

    Online Competitive Influence Maximization

    Authors: **hang Zuo, Xutong Liu, Carlee Joe-Wong, John C. S. Lui, Wei Chen

    Abstract: Online influence maximization has attracted much attention as a way to maximize influence spread through a social network while learning the values of unknown network parameters. Most previous works focus on single-item diffusion. In this paper, we introduce a new Online Competitive Influence Maximization (OCIM) problem, where two competing items (e.g., products, news stories) propagate in the sam… ▽ More

    Submitted 2 March, 2022; v1 submitted 23 June, 2020; originally announced June 2020.

  35. arXiv:2001.05699  [pdf, other

    cs.LG stat.ML

    Combining Offline Causal Inference and Online Bandit Learning for Data Driven Decision

    Authors: Li Ye, Yishi Lin, Hong Xie, John C. S. Lui

    Abstract: A fundamental question for companies with large amount of logged data is: How to use such logged data together with incoming streaming data to make good decisions? Many companies currently make decisions via online A/B tests, but wrong decisions during testing hurt users' experiences and cause irreversible damage. A typical alternative is offline causal inference, which analyzes logged data alone… ▽ More

    Submitted 7 November, 2020; v1 submitted 16 January, 2020; originally announced January 2020.

    Comments: 27 pages, 35 figures, 4 tables

  36. arXiv:1906.01219  [pdf, other

    cs.LG cs.IR stat.ML

    Conversational Contextual Bandit: Algorithm and Application

    Authors: Xiaoying Zhang, Hong Xie, Hang Li, John C. S. Lui

    Abstract: Contextual bandit algorithms provide principled online learning solutions to balance the exploitation-exploration trade-off in various applications such as recommender systems. However, the learning speed of the traditional contextual bandit algorithms is often slow due to the need for extensive exploration. This poses a critical issue in applications like recommender systems, since users may need… ▽ More

    Submitted 26 January, 2020; v1 submitted 4 June, 2019; originally announced June 2019.

    Comments: 11 pages; Accepted by WWW2020

  37. A Memory-Efficient Sketch Method for Estimating High Similarities in Streaming Sets

    Authors: **hui Wang, Yiyan Qi, Yuanming Zhang, Qiaozhu Zhai, Chenxu Wang, John C. S. Lui, Xiaohong Guan

    Abstract: Estimating set similarity and detecting highly similar sets are fundamental problems in areas such as databases, machine learning, and information retrieval. MinHash is a well-known technique for approximating Jaccard similarity of sets and has been successfully used for many applications such as similarity search and large scale learning. Its two compressed versions, b-bit MinHash and Odd Sketch,… ▽ More

    Submitted 22 May, 2019; originally announced May 2019.

  38. arXiv:1903.05833  [pdf, other

    cs.NI

    FAVE: A fast and efficient network Flow AVailability Estimation method with bounded relative error

    Authors: Tingwei Liu, John C. S. Lui

    Abstract: This paper focuses on hel** network providers to carry out network capacity planning and sales projection by answering the question: For a given topology and capacity, whether the network can serve current flow demands with high probabilities? We name such probability as "{\it flow availability}", and present the \underline{f}low \underline{av}ailability \underline{e}stimation (FAVE) problem, wh… ▽ More

    Submitted 14 March, 2019; originally announced March 2019.

    Comments: In IEEE INFOCOM 2019

  39. arXiv:1811.05652  [pdf, other

    cs.DS

    Submodular Optimization Over Streams with Inhomogeneous Decays

    Authors: Junzhou Zhao, Shuo Shang, **hui Wang, John C. S. Lui, Xiangliang Zhang

    Abstract: Cardinality constrained submodular function maximization, which aims to select a subset of size at most $k$ to maximize a monotone submodular utility function, is the key in many data mining and machine learning applications such as data summarization and maximum coverage problems. When data is given as a stream, streaming submodular optimization (SSO) techniques are desired. Existing SSO techniqu… ▽ More

    Submitted 14 November, 2018; originally announced November 2018.

  40. arXiv:1811.05134  [pdf, other

    cs.LG stat.ML

    Community Exploration: From Offline Optimization to Online Learning

    Authors: Xiaowei Chen, Weiran Huang, Wei Chen, John C. S. Lui

    Abstract: We introduce the community exploration problem that has many real-world applications such as online advertising. In the problem, an explorer allocates limited budget to explore communities so as to maximize the number of members he could meet. We provide a systematic study of the community exploration problem, from offline optimization to online learning. For the offline setting where the sizes of… ▽ More

    Submitted 18 November, 2018; v1 submitted 13 November, 2018; originally announced November 2018.

    Comments: full version of the nips'18 paper

  41. arXiv:1810.07917  [pdf, other

    cs.SI physics.soc-ph

    Tracking Influential Nodes in Time-Decaying Dynamic Interaction Networks

    Authors: Junzhou Zhao, Shuo Shang, **hui Wang, John C. S. Lui, Xiangliang Zhang

    Abstract: Identifying influential nodes that can jointly trigger the maximum influence spread in networks is a fundamental problem in many applications such as viral marketing, online advertising, and disease control. Most existing studies assume that social influence is static and they fail to capture the dynamics of influence in reality. In this work, we address the dynamic influence challenge by designin… ▽ More

    Submitted 22 October, 2018; v1 submitted 18 October, 2018; originally announced October 2018.

    Comments: 14 pages, 15 figures

  42. arXiv:1810.03078  [pdf, other

    cs.LG cs.AI stat.ML

    Graphlet Count Estimation via Convolutional Neural Networks

    Authors: Xutong Liu, Yu-Zhen Janice Chen, John C. S. Lui, Konstantin Avrachenkov

    Abstract: Graphlets are defined as k-node connected induced subgraph patterns. For an undirected graph, 3-node graphlets include close triangle and open triangle. When k = 4, there are six types of graphlets, e.g., tailed-triangle and clique are two possible 4-node graphlets. The number of each graphlet, called graphlet count, is a signature which characterizes the local network structure of a given graph.… ▽ More

    Submitted 6 October, 2018; originally announced October 2018.

    Comments: Extended Abstract Accepted by Complex Networks 2018

  43. arXiv:1808.01787  [pdf, other

    cs.NI

    Quantifying Deployability & Evolvability of Future Internet Architectures via Economic Models

    Authors: Li Ye, Hong Xie, John C. S. Lui, Kenneth L. Calvert

    Abstract: Emerging new applications demand the current Internet to provide new functionalities. Although many future Internet architectures and protocols have been proposed to fulfill such needs, ISPs have been reluctant to deploy many of these architectures. We believe technical issues are not the main reasons as many of these new proposals are technically sound. In this paper, we take an economic perspect… ▽ More

    Submitted 28 June, 2020; v1 submitted 6 August, 2018; originally announced August 2018.

  44. arXiv:1805.01702  [pdf, other

    cs.LG cs.AI stat.ML

    Beyond the Click-Through Rate: Web Link Selection with Multi-level Feedback

    Authors: Kun Chen, Kechao Cai, Longbo Huang, John C. S. Lui

    Abstract: The web link selection problem is to select a small subset of web links from a large web link pool, and to place the selected links on a web page that can only accommodate a limited number of links, e.g., advertisements, recommendations, or news feeds. Despite the long concerned click-through rate which reflects the attractiveness of the link itself, the revenue can only be obtained from user acti… ▽ More

    Submitted 4 May, 2018; originally announced May 2018.

    Comments: 8 pages, 12 figures

  45. arXiv:1710.11376  [pdf, ps, other

    cs.NI

    Joint Cache Resource Allocation and Request Routing for In-network Caching Services

    Authors: Weibo Chu, Mostafa Dehghan, John C. S. Lui, Don Towsley, Zhi-Li Zhang

    Abstract: In-network caching is recognized as an effective solution to offload content servers and the network. A cache service provider (SP) always has incentives to better utilize its cache resources by taking into account diverse roles that content providers (CPs) play, e.g., their business models, traffic characteristics, preferences. In this paper, we study the cache resource allocation problem in a Mu… ▽ More

    Submitted 10 December, 2017; v1 submitted 31 October, 2017; originally announced October 2017.

    Comments: 15 pages

  46. arXiv:1709.03110  [pdf, other

    cs.DC

    G-thinker: Big Graph Mining Made Easier and Faster

    Authors: Da Yan, Hongzhi Chen, James Cheng, M. Tamer Özsu, Qizhen Zhang, John C. S. Lui

    Abstract: This paper proposes a general system for compute-intensive graph mining tasks that find from a big graph all subgraphs that satisfy certain requirements (e.g., graph matching and community detection). Due to the broad range of applications of such tasks, many single-threaded algorithms have been proposed. However, graphs such as online social networks and knowledge graphs often have billions of ve… ▽ More

    Submitted 10 September, 2017; originally announced September 2017.

  47. arXiv:1709.02664  [pdf, other

    cs.LG

    Multi-level Feedback Web Links Selection Problem: Learning and Optimization

    Authors: Kechao Cai, Kun Chen, Longbo Huang, John C. S. Lui

    Abstract: Selecting the right web links for a website is important because appropriate links not only can provide high attractiveness but can also increase the website's revenue. In this work, we first show that web links have an intrinsic \emph{multi-level feedback structure}. For example, consider a $2$-level feedback web link: the $1$st level feedback provides the Click-Through Rate (CTR) and the $2$nd l… ▽ More

    Submitted 8 September, 2017; originally announced September 2017.

    Comments: 8 pages (with full proof), 4 figures, ICDM 2017 technical report

  48. arXiv:1708.09089  [pdf, other

    cs.SI

    Tracking Triadic Cardinality Distributions for Burst Detection in High-Speed Multigraph Streams

    Authors: Junzhou Zhao, **hui Wang, John C. S. Lui, Don Towsley, Xiaohong Guan

    Abstract: In everyday life, we often observe unusually frequent interactions among people before or during important events, e.g., people send/receive more greetings to/from their friends on holidays than regular days. We also observe that some videos or hashtags suddenly go viral through people's sharing on online social networks (OSNs). Do these seemingly different phenomena share a common structure? All… ▽ More

    Submitted 29 August, 2017; originally announced August 2017.

    Comments: 14 pages, 14 figures, extended version of arXiv:1411.3308

  49. arXiv:1708.09081  [pdf, other

    cs.SI physics.soc-ph

    Sampling Online Social Networks by Random Walk with Indirect Jumps

    Authors: Junzhou Zhao, **hui Wang, John C. S. Lui, Don Towsley, Xiaohong Guan

    Abstract: Random walk-based sampling methods are gaining popularity and importance in characterizing large networks. While powerful, they suffer from the slow mixing problem when the graph is loosely connected, which results in poor estimation accuracy. Random walk with jumps (RWwJ) can address the slow mixing problem but it is inapplicable if the graph does not support uniform vertex sampling (UNI). In thi… ▽ More

    Submitted 29 August, 2017; originally announced August 2017.

    Comments: 14 pages, 17 figures, extended version

  50. arXiv:1703.04307  [pdf, other

    cs.SI

    Optimizing Node Discovery on Networks: Problem Definitions, Fast Algorithms, and Observations

    Authors: Junzhou Zhao, **hui Wang, John C. S. Lui

    Abstract: Many people dream to become famous, YouTube video makers also wish their videos to have a large audience, and product retailers always hope to expose their products to customers as many as possible. Do these seemingly different phenomena share a common structure? We find that fame, popularity, or exposure, could be modeled as a node's discoverability on some properly defined network, and all of th… ▽ More

    Submitted 29 August, 2017; v1 submitted 13 March, 2017; originally announced March 2017.

    Comments: 45 pages, 13 figures