A Differentially Private Approach for Budgeted Combinatorial Multi-Armed Bandits

被引:0
|
作者
Wang, Hengzhi [1 ]
Cui, Laizhong [1 ]
Wang, En [2 ,3 ]
Liu, Jiangchuan [4 ]
机构
[1] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen 518060, Peoples R China
[2] Jilin Univ, Dept Comp Sci & Technol, Changchun 130012, Peoples R China
[3] Jilin Univ, Key Lab Symbol Computat & Knowledge Engn, Minist Educ, Changchun 130012, Peoples R China
[4] Simon Fraser Univ, Sch Comp Sci, Burnaby, BC V5A 1S6, Canada
基金
中国国家自然科学基金;
关键词
Combinatorial multi-armed bandits; differential privacy; online learning; truthfulness;
D O I
10.1109/TDSC.2024.3401836
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As a fundamental tool for sequential decision-making, the Combinatorial Multi-Armed Bandits model (CMAB) has been extensively analyzed and applied in various online applications. However, the privacy concerns in budgeted CMAB are rarely investigated thus far. Few bandit algorithms have adequately addressed the privacy-preserving budgeted CMAB setting. Motivated by this, we study this setting using differential privacy as the formal measure of privacy. In this setting, playing an arm yields both a random reward and a random cost, and these values are kept private. In addition, multiple arms can be played in each round. The objective of the decision-maker is to minimize regret while subject to a budget constraint on the cumulative cost of all played arms. We demonstrate an exploration-exploitation-balanced bandit policy, which preserves the privacy of both rewards and costs under budgeted CMAB settings. This policy is proven differentially private and achieves an upper bound on regret. Furthermore, to provide incentives for the differentially private bandit policy so as to ensure that the reported costs are truthful, we introduce the concept of truthfulness and incorporate a payment mechanism that has been proven to be $\sigma$sigma-truthful. Numerical simulations based on multiple real-world datasets validate the theoretical findings and demonstrate the effectiveness of our policy compared to state-of-the-art policies.
引用
收藏
页码:424 / 439
页数:16
相关论文
共 50 条
  • [1] Algorithms for Differentially Private Multi-Armed Bandits
    Tossou, Aristide C. Y.
    Dimitrakakis, Christos
    THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2016, : 2087 - 2093
  • [2] Differentially Private Multi-Armed Bandits in the Shuffle Model
    Tenenbaum, Jay
    Kaplan, Haim
    Mansour, Yishay
    Stemmer, Uri
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 34 (NEURIPS 2021), 2021, 34
  • [3] Thompson Sampling for Budgeted Multi-armed Bandits
    Xia, Yingce
    Li, Haifang
    Qin, Tao
    Yu, Nenghai
    Liu, Tie-Yan
    PROCEEDINGS OF THE TWENTY-FOURTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI), 2015, : 3960 - 3966
  • [4] Budgeted Multi-Armed Bandits with Asymmetric Confidence Intervals
    Heyden, Marco
    Arzamasov, Vadim
    Fouche, Edouard
    Boehm, Klemens
    PROCEEDINGS OF THE 30TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, KDD 2024, 2024, : 1073 - 1084
  • [5] Combinatorial Multi-armed Bandits for Resource Allocation
    Zuo, Jinhang
    Joe-Wong, Carlee
    2021 55TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2021,
  • [6] Combinatorial Pure Exploration of Multi-Armed Bandits
    Chen, Shouyuan
    Lin, Tian
    King, Irwin
    Lyu, Michael R.
    Chen, Wei
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 27 (NIPS 2014), 2014, 27
  • [7] Networked Stochastic Multi-Armed Bandits with Combinatorial Strategies
    Tang, Shaojie
    Zhou, Yaqin
    Han, Kai
    Zhang, Zhao
    Yuan, Jing
    Wu, Weili
    2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), 2017, : 786 - 793
  • [8] A Truthful Pricing-Based Defending Strategy Against Adversarial Attacks in Budgeted Combinatorial Multi-Armed Bandits
    Wang, Hengzhi
    Wang, En
    Yang, Yongjian
    Yang, Bo
    Liu, Jiangchuan
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (11) : 5529 - 5543
  • [9] Differentially Private Unknown Worker Recruitment for Mobile Crowdsensing Using Multi-Armed Bandits
    Zhao, Hui
    Xiao, Mingjun
    Wu, Jie
    Xu, Yun
    Huang, He
    Zhang, Sheng
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2021, 20 (09) : 2779 - 2794
  • [10] Optimal Rates of (Locally) Differentially Private Heavy-tailed Multi-Armed Bandits
    Tao, Youming
    Wu, Yulian
    Zhao, Peng
    Wang, Di
    INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND STATISTICS, VOL 151, 2022, 151