Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarial Attacks on Combinatorial Multi-Armed Bandits., , , , , and . CoRR, (2023)When and Whom to Collaborate with in a Changing Environment: A Collaborative Dynamic Bandit Solution., , and . SIGIR, page 1410-1419. ACM, (2021)Variance Reduction in Gradient Exploration for Online Learning to Rank., , , , and . SIGIR, page 835-844. ACM, (2019)Learning by Exploration: New Challenges in Real-World Environments., , and . KDD, page 3575-3576. ACM, (2020)Estimation-Action-Reflection: Towards Deep Interaction Between Conversational and Recommender Systems., , , , , , and . CoRR, (2020)IDEAL: Influence-Driven Selective Annotations Empower In-Context Learners in Large Language Models., , , , , , and . CoRR, (2023)Automated Machine Learning & Tuning with FLAML., , , and . KDD, page 4828-4829. ACM, (2022)Economic Hyperparameter Optimization with Blended Search Strategy., , , and . ICLR, OpenReview.net, (2021)AutoGen: Enabling Next-Gen LLM Applications via Multi-Agent Conversation, , , , , , , , , and 4 other author(s). (2023)Learning Contextual Bandits in a Non-stationary Environment., , and . SIGIR, page 495-504. ACM, (2018)