Author of the publication

(Private) Kernelized Bandits with Distributed Biased Feedback.

, , and . SIGMETRICS (Abstracts), page 61-62. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vulnerability mining of Cisco router based on fuzzing., , and . ICSAI, page 649-653. IEEE, (2014)EAKM: Efficient Conditional Privacy-Preserving Authentication Scheme with On-Chain Key Management in VANETs., , , , and . GLOBECOM, page 874-879. IEEE, (2023)Federated Learning with Fair Worker Selection: A Multi-Round Submodular Maximization Approach., , and . MASS, page 180-188. IEEE, (2021)(Private) Kernelized Bandits with Distributed Biased Feedback., , and . SIGMETRICS (Abstracts), page 61-62. ACM, (2023)Leader-following consensus for upper-triangular multi-agent systems via sampled and delayed output feedback., , , , and . Neurocomputing, (2018)Differentially Private Linear Bandits with Partial Distributed Feedback., , and . WiOpt, page 41-48. IEEE, (2022)Discovery of Mcl-1 inhibitors through virtual screening, molecular dynamics simulations and in vitro experiments., , , , , , , , , and 1 other author(s). Comput. Biol. Medicine, (2023)Bus scheduling method based on image texture and color analysis., , , and . ICNC-FSKD, page 2280-2284. IEEE, (2017)Combinatorial Sleeping Bandits with Fairness Constraints., , and . INFOCOM, page 1702-1710. IEEE, (2019)Waiting but not Aging: Age-of-Information and Utility Optimization Under the Pull Model., , , , , and . CoRR, (2019)