pith. machine review for the scientific record. sign in

arxiv: 1701.04222 · v1 · submitted 2017-01-16 · 💻 cs.LG · cs.AI· cs.CR

Recognition: unknown

Achieving Privacy in the Adversarial Multi-Armed Bandit

Authors on Pith no claims yet
classification 💻 cs.LG cs.AIcs.CR
keywords mathcalepsilonexp3privacyadversarialbestimproveknown
0
0 comments X
read the original abstract

In this paper, we improve the previously best known regret bound to achieve $\epsilon$-differential privacy in oblivious adversarial bandits from $\mathcal{O}{(T^{2/3}/\epsilon)}$ to $\mathcal{O}{(\sqrt{T} \ln T /\epsilon)}$. This is achieved by combining a Laplace Mechanism with EXP3. We show that though EXP3 is already differentially private, it leaks a linear amount of information in $T$. However, we can improve this privacy by relying on its intrinsic exponential mechanism for selecting actions. This allows us to reach $\mathcal{O}{(\sqrt{\ln T})}$-DP, with a regret of $\mathcal{O}{(T^{2/3})}$ that holds against an adaptive adversary, an improvement from the best known of $\mathcal{O}{(T^{3/4})}$. This is done by using an algorithm that run EXP3 in a mini-batch loop. Finally, we run experiments that clearly demonstrate the validity of our theoretical analysis.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Differential Privacy in the Extensive-Form Bandit Problem

    cs.CR 2026-05 unverdicted novelty 7.0

    An algorithm achieves Õ(√(A ln(S) T)/ε) regret for extensive-form bandits under ε-local differential privacy, claimed as the first such result.