2020 International Conference on COMmunication Systems &Amp; NETworkS (COMSNETS) 2020
DOI: 10.1109/comsnets48256.2020.9027344
|View full text |Cite
|
Sign up to set email alerts
|

A New Approach to Correlated Multi Armed Bandits

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 1 publication
0
1
0
Order By: Relevance
“…Alternatively, in a PUT that has a limit on the length of inputs to be accepted, mutations such as inserting a constant string or copying a partial byte sequence from another seed are not promising arms. While the distributions of rewards are assumed to be independent in standard stochastic bandit problems, there are studies on such problem settings where the arms are correlated, aimed at reducing regret further compared to the standard settings [30,33,55]. Even assuming independence, bandit algorithms can greatly improve the efficiency of the fuzzer.…”
Section: Correlation Of Armsmentioning
confidence: 99%
“…Alternatively, in a PUT that has a limit on the length of inputs to be accepted, mutations such as inserting a constant string or copying a partial byte sequence from another seed are not promising arms. While the distributions of rewards are assumed to be independent in standard stochastic bandit problems, there are studies on such problem settings where the arms are correlated, aimed at reducing regret further compared to the standard settings [30,33,55]. Even assuming independence, bandit algorithms can greatly improve the efficiency of the fuzzer.…”
Section: Correlation Of Armsmentioning
confidence: 99%