May 5, 2022, 1:20 a.m. | Anshuka Rangi, Long Tran-Thanh, Haifeng Xu, Massimo Franceschetti

cs.CR updates on arXiv.org arxiv.org

We study bandit algorithms under data poisoning attacks in a bounded reward
setting. We consider a strong attacker model in which the attacker can observe
both the selected actions and their corresponding rewards and can contaminate
the rewards with additive noise. We show that any bandit algorithm with regret
$O(\log T)$ can be forced to suffer a regret $\Omega(T)$ with an expected
amount of contamination $O(\log T)$. This amount of contamination is also
necessary, as we prove that there exists …

attacks data lg poisoning

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Level 1 SOC Analyst

@ Telefonica Tech | Dublin, Ireland

Specialist, Database Security

@ OP Financial Group | Helsinki, FI

Senior Manager, Cyber Offensive Security

@ Edwards Lifesciences | Poland-Remote

Information System Security Officer

@ Booz Allen Hamilton | USA, AL, Huntsville (4200 Rideout Rd SW)

Senior Security Analyst - Protective Security (Open to remote across ANZ)

@ Canva | Sydney, Australia