Adaptive Double-Exploration Tradeoff for Outlier Detection
暂无分享,去创建一个
Yuan Zhou | Honglei Zhuang | Xiaojin Zhang | Shengyu Zhang | Yuanshuo Zhou | Shengyu Zhang | Honglei Zhuang | Xiaojin Zhang
[1] Shie Mannor,et al. PAC Bounds for Multi-armed Bandit and Markov Decision Processes , 2002, COLT.
[2] Shie Mannor,et al. Action Elimination and Stopping Conditions for the Multi-Armed Bandit and Reinforcement Learning Problems , 2006, J. Mach. Learn. Res..
[3] P. S. Horn,et al. Effect of outliers and nonhealthy individuals on reference interval estimation. , 2001, Clinical chemistry.
[4] Rémi Munos,et al. Pure exploration in finitely-armed and continuous-armed bandits , 2011, Theor. Comput. Sci..
[5] Andrew W. Moore,et al. Hoeffding Races: Accelerating Model Selection Search for Classification and Function Approximation , 1993, NIPS.
[6] W. R. Thompson. ON THE LIKELIHOOD THAT ONE UNKNOWN PROBABILITY EXCEEDS ANOTHER IN VIEW OF THE EVIDENCE OF TWO SAMPLES , 1933 .
[7] Philip H. S. Torr,et al. Outlier detection and motion segmentation , 1993, Other Conferences.
[8] Frederick L. Coolidge,et al. Statistics: A Gentle Introduction , 2000 .
[9] Aidong Zhang,et al. FindOut: Finding Outliers in Very Large Datasets , 2002, Knowledge and Information Systems.
[10] E. Paulson. A Sequential Procedure for Selecting the Population with the Largest Mean from $k$ Normal Populations , 1964 .
[11] H. Robbins. Some aspects of the sequential design of experiments , 1952 .
[12] Peter Stone,et al. Efficient Selection of Multiple Bandit Arms: Theory and Practice , 2010, ICML.
[13] Wei Chen,et al. Combinatorial Pure Exploration of Multi-Armed Bandits , 2014, NIPS.
[14] Csaba Szepesvári,et al. Empirical Bernstein stopping , 2008, ICML '08.
[15] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[16] Alexandra Carpentier,et al. An optimal algorithm for the Thresholding Bandit Problem , 2016, ICML.
[17] Xi Chen,et al. Optimal PAC Multiple Arm Identification with Applications to Crowdsourcing , 2014, ICML.
[18] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[19] Alessandro Lazaric,et al. Best Arm Identification: A Unified Approach to Fixed Budget and Fixed Confidence , 2012, NIPS.
[20] Volker Roth,et al. Kernel Fisher Discriminants for Outlier Detection , 2006, Neural Computation.
[21] Alessandro Lazaric,et al. Multi-Bandit Best Arm Identification , 2011, NIPS.
[22] Matthew Malloy,et al. lil' UCB : An Optimal Exploration Algorithm for Multi-Armed Bandits , 2013, COLT.
[23] Mario Vento,et al. To reject or not to reject: that is the question-an answer in case of neural classifiers , 2000, IEEE Trans. Syst. Man Cybern. Part C.
[24] Mohamed A. El-Sharkawi,et al. Elliptical novelty grouping for on-line short-turn detection of excited running rotors , 1999 .
[25] Shivaram Kalyanakrishnan,et al. Information Complexity in Bandit Subset Selection , 2013, COLT.
[26] Chang-Tien Lu,et al. Spatial Weighted Outlier Detection , 2006, SDM.
[27] Osamu Watanabe,et al. Adaptive Sampling Methods for Scaling Up Knowledge Discovery Algorithms , 1999, Data Mining and Knowledge Discovery.
[28] Peter Auer,et al. Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.
[29] Varun Grover,et al. Active learning in heteroscedastic noise , 2010, Theor. Comput. Sci..
[30] Aurélien Garivier,et al. On the Complexity of Best-Arm Identification in Multi-Armed Bandit Models , 2014, J. Mach. Learn. Res..
[31] Ambuj Tewari,et al. PAC Subset Selection in Stochastic Multi-armed Bandits , 2012, ICML.
[32] Yifan Wang,et al. Identifying Outlier Arms in Multi-Armed Bandit , 2017, NIPS.