6ba1453022da1faf642d4de27241d53f@2020@MLSYS

Total: 1

#1 Privacy-Preserving Bandits [PDF] [Copy] [Kimi] [REL]

Authors: Mohammad Malekzadeh ; Dimitrios Athanasakis ; Hamed Haddadi ; Ben Livshits

Contextual bandit algorithms~(CBAs) often rely on personal data to provide recommendations. Centralized CBA agents utilize potentially sensitive data from recent interactions to provide personalization to end-users. Keeping the sensitive data locally, by running a local agent on the user's device, protects the user's privacy, however, the agent requires longer to produce useful recommendations, as it does not leverage feedback from other users.