{"id":"https://openalex.org/W4389076535","doi":"https://doi.org/10.1109/tkde.2023.3335248","title":"A Truthful Pricing-Based Defending Strategy Against Adversarial Attacks in Budgeted Combinatorial Multi-Armed Bandits","display_name":"A Truthful Pricing-Based Defending Strategy Against Adversarial Attacks in Budgeted Combinatorial Multi-Armed Bandits","publication_year":2023,"publication_date":"2023-11-28","ids":{"openalex":"https://openalex.org/W4389076535","doi":"https://doi.org/10.1109/tkde.2023.3335248"},"language":"en","primary_location":{"id":"doi:10.1109/tkde.2023.3335248","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tkde.2023.3335248","pdf_url":null,"source":{"id":"https://openalex.org/S30698027","display_name":"IEEE Transactions on Knowledge and Data Engineering","issn_l":"1041-4347","issn":["1041-4347","1558-2191","2326-3865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Knowledge and Data Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102722092","display_name":"Hengzhi Wang","orcid":"https://orcid.org/0000-0002-3334-8308"},"institutions":[{"id":"https://openalex.org/I4210108141","display_name":"Ministry of Education","ror":"https://ror.org/01hw7wf62","country_code":"IR","type":"government","lineage":["https://openalex.org/I4210108141"]},{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]},{"id":"https://openalex.org/I194450716","display_name":"Jilin University","ror":"https://ror.org/00js3aw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I194450716"]}],"countries":["CN","IR"],"is_corresponding":true,"raw_author_name":"Hengzhi Wang","raw_affiliation_strings":["Department of Computer Science and Technology, Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun, China","College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","Department of Computer Science and Technology and Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun, China","institution_ids":["https://openalex.org/I194450716","https://openalex.org/I4210108141"]},{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"Department of Computer Science and Technology and Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun, China","institution_ids":["https://openalex.org/I194450716"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033953325","display_name":"En Wang","orcid":"https://orcid.org/0000-0001-6112-2923"},"institutions":[{"id":"https://openalex.org/I4210108141","display_name":"Ministry of Education","ror":"https://ror.org/01hw7wf62","country_code":"IR","type":"government","lineage":["https://openalex.org/I4210108141"]},{"id":"https://openalex.org/I194450716","display_name":"Jilin University","ror":"https://ror.org/00js3aw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I194450716"]}],"countries":["CN","IR"],"is_corresponding":false,"raw_author_name":"En Wang","raw_affiliation_strings":["Department of Computer Science and Technology, Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun, China","Department of Computer Science and Technology and Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun, China","institution_ids":["https://openalex.org/I194450716","https://openalex.org/I4210108141"]},{"raw_affiliation_string":"Department of Computer Science and Technology and Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun, China","institution_ids":["https://openalex.org/I194450716"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045527959","display_name":"Yongjian Yang","orcid":"https://orcid.org/0000-0002-0056-3626"},"institutions":[{"id":"https://openalex.org/I194450716","display_name":"Jilin University","ror":"https://ror.org/00js3aw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I194450716"]},{"id":"https://openalex.org/I4210108141","display_name":"Ministry of Education","ror":"https://ror.org/01hw7wf62","country_code":"IR","type":"government","lineage":["https://openalex.org/I4210108141"]}],"countries":["CN","IR"],"is_corresponding":false,"raw_author_name":"Yongjian Yang","raw_affiliation_strings":["Department of Computer Science and Technology, Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun, China","Department of Computer Science and Technology and Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun, China","institution_ids":["https://openalex.org/I194450716","https://openalex.org/I4210108141"]},{"raw_affiliation_string":"Department of Computer Science and Technology and Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun, China","institution_ids":["https://openalex.org/I194450716"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028694889","display_name":"Bo Yang","orcid":"https://orcid.org/0000-0003-1927-8419"},"institutions":[{"id":"https://openalex.org/I4210108141","display_name":"Ministry of Education","ror":"https://ror.org/01hw7wf62","country_code":"IR","type":"government","lineage":["https://openalex.org/I4210108141"]},{"id":"https://openalex.org/I194450716","display_name":"Jilin University","ror":"https://ror.org/00js3aw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I194450716"]}],"countries":["CN","IR"],"is_corresponding":false,"raw_author_name":"Bo Yang","raw_affiliation_strings":["Department of Computer Science and Technology, Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun, China","Department of Computer Science and Technology and Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun, China","institution_ids":["https://openalex.org/I194450716","https://openalex.org/I4210108141"]},{"raw_affiliation_string":"Department of Computer Science and Technology and Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun, China","institution_ids":["https://openalex.org/I194450716"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039311485","display_name":"Jiangchuan Liu","orcid":"https://orcid.org/0000-0001-6592-1984"},"institutions":[{"id":"https://openalex.org/I18014758","display_name":"Simon Fraser University","ror":"https://ror.org/0213rcc28","country_code":"CA","type":"education","lineage":["https://openalex.org/I18014758"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jiangchuan Liu","raw_affiliation_strings":["School of Computing Science, Simon Fraser University, Burnaby, BC, Canada"],"affiliations":[{"raw_affiliation_string":"School of Computing Science, Simon Fraser University, Burnaby, BC, Canada","institution_ids":["https://openalex.org/I18014758"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102722092"],"corresponding_institution_ids":["https://openalex.org/I180726961","https://openalex.org/I194450716","https://openalex.org/I4210108141"],"apc_list":null,"apc_paid":null,"fwci":0.2545,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.61242214,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"36","issue":"11","first_page":"5529","last_page":"5543"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12101","display_name":"Advanced Bandit Algorithms Research","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12101","display_name":"Advanced Bandit Algorithms Research","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12288","display_name":"Optimization and Search Problems","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10462","display_name":"Reinforcement Learning in Robotics","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7156749963760376},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7154117822647095},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.5491696000099182},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5136603713035583},{"id":"https://openalex.org/keywords/forcing","display_name":"Forcing (mathematics)","score":0.4865387976169586},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.4861850142478943},{"id":"https://openalex.org/keywords/budget-constraint","display_name":"Budget constraint","score":0.4787982404232025},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.336152046918869},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.32535451650619507},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.28661537170410156},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.20394432544708252},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12057173252105713},{"id":"https://openalex.org/keywords/microeconomics","display_name":"Microeconomics","score":0.1086309552192688}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7156749963760376},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7154117822647095},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.5491696000099182},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5136603713035583},{"id":"https://openalex.org/C197115733","wikidata":"https://www.wikidata.org/wiki/Q1003136","display_name":"Forcing (mathematics)","level":2,"score":0.4865387976169586},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.4861850142478943},{"id":"https://openalex.org/C8505890","wikidata":"https://www.wikidata.org/wiki/Q605095","display_name":"Budget constraint","level":2,"score":0.4787982404232025},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.336152046918869},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.32535451650619507},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.28661537170410156},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.20394432544708252},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12057173252105713},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.1086309552192688},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tkde.2023.3335248","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tkde.2023.3335248","pdf_url":null,"source":{"id":"https://openalex.org/S30698027","display_name":"IEEE Transactions on Knowledge and Data Engineering","issn_l":"1041-4347","issn":["1041-4347","1558-2191","2326-3865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Knowledge and Data Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7001318215","display_name":null,"funder_award_id":"62302314","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W1514587017","https://openalex.org/W1823461189","https://openalex.org/W1972921453","https://openalex.org/W1985759455","https://openalex.org/W2001024980","https://openalex.org/W2020254732","https://openalex.org/W2029050771","https://openalex.org/W2066615467","https://openalex.org/W2077902449","https://openalex.org/W2080091103","https://openalex.org/W2093562354","https://openalex.org/W2112420033","https://openalex.org/W2116821104","https://openalex.org/W2125724988","https://openalex.org/W2128217090","https://openalex.org/W2138909795","https://openalex.org/W2769948160","https://openalex.org/W2888960341","https://openalex.org/W2889625362","https://openalex.org/W2950929549","https://openalex.org/W2966922281","https://openalex.org/W2997790181","https://openalex.org/W3015919075","https://openalex.org/W3153421894","https://openalex.org/W3155909716","https://openalex.org/W3156621611","https://openalex.org/W3195167974","https://openalex.org/W4213432242","https://openalex.org/W4246270964","https://openalex.org/W4283800968","https://openalex.org/W4294576339","https://openalex.org/W6601392155","https://openalex.org/W6630907848","https://openalex.org/W6640542924","https://openalex.org/W6732044312","https://openalex.org/W6740688103","https://openalex.org/W6754151078","https://openalex.org/W6762518091","https://openalex.org/W6773427235","https://openalex.org/W6780856881","https://openalex.org/W6804085683"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W83893804","https://openalex.org/W2178649091","https://openalex.org/W2353238953","https://openalex.org/W2496037054","https://openalex.org/W2024895661","https://openalex.org/W2390883384","https://openalex.org/W2054108430","https://openalex.org/W3123594720","https://openalex.org/W2360283705"],"abstract_inverted_index":{"We":[0,32],"study":[1,120],"defending":[2,155,184],"strategies":[3,110],"against":[4,69,124],"adversarial":[5,67,122],"attacks":[6,160],"on":[7],"<italic":[8],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[9],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Combinatorial":[10],"Multi-Armed":[11],"Bandits</i>":[12],"(CMAB)":[13],"algorithms.":[14],"CMAB":[15,36,71,95,128],"is":[16,72,86],"an":[17],"effective":[18],"sequence":[19],"decision":[20],"making":[21],"tool":[22],"that":[23,85,157],"has":[24],"been":[25],"broadly":[26],"applied":[27],"in":[28,40],"online":[29],"real-world":[30,136],"applications.":[31,137],"consider":[33],"a":[34,62,76,82,125,131,152],"realistic":[35],"setting,":[37],"budgeted":[38,70,94,127],"CMAB,":[39],"which":[41],"multiple":[42],"arms":[43,164],"associated":[44],"with":[45,144],"pulling":[46,166],"costs":[47,167],"and":[48,162,191],"unknown":[49],"rewards":[50],"are":[51],"pulled":[52,88,102],"per":[53],"round,":[54],"aiming":[55],"to":[56,100,135,141],"maximize":[57],"the":[58,66,93,121,173,179,183],"cumulative":[59],"reward":[60],"under":[61],"budget":[63],"constraint.":[64],"However,":[65],"attack":[68,123,139,175,187],"rarely":[73],"studied,":[74],"posing":[75],"very":[77],"important":[78],"security":[79,133],"issue.":[80],"Specifically,":[81],"suboptimal":[83],"arm":[84],"not":[87],"(i.e.,":[89],"attacker)":[90],"can":[91,177],"hijack":[92,178],"algorithm's":[96],"behavior,":[97],"forcing":[98],"itself":[99],"be":[101],"frequently":[103],"by":[104,116],"manipulating":[105],"other":[106,142],"arms'":[107],"rewards.":[108],"Existing":[109],"cannot":[111],"prevent":[112],"such":[113,159],"attacks.":[114],"Motivated":[115],"this,":[117,149],"we":[118,150],"closely":[119],"popular":[126],"algorithm,":[129],"exposing":[130],"significant":[132],"threat":[134],"The":[138],"extends":[140],"algorithms":[143],"certain":[145],"customization.":[146],"To":[147],"address":[148],"incorporate":[151],"truthful":[153],"pricing-based":[154],"strategy":[156,176,185],"prevents":[158],"effectively":[161],"ensures":[163],"share":[165],"truthfully.":[168],"Extensive":[169],"simulations":[170],"have":[171],"illustrated":[172],"proposed":[174],"algorithm":[180],"efficiently,":[181],"while":[182],"provides":[186],"prevention,":[188],"individual":[189],"rationality,":[190],"asymptotic":[192],"truthfulness":[193],"guarantees.":[194]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
