Abstract
Combinatorial multi-armed bandit (CMAB) is a fundamental framework widely used in networked systems to maximize cumulative rewards under uncertainty. Real-world applications such as federated learning and content delivery network often involve feedback that may be corrupted due to adversarial attacks or network disruptions. In this paper, we study contextual CMAB (C2 MAB) with adversarial corruptions, where feedback for base arms within any selected super arms can be corrupted by an adversary. We focus on L1 -norm smooth reward function and both L1 and L∞ -norm corruption measures, establishing tight regret upper bounds for each scenario. Additionally, we provide the first lower bounds for C2 MAB under corruptions, confirming the optimality of our proposed algorithm. To broaden the applicability, we further extend our algorithm to a more general C2 - MAB setting with probabilistically triggered arms. Empirical validation demonstrates significant improvements across synthetic and real-world datasets, with applications in contextual latency-critic federated learning, user-specific online content delivery and 360° VR video streaming.
© 2025 IEEE.
© 2025 IEEE.
| Original language | English |
|---|---|
| Title of host publication | IEEE INFOCOM 2025 - IEEE Conference on Computer Communications |
| Publisher | IEEE |
| Number of pages | 10 |
| ISBN (Electronic) | 9798331543051 |
| ISBN (Print) | 9798331543068 |
| DOIs | |
| Publication status | Published - 2025 |
| Event | IEEE International Conference on Computer Communications 2025 (IEEE INFOCOM 2025) - Park Plaza Westminster Bridge, London, United Kingdom Duration: 19 May 2025 → 22 May 2025 https://infocom2025.ieee-infocom.org/ |
Publication series
| Name | Proceedings - IEEE INFOCOM |
|---|---|
| ISSN (Print) | 0743-166X |
| ISSN (Electronic) | 2641-9874 |
Conference
| Conference | IEEE International Conference on Computer Communications 2025 (IEEE INFOCOM 2025) |
|---|---|
| Abbreviated title | IEEE INFOCOM 2025 |
| Place | United Kingdom |
| City | London |
| Period | 19/05/25 → 22/05/25 |
| Internet address |
Bibliographical note
Research Unit(s) information for this publication is provided by the author(s) concerned.Funding
The work of Yuedong Xu was supported by National Key R&D Program of China under Grant 2020YFA0711400, the Natural Science Foundation of China under Grant 62072117 and the Key-Area Research and Development Program of Guangdong Province under Grant 2020B010166003. The work of Xutong Liu was partially supported by a fellowship award from the Research Grants Council of the Hong Kong Special Administrative Region, China (CUHK PDFS2324-4S04). The work of Jinhang Zuo was supported by CityU 9610706.
RGC Funding Information
- RGC-funded
Fingerprint
Dive into the research topics of 'Robust Contextual Combinatorial Multi-Armed Bandits for Unreliable Network Systems'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver